Khuyến mãi còn 2 chổ cho Chương trình huấn luyện Comptia Pentest + trực tuyến và thực chiến trên lab thật. Chỉ cần trình duyệt để thực hành và làm bài tập. Có đánh giá và kiểm tra ở cuối mỗi chương để review kiến thức . Liên hệ đặt ngay qua Đông Dương Đại Hùng
Các bạn hãy tham khảo kỹ Nội Dung, phương pháp học và thời gian trước khi đặt câu hỏi để không bị trùng lắp
- Sách tham khảo Comptia Pentest +
- Lab Guide chi tiết trong hệ thống iLab, đây là các bài hướng dẫn thực hành hand on và step by step trên mô hình lab thật trực tuyến nên bất kì ai cũng dễ dàng thực hành, ở bất kì nơi đâu.
- Đủ sức ôn luyện thi chứng chỉ quốc tế Comptia Pentest +

Hệ thống lab đầy đủ các máy thật Kali Linux, Domain Controller,Domain Server và 2 Domain Client
Thời hạn học tập thực hành 6 tháng : chi phí 5.000.000 VND
Giảm 3250 K còn 1.7500.000 VND
Đăng kí và nhận tài khỏan trong vòng 24 tiếng. Đăn kí và thanh toán học phí qua chuyển khoản đề số tài khoản trong phần Hướng Dẫn Đăng Kí
Đối tượng học viên :
- Đã có kiến thức căn bản về mạng máy tính, kiến thức nền về Windows và Linux cũng như an toàn thông tin căn bản hoặc đã học qua Comptia Security +, Network_, Server+, Linux +
Lưu ý : Compo 4 tài khoản học trực tuyến và thực hành trên Lab thật thời hạn 6 tháng dành cho new bie (người mới) gồm
1.Comptia Security + (75$)
2.Comptia Network + (75$)
3.Comptia Server + (75$)
4.Comptia Linux + (75$)
Giá compo 5.000.000 VND . Đây là starter SecCompo dành cho các bạn mới nghiên cứu và vào nghề InfoSEC.
Sau khi học xong có thể học nâng cao các môn như CEH, CHFI, Pentest+ hay các khóa bảo mật dành cho chuyên gia, nhà quản lý : CASP, CySA …
Gói compo cần đặt trước và có tài học trong vòng 1 tuần.
Liên hệ Đông Dương Đại Hùng https://www.facebook.com/dongduongdaihung
A/ Phương pháp học : Đây là khóa học trực tuyến. Các bạn cần có máy tính kết nối với mạng internet, đăng nhập bằng tài khoản được cấp và thực hành theo hướng dẫn và các bài học step by step rất dễ thực tập (phải nói là trình độ PTTH vẫn có thể thực hành). Các bạn có thể đăng nhập vào khóa học 24 x7 trong vòng 6 tháng. Hỗ trợ kỹ thuật qua group học tập trên Facebook. Yêu cầu làm bài và học bài tuần tự, nếu chưa học bài 1 BQT sẽ không giải đáp các câu hỏi của bài 2 hay 3,4,5 …
B/ Nội Quy Khóa Học : Cần học và làm bài đầy đủ theo yêu cầu của khóa học đề ra và tiến hành theo learning path (xem trong phần D / Nội Dung Khóa Học. Nếu vi phạm quy chế có thể bị tạm khóa tài khoản cho đến khi hoàn thành bài tập phạt trên CBT Lab (lab chạy trên máy tính hoặc online)
C Chứng chỉ : Kết thúc khóa học và học viên thực hành trên 90 % bài lab + trả lời bảng khảo sát câu hỏi ôn tập sẽ được phép thi thực hành trên hệ thống Exam của CEH VIETNAM.
Nếu thi rớt đóng tiền thi lại trong vòng 2 tuần . Lệ phí thi lại là 50 $ / Nếu rớt lần 2 phải thì lại sau 4 tuần và đóng lệ phí 75 $. Các bài thi nằm trong phạm vi bài học với các mục tiêu pentest thật trên lab.
C/Tham khảo Nội Dung CompTIA PenTest+
The CompTIA PenTest+ (PT0-001) is an intermediate-to-advanced level certification to provide you with the hands-on skills of penetration testing (ethical hacking). You will learn how to locate and exploit vulnerabilities in a network – including breaches of applications, protocols, Application Programming Interfaces (APIs), servers and firewalls. After successful completion, you will be able to plan and prepare for a penetration test engagement, perform social engineering and password attacks, analyze and report pentest results, and more. All tasks are designed to set you up for success in cybersecurity. Good luck!
Lab Guides
- Planning and Preparing for a Penetration Test Engagement : In progress
- Using the Metasploit Framework : Complete
- Performing Social Engineering : Complete
- Conducting Passive Reconnaissance for Vulnerabilities in a Network : Complete
- Conducting Active Reconnaissance for Vulnerabilities in a Network : Complete
- Perform Vulnerability Scan and Analyze Vulnerability Scan Results
- Exploiting the Network Vulnerabilities : In progress
- Exploiting Desktop Systems Vulnerabilities
- Exploit Web Application Vulnerabilities
- Performing Password Attacks
- Exploiting Discovered Vulnerabilities
- Work with Various Tools
- Performing Physical Security
- Working with Scripts
- Complete Post Exploit Tasks
- Analyzing and Reporting the Pen Test Results
Planning and Preparing for a Penetration Test Engagement
Exercises
- Introduction
- Lab Topology
- Exercise 1 – Explain Penetration Testing and its Importance
- Exercise 2 – Use Serpico to Generate a Penetration report
- Exercise 3 – Explain Penetration Testing Resources and Requirements
- Exercise 4 – Explain Rules of Engagement, Contract Types, and Scoping an Engagement
- Exercise 5 – Explain Different Testing Strategies
- Exercise 6 – Explain Target Selection and Threat Actors
- Exercise 7 – Explain Asset Categorization and Risk Assessment
- Exercise 8 – Explain Compliance-based Assessments
- Exercise 9 – Prepare for Penetration Test Engagement
- Review
Welcome to the Planning and Preparing for a Penetration Test Engagement Practice Lab. In this module, you will be provided with the instructions needed to develop your hands-on skills.
Getting Started
If this is your first time using Practice Labs, please watch our Getting Started video below.
Learning Outcomes
In this module, you will complete the following exercises:
- Exercise 1 – Explain Penetration Testing and its Importance
- Exercise 2 – Use Serpico to Generate a Penetration report
- Exercise 3 – Explain Penetration Testing Resources and Requirements
- Exercise 4 – Explain Rules of Engagement, Contract Types, and Scoping an Engagement
- Exercise 5 – Explain Different Testing Strategies
- Exercise 6 – Explain Target Selection and Threat Actors
- Exercise 7 – Explain Asset Categorization and Risk Assessment
- Exercise 8 – Explain Compliance-based Assessments
- Exercise 9 – Prepare for Penetration Test Engagement
After completing this lab, you will be able to:
- Access a List of Common Penetration Testing Tools
- Access Zenmap in Kali Linux
- Configure the Serpico Web Application
- Know about Different Types of Resource Documents
- Have an Overview of Budget Requirements and Technical Constraints
- Download Sample Penetration Testing Agreements
- Know about the Rules of Engagement
- Assess Guidelines for Planning the Penetration Testing
- Know about SOW, MSA, and NDA
- Know about the Legal Restrictions including Local and National Government
- Know about the Scopes in an Engagement
- Difference between Black Box vs. White Box vs. Gray Box
- Know about the Types of Targets and Threat Actors
- Explain Types of Assets, Risk Responses, Tolerance to Impact and Risk Appetite
- Key Aspects of Compliance-Based Assessments and their Limitations
- Know Key Points to Prepare a Team for Penetration Testing
- Explain Data Collection and Documentation
- Generate a Penetration Test Report with Serpico
- Explain Activity Assignment and Sequencing, Contingency Planning, Escalation Paths and Communications
Exam Objectives
The following exam objectives are covered in this lab:
- PT0-001: 1.1 Explain the importance of planning for an engagement
- PT0-001: 1.2 Explain key legal concepts
- PT0-001: 1.3 Explain the importance of scoping an engagement properly
- PT0-001: 1.5 Explain the key aspects of compliance-based assessments
CompTIA PenTest+
Using the Metasploit Framework
Exercises
- Introduction
- Lab Topology
- Exercise 1- Using the Metasploit Framework
- Exercise 2 – Setting the Module Options
- Exercise 3 – Using Payloads
- Exercise 4 – Creating Standalone Payloads with Msfvenom
- Review
Introduction
Penetration Testing
PenTest+
Msfvenom
Metasploit Framework
Welcome to Using the Metasploit Framework Practice Lab. In this module, you will be provided with the instructions and devices needed to develop your hands-on skills.
Getting Started
If this is your first time using Practice Labs, please watch our Getting Started video below.
Learning Outcomes
In this module, you will complete the following exercises:
- Exercise 1 – Using the Metasploit Framework
- Exercise 2 – Setting Module Options
- Exercise 3 – Using Payloads
- Exercise 4 – Creating Standalone Payloads with Msfvenom
After completing this lab, you will be able to:
- Switch Off the Windows Firewall on PLABWIN810
- Start Metasploit
- Find Metasploit Modules
- Use the Modules Database
- Set Module Options
- Find Compatible Payloads
- Explain the types of Shell Targets
- Choose a Payload
- Share the Payload with the Victim
- Use the Multi/handler Module and Exploit the System
Exam Objectives
The following exam objectives are covered in this lab:
- PT0-001: 4.2 Compare and contrast various use cases of tools
- PT0-001: 2.1 Given a scenario, conduct information gathering using appropriate techniques
CompTIA PenTest+
Performing Social Engineering
Exercises
- Introduction
- Lab Topology
- Exercise 1- Discuss Social Engineering
- Exercise 2 – Using the Social-Engineer Toolkit (SET)
- Review
Introduction
Penetration Testing
PenTest+
Social Engineering
Social Engineering Toolkit (SET)
Reverse Handler
Payload
Welcome to the Performing Social Engineering Practice Lab. In this module, you will be provided with the instructions and devices needed to develop your hands-on skills.
Getting Started
If this is your first time using Practice Labs, please watch our Getting Started video below.
Learning Outcomes
In this module, you will complete the following exercises:
- Exercise 1 – Discuss Social Engineering
- Exercise 2 – Using the Social-Engineer Toolkit (SET)
After completing this lab, you will be able to:
- Know the Basic Components of Social Engineering
- Know the Motivation Techniques
- Know Phishing and its Types
- Know Hoax, Baiting, Shoulder Surfing, Tailgating, and Piggybacking
- Create a Malicious Payload
- Copy the File to the User’s System
- Download the Payload
- Execute the Payload
- Collect Evidence of Compromise on the User’s System
CompTIA PenTest+
Conducting Passive Reconnaissance for Vulnerabilities in a Network
Exercises
- Introduction
- Lab Topology
- Exercise 1- Conducting Passive Reconnaissance for Vulnerabilities in a Network
- Exercise 2 – Leveraging the Gathered Information
- Review
Introduction
Penetration Testing
Passive Reconnaissance
WHOis
Social Engineering
Maltego
Recon-ng
Metasploit
PenTest+
Welcome to Conducting Passive Reconnaissance for Vulnerabilities in a Network Practice Lab. In this module, you will be provided with the instructions and devices needed to develop your hands-on skills.
Getting Started
If this is your first time using Practice Labs, please watch our Getting Started video below.
Learning Outcomes
In this module, you will complete the following exercises:
- Exercise 1 – Conducting Passive Reconnaissance for Vulnerabilities in a Network
- Exercise 2 – Leveraging the Gathered Information
After completing this lab, you will be able to:
- Use the WHOis Website
- Perform Social Media Exploitation
- Use Shodan
- Use Google Hacking
- Use DNS Querying
- Use theHarvester
- Use Recon-ng
- Create a Temporary E-mail Account
- Use Maltego
- Find Analysis and Weaponization
- Know about Content of Interest
- Prepare for Next steps and its Guidelines
Exam Objectives
The following exam objectives are covered in this lab:
- PT0-001: 2.1 Given a scenario, conduct information gathering using appropriate technique
- PT0-001: 2.2 Given a scenario, perform a vulnerability scan
- PT0-001: 4.2 Compare and contrast various use cases of tools
CompTIA PenTest+
Conducting Active Reconnaissance for Vulnerabilities in a Network
Exercises
- Introduction
- Lab Topology
- Exercise 1- Conducting Active Reconnaissance in a Network
- Review
Introduction
Penetration Testing
PenTest+
Active Reconnaissance
Nmap
Port
Service
Operating System
Welcome to the Conducting Active reconnaissance for Vulnerabilities in a Network Practice Lab. In this module, you will be provided with the instructions and devices needed to develop your hands-on skills.
Getting Started
If this is your first time using Practice Labs, please watch our Getting Started video below.
Learning Outcomes
In this module, you will complete the following exercises:
- Exercise 1 – Conducting Active Reconnaissance in a Network
After completing this lab, you will be able to:
- Identify Live Hosts on a Network
- Perform Discovery Scans
- Perform Port Scanning
- Perform Stealth Scans
- Perform Packet Crafting
- Perform Fingerprinting
- Perform Service Probing
- Disable Ping Sweep
- Use Timing Templates
- Work with Nmap Output Parameters, such as oA, oN, oG, and oX
Exam Objectives
The following exam objectives are covered in this lab:
- PT0-001: 2.1 Given a scenario, conduct information gathering using appropriate technique
- PT0-001: 4.1 Given a scenario, use Nmap to conduct information gathering exercises
- PT0-001: 4.2 Compare and contrast various use cases of tools
CompTIA PenTest+
Perform Vulnerability Scan and Analyze Vulnerability Scan Results
Exercises
- Introduction
- Lab Topology
- Exercise 1- Perform Enumeration
- Exercise 2 – Perform Vulnerability Scan
- Exercise 3 – Analyze Vulnerability Scan Results and Prioritize Activities
- Exercise 4 – Describe Common Techniques to Complete Attack
- Review
Introduction
Penetration Testing
PenTest+
Enumeration
Vulnerability Scan
Exploit
OpenVAS
Lynis
DNS Enumeration
Linux Host Enumeration
Windows Host Enumeration
wafw00f
HTTPrint
Nmap
Welcome to Perform Vulnerability Scan and Analyze Vulnerability Scan Results Practice Lab. In this module, you will be provided with the instructions and devices needed to develop your hands-on skills.
Getting Started
If this is your first time using Practice Labs, please watch our Getting Started video below.
Learning Outcomes
In this module, you will complete the following exercises:
- Exercise 1 – Perform Enumeration
- Exercise 2 – Perform Vulnerability Scan
- Exercise 3 – Analyze Vulnerability Scan Results and Prioritize Activities
- Exercise 4 – Describe Common Techniques to Complete Attack
After completing this lab, you will be able to:
- Perform DNS Enumeration
- Switch Off the Windows Firewall on PLABWIN810
- Perform Windows Host Enumeration using Rpcclient
- Perform Linux Host Enumeration using Nmap
- Enumerate Web Applications using Wafw00f
- Enumerate a Web server using HTTPrint
- Perform Website Enumeration using Nmap
- Perform Server Message Block (SMB) Enumeration
- Use Nikto for Vulnerability Scanning
- Perform Vulnerability Scanning using OpenVAS
- Use Lynis for System Vulnerability Scanning
- Describe False Positive
- Map Vulnerabilities
- Prioritize Activities in Preparation for Penetration Test
- Know about Exploits
- Explain Cross-compiling Code
- Explain Exploit Modification
- Know about Exploit Chaining
- Know about Proof-of-Concept Development (Exploit Development)
- Know about Social Engineering
Exam Objectives
The following exam objectives are covered in this lab:
- PT0-001: 2.1 Given a scenario, conduct information gathering using appropriate technique
- PT0-001: 2.3 Given a scenario, analyze vulnerability scan results
- PT0-001: 4.2 Compare and contrast various use cases of tools
CompTIA PenTest+
Exploiting the Network Vulnerabilities
Exercises
- Introduction
- Lab Topology
- Exercise 1- Exploiting the Network Vulnerabilities
- Review
Introduction
Penetration Testing
PenTest+
Slowris
MITM
ARP
Spoofing
DNS Spoofing
Denial-of-Service (DoS)
Sniffing
Welcome to the Exploiting the Network Vulnerabilities Practice Lab. In this module, you will be provided with the instructions and devices needed to develop your hands-on skills.
Getting Started
If this is your first time using Practice Labs, please watch our Getting Started video below.
Learning Outcomes
In this module, you will complete the following exercises:
- Exercise 1 – Exploiting the Network Vulnerabilities
After completing this lab, you will be able to:
- Perform a Slowloris Attack on a Website
- Conduct an Address Resolution Protocol (ARP) Poisoning Attack
- Conduct Man-In-The-Middle Attacks using Ettercap
- Track the Sniffing Network Interface Cards (NICs) on the Network
- Perform DNS Spoofing Attack
Exam Objectives
The following exam objective is covered in this lab:
- PT0-001: 3.2 Given a scenario, exploit network-based vulnerabilities
CompTIA PenTest+
Exploiting Desktop Systems Vulnerabilities
Exercises
- Introduction
- Lab Topology
- Exercise 1- Exploiting the Desktop Systems Vulnerabilities
- Review
Introduction
Planning
Penetration Testing
PenTest+
Welcome to the Exploiting Desktop Systems Vulnerabilities Practice Lab. In this module, you will be provided with the instructions and devices needed to develop your hands-on skills.
Getting Started
If this is your first time using Practice Labs, please watch our Getting Started video below.
Learning Outcomes
In this module, you will complete the following exercises:
- Exercise 1 – Exploiting Desktop Systems Vulnerabilities
After completing this lab, you will be able to:
- Switch Off the Windows Firewall on PLABWIN810
- Connect to a Windows Host and Launch the Exploit
- Open the Meterpreter Shell
- Extract and Crack the Password Hashes
- Work with the Windows Commands
- Enable a User Account
- Handle Services
- List the Existing User Accounts
- Download a File from Windows System
Exam Objectives
The following exam objectives are covered in this lab:
- PT0-001: 3.5 Given a scenario, exploit local host vulnerabilities
- PT0-001: 4.2 Compare and contrast various use cases of tools
CompTIA PenTest+
Exploit Web Application Vulnerabilities
Exercises
- Introduction
- Lab Topology
- Exercise 1- Exploit Web Application Vulnerabilities
- Exercise 2 – Using Insecure Code Practices
- Review
Introduction
Penetration Testing
PenTest+
Exploit
Web Application
Vulnerabilities
SQL Injection
Session
XSS
Welcome to the Exploit Web Application Vulnerabilities Practice Lab. In this module, you will be provided with the instructions and devices needed to develop your hands-on skills.
Getting Started
If this is your first time using Practice Labs, please watch our Getting Started video below.
Learning Outcomes
In this module, you will complete the following exercises:
- Exercise 1 – Exploit Web Application Vulnerabilities
- Exercise 2 – Using Insecure Code Practices
After completing this lab, you will be able to:
- Launch a SQL Injection Attack
- Perform Broken Authentication Attacks
- View Session ID in URL
- Conduct OS Command Injection Attack
- Perform Server-side Includes Injection Attack (SSI)
- Perform Cross-site Scripting Attack
- Performing Directory Traversal Attack
- Perform Web Application Brute Forcing Using DirBuster
- Know about Lack of Input Validation
- Explain Hard-code Credentials
- Know about Data in Cleartext Format
- Know about Source Code Comments
- Explain Verbose Errors
- Know about Lack of Error Handling
- Know about Lack of Code Signing
- Explain the Occurrence of Race Conditions
- Know about Hidden Elements – Sensitive Information in the DOM
Exam Objectives
The following exam objective is covered in this lab:
- PT0-001: 3.4 Given a scenario, exploit application-based vulnerabilities
CompTIA PenTest+
Performing Password Attacks
Exercises
- Introduction
- Lab Topology
- Exercise 1- Performing Online Password Attacks
- Exercise 2 – Performing Offline Password Attacks
- Review
Introduction
Penetration Testing
PenTest+
Brute-Force Attack
Dictionary Attack
Rainbow Table
Cain
John the Reaper
Hydra
Welcome to the Performing Password Attacks Practice Lab. In this module, you will be provided with the instructions and devices needed to develop your hands-on skills.
Getting Started
If this is your first time using Practice Labs, please watch our Getting Started video below.
Learning Outcomes
In this module, you will complete the following exercises:
- Exercise 1 – Performing Online Password Attacks
- Exercise 2 – Performing Offline Password Attacks
After completing this lab, you will be able to:
- Switch Off the Windows Firewall on PLABWIN810
- Use Wordlists
- Use Hydra to Guess Usernames and Passwords
- Crack Linux Passwords using John the Ripper
- Sniff the Passwords
- Capture NTLMv2 Hash through SMB
- Use Responder
- Generate Rainbow Tables
- Recover Windows Hashes using Cain and Abel
Exam Objectives
The following exam objectives are covered in this lab:
- PT0-001: 3.5 Given a scenario, exploit local host vulnerabilities
- PT0-001: 4.2 Compare and contrast various use cases of tools
CompTIA PenTest+
Exploiting Discovered Vulnerabilities
Exercises
- Introduction
- Lab Topology
- Exercise 1- Exploiting Discovered Vulnerabilities
- Review
Introduction
Penetration Testing
PenTest+
Vulnerabilities
Lateral Movement
Pivoting
Backdoor
Welcome to the Exploiting Discovered Vulnerabilities Practice Lab. In this module, you will be provided with the instructions and devices needed to develop your hands-on skills.
Getting Started
If this is your first time using Practice Labs, please watch our Getting Started video below.
Learning Outcomes
In this module, you will complete the following exercises:
- Exercise 1 – Exploiting Discovered Vulnerabilities
After completing this lab, you will be able to:
- Switch Off the Windows Firewall on PLABWIN810
- Perform Lateral Movement with Named Pipes
- Create a Persistent Backdoor
- Explain Pivoting
Exam Objectives
The following exam objectives are covered in this lab:
- PT0-001: 2.4 Explain the process of leveraging information to prepare for exploitation
- PT0-001: 3.5 Given a scenario, exploit local host vulnerabilities
- PT0-001: 4.2 Compare and contrast various use cases of tools
CompTIA PenTest+
Work with Various Tools
Exercises
- Introduction
- Lab Topology
- Exercise 1 – Work with Various Penetration Testing Tools
- Review
CompTIA PenTest+
Work with Various Tools
Introduction
Introduction
Penetration Testing
PenTest+
Backdoor
Remote Desktop
Exploit
Impacket
Incognito
Searchsploit
Welcome to the Work with Various Tools Practice Lab. In this module, you will be provided with the instructions and devices needed to develop your hands-on skills.
Getting Started
If this is your first time using Practice Labs, please watch our Getting Started video below.
Learning Outcomes
In this module, you will complete the following exercises:
- Exercise 1 – Work with Various Penetration Testing Tools
After completing this lab, you will be able to:
- Switch Off the Windows Firewall on PLABWIN810
- Start a Meterpreter Session on a Windows System
- Create a Backdoor User
- Enable Remote Desktop in Windows Firewall
- Enable Remote Desktop Using Meterpreter
- Use the Incognito Module
- Work with Searchsploit
- Work with Impacket
Exam Objectives
The following exam objectives are covered in this lab:
- PT0-001: 4.2 Compare and contrast various use cases of tools
- PT0-001: 2.2 Given a scenario, perform a vulnerability scan
CompTIA PenTest+
Performing Physical Security
Exercises
- Introduction
- Lab Topology
- Exercise 1- Explain Physical Security Attacks Related to Facilities
- Review
Getting Started
If this is your first time using Practice Labs, please watch our Getting Started video below.
Learning Outcomes
In this module, you will complete the following exercises:
- Exercise 1 – Explain Physical Security Attacks Related to Facilities
After completing this lab, you will have covered the following topics:
- Piggybacking/Tailgating
- Fence Jumping
- Dumpster Diving
- Lock Picking
- Lock Bypass
- Egress Sensor
Exam Objectives
The following exam objective is covered in this lab:
- PT0-001: 3.6 Summarize physical security attacks related to facilities
CompTIA PenTest+
Working with Scripts
Exercises
- Introduction
- Lab Topology
- Exercise 1- Work with Variables
- Exercise 2 – Work with Loops
- Exercise 3 – Use Error Handling and Arrays
- Review
Introduction
Penetration Testing
PenTest+
Scripting
Variables
Global Variables
Shell Scripts
Arrays
Welcome to the Working with Scripts Practice Lab. In this module, you will be provided with the instructions and devices needed to develop your hands-on skills.
Getting Started
If this is your first time using Practice Labs, please watch our Getting Started video below.
Learning Outcomes
In this module, you will complete the following exercises:
- Exercise 1 – Work with Variables
- Exercise 2 – Work with Loops
- Exercise 3 – Use Error Handling and Arrays
After completing this lab, you will be able to:
- Use Local and Global Variables
- Write Bash Functions
- Use the Set Command
- Use For Loop
- Use If…Else Statements
- Use While loop
- Use Error Handling
- Use Arrays
Exam Objectives
The following exam objective is covered in this lab:
- PT0-001: 4.4 Given a scenario, analyze a basic script (limited to Bash, Python, Ruby, and PowerShell)
CompTIA PenTest+
Complete Post Exploit Tasks
Exercises
- Introduction
- Lab Topology
- Exercise 1- Complete Post Exploitation Tasks
- Review
Introduction
Penetration Testing
PenTest+
Meterpreter
Keylogger
Welcome to the Complete Post Exploit Tasks Practice Lab. In this module, you will be provided with the instructions and devices needed to develop your hands-on skills.
Getting Started
If this is your first time using Practice Labs, please watch our Getting Started video below.
Learning Outcomes
In this module, you will complete the following exercises:
- Exercise 1 – Complete Post Exploitation Tasks
After completing this lab, you will be able to:
- Switch Off the Windows Firewall on PLABWIN810
- Start a Meterpreter Session on a Windows System
- Migrate Malicious Code to an Exploited Windows Host
- Start a Keylogger
- Capture Screenshots
- Perform Privilege Escalation
- Search for Files
- Enable Remote Desktop
- Find the Installed Applications
- Perform an ARP Scan
- Clear Tracks
Exam Objectives
The following exam objective is covered in this lab:
- PT0-001: 3.7 Given a scenario, perform post-exploitation techniques
CompTIA PenTest+
Analyzing and Reporting the Pen Test Results
Exercises
- Introduction
- Lab Topology
- Exercise 1- Analyzing the Pen Test Data
- Exercise 2 – Develop Recommendations for Mitigation Strategies
- Exercise 3 – Write and Handle Reports
- Exercise 4 – Conduct Post-Report Delivery Activities
- Review
- Welcome to the Analyzing and Reporting the Pen Test Results Practice Lab. In this module, you will be provided with the information needed to develop your knowledge.
· Getting Started
- If this is your first time using Practice Labs, please watch our Getting Started video below.
Learning Outcomes
In this module, you will complete the following exercises:
- Exercise 1 – Guidance on Analyzing the Pen Test Data
- Exercise 2 – Develop Recommendations for Mitigation Strategies
- Exercise 3 – Write and Handle Reports
- Exercise 4 – Conduct Post-Report-Delivery Activities
After completing this lab, you will have covered the following topics:
- Perform Pen Test Data Collection
- Perform Pen Test Data Categorization
- Prioritize the Results
- Suggest Solutions regarding People, Processes, and Technology
- Create Categories of Findings
- Conduct End-user Training
- Password Encryption and Hashing
- Multi-factor Authentication
- Input Sanitization
- System Hardening
- Data Normalization
- Report Structure
- Report Storage, Handling, and Disposition
- Post-Engagement Cleanup Tasks
- Removal of Credentials
- Removal of Various Tools
- Client Acceptance
- Attestation of Findings
- Lesson Learned
- Follow-up Actions
Exam Objectives
The following exam objectives are covered in this lab:
- PT0-001: 5.1 Given a scenario, use report writing and handling best practices
- PT0-001: 5.2 Explain post-report delivery activities
- PT0-001: 5.3 Given a scenario, recommend mitigation strategies for discovered vulnerabilities
- PT0-001: 5.4 Explain the importance of communication during the penetration testing process.