Post-exploitation and Lateral Movements for CompTIA Pentest +

  • CategoryOther
  • TypeTutorials
  • LanguageEnglish
  • Total size526 MB
  • Uploaded Byfreecoursewb
  • Downloads19
  • Last checkedApr. 04th '25
  • Date uploadedApr. 04th '25
  • Seeders 1
  • Leechers11

Infohash : B3EABC9B65D6AB31FB180ABB118A037E4EA6F210

Post-exploitation and Lateral Movements for CompTIA Pentest+

https://WebToolTip.com

Published 3/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 48 KHz
Language: English | Size: 526.57 MB | Duration: 1h 28m 10s

This course teaches you how to establish persistence, execute lateral movements, exfiltrate data, and perform cleanup operations, preparing you for the CompTIA PenTest+ exam.

Post-exploitation techniques are critical for maintaining access, moving laterally, and extracting data in a controlled and ethical penetration testing engagement. In this course, Post-exploitation and Lateral Movements for CompTIA PenTest+, you’ll gain the skills required to effectively navigate compromised environments.
First, you’ll learn how to establish and maintain persistence using scheduled tasks, command-and-control frameworks, and rootkits. Next, you’ll explore lateral movement techniques, such as pivoting, service enumeration, and credential dumping, using tools like Mimikatz and Impacket. Finally, you’ll cover staging and exfiltration methods, as well as cleanup and restoration activities to revert changes and preserve evidence.
By the end of this course, you’ll have the knowledge to execute post-exploitation techniques responsibly and effectively, fully preparing you for the CompTIA PenTest+ certification exam.

Files:

[ WebToolTip.com ] Post-exploitation and Lateral Movements for CompTIA Pentest +
  • Get Bonus Downloads Here.url (0.2 KB)
  • ~Get Your Files Here ! 01
    • establishing-a-foothold-persistence-techniques-slides.pdf (4.9 MB)
    02
    • expanding-reach-lateral-movement-techniques-slides.pdf (4.6 MB)
    03
    • stealing-the-crown-jewels-staging-and-exfiltration-slides.pdf (3.9 MB)
    04
    • cleanup-and-restoration-slides.pdf (3.0 MB)
    1-Establishing a Foothold Persistence Techniques
    • 1 -Scheduled Tasks, Cron Jobs, and Service Creation.mp4 (58.3 MB)
    • 2 -Reverse Shells.mp4 (31.1 MB)
    • 3 -Bind Shells.mp4 (2.9 MB)
    • 4 -Advanced Tools for Shells.mp4 (38.2 MB)
    • 5 -Adding Accounts and Using C2 Frameworks.mp4 (17.3 MB)
    • 6 -Backdoors and Rootkits.mp4 (28.0 MB)
    • 7 -Browser Extensions and Security Controls.mp4 (8.9 MB)
    2-Expanding Reach Lateral Movement Techniques
    • 10 -Enumeration.mp4 (21.0 MB)
    • 11 -Windows Management Instrumentation (WMI).mp4 (25.3 MB)
    • 12 -Other Lateral Movement Tools.mp4 (20.6 MB)
    • 8 -Moving Laterally.mp4 (34.9 MB)
    • 9 -Demo SShuttle.mp4 (6.4 MB)
    3-Stealing the Crown Jewels Staging and Exfiltration
    • 13 -File Encryption and Compression.mp4 (37.8 MB)
    • 14 -Covert Channels and Email.mp4 (24.2 MB)
    • 15 -Cloud Vectors.mp4 (29.0 MB)
    • 16 -File-based Exfiltration Vectors.mp4 (36.9 MB)
    4-Cleanup and Restoration
    • 17 -Remove Persistence Mechanisms.mp4 (31.7 MB)
    • 18 -Configuration Changes.mp4 (19.7 MB)
    • 19 -Closing the Loop Cleanup, Documentation, and Data Security.mp4 (37.5 MB)
    • Bonus Resources.txt (0.1 KB)

Code:

  • udp://tracker.torrent.eu.org:451/announce
  • udp://tracker.tiny-vps.com:6969/announce
  • http://tracker.foreverpirates.co:80/announce
  • udp://tracker.cyberia.is:6969/announce
  • udp://exodus.desync.com:6969/announce
  • udp://explodie.org:6969/announce
  • udp://tracker.opentrackr.org:1337/announce
  • udp://9.rarbg.to:2780/announce
  • udp://tracker.internetwarriors.net:1337/announce
  • udp://ipv4.tracker.harry.lu:80/announce
  • udp://open.stealth.si:80/announce
  • udp://9.rarbg.to:2900/announce
  • udp://9.rarbg.me:2720/announce
  • udp://opentor.org:2710/announce