Post-exploitation and Lateral Movements for CompTIA Pentest +
- CategoryOther
- TypeTutorials
- LanguageEnglish
- Total size526 MB
- Uploaded Byfreecoursewb
- Downloads19
- Last checkedApr. 04th '25
- Date uploadedApr. 04th '25
- Seeders 1
- Leechers11
Post-exploitation and Lateral Movements for CompTIA Pentest+
https://WebToolTip.com
Published 3/2025
MP4 | Video: h264, 1920x1080 | Audio: AAC, 48 KHz
Language: English | Size: 526.57 MB | Duration: 1h 28m 10s
This course teaches you how to establish persistence, execute lateral movements, exfiltrate data, and perform cleanup operations, preparing you for the CompTIA PenTest+ exam.
Post-exploitation techniques are critical for maintaining access, moving laterally, and extracting data in a controlled and ethical penetration testing engagement. In this course, Post-exploitation and Lateral Movements for CompTIA PenTest+, you’ll gain the skills required to effectively navigate compromised environments.
First, you’ll learn how to establish and maintain persistence using scheduled tasks, command-and-control frameworks, and rootkits. Next, you’ll explore lateral movement techniques, such as pivoting, service enumeration, and credential dumping, using tools like Mimikatz and Impacket. Finally, you’ll cover staging and exfiltration methods, as well as cleanup and restoration activities to revert changes and preserve evidence.
By the end of this course, you’ll have the knowledge to execute post-exploitation techniques responsibly and effectively, fully preparing you for the CompTIA PenTest+ certification exam.
Files:
[ WebToolTip.com ] Post-exploitation and Lateral Movements for CompTIA Pentest +- Get Bonus Downloads Here.url (0.2 KB) ~Get Your Files Here ! 01
- establishing-a-foothold-persistence-techniques-slides.pdf (4.9 MB)
- expanding-reach-lateral-movement-techniques-slides.pdf (4.6 MB)
- stealing-the-crown-jewels-staging-and-exfiltration-slides.pdf (3.9 MB)
- cleanup-and-restoration-slides.pdf (3.0 MB)
- 1 -Scheduled Tasks, Cron Jobs, and Service Creation.mp4 (58.3 MB)
- 2 -Reverse Shells.mp4 (31.1 MB)
- 3 -Bind Shells.mp4 (2.9 MB)
- 4 -Advanced Tools for Shells.mp4 (38.2 MB)
- 5 -Adding Accounts and Using C2 Frameworks.mp4 (17.3 MB)
- 6 -Backdoors and Rootkits.mp4 (28.0 MB)
- 7 -Browser Extensions and Security Controls.mp4 (8.9 MB)
- 10 -Enumeration.mp4 (21.0 MB)
- 11 -Windows Management Instrumentation (WMI).mp4 (25.3 MB)
- 12 -Other Lateral Movement Tools.mp4 (20.6 MB)
- 8 -Moving Laterally.mp4 (34.9 MB)
- 9 -Demo SShuttle.mp4 (6.4 MB)
- 13 -File Encryption and Compression.mp4 (37.8 MB)
- 14 -Covert Channels and Email.mp4 (24.2 MB)
- 15 -Cloud Vectors.mp4 (29.0 MB)
- 16 -File-based Exfiltration Vectors.mp4 (36.9 MB)
- 17 -Remove Persistence Mechanisms.mp4 (31.7 MB)
- 18 -Configuration Changes.mp4 (19.7 MB)
- 19 -Closing the Loop Cleanup, Documentation, and Data Security.mp4 (37.5 MB)
- Bonus Resources.txt (0.1 KB)
Code:
- udp://tracker.torrent.eu.org:451/announce
- udp://tracker.tiny-vps.com:6969/announce
- http://tracker.foreverpirates.co:80/announce
- udp://tracker.cyberia.is:6969/announce
- udp://exodus.desync.com:6969/announce
- udp://explodie.org:6969/announce
- udp://tracker.opentrackr.org:1337/announce
- udp://9.rarbg.to:2780/announce
- udp://tracker.internetwarriors.net:1337/announce
- udp://ipv4.tracker.harry.lu:80/announce
- udp://open.stealth.si:80/announce
- udp://9.rarbg.to:2900/announce
- udp://9.rarbg.me:2720/announce
- udp://opentor.org:2710/announce