New Training: Post Exploit Activities
In this 6-video skill, CBT Nuggets trainer Bob Salmans explores what activities you’ll be performing once you’ve exploited a target. Once you’ve compromised a single host it’s time to see what that host can communicate with and expand your reach. Watch this new CompTIA,Cyber Security training.
Watch the full course: CompTIA PenTest+
This training includes:
- 6 videos
- 49 minutes of training
You’ll learn these topics in this skill:
- Establishing Persistence
- Lateral Movement
- Data Exfiltration
- Covering Your Tracks
- Linux Post Exploit Activities
- Windows Post Exploit Activities
How Can Post-Exploit Activities Enhance the Effectiveness of PenTesting?
Penetration Testing is one of the most valuable strategies organizations can leverage to expose unknown vulnerabilities within their environment. At a high-level, the intention of pentesting is to use hacking strategies to reveal vulnerabilities within an organization so that the organization can make remediations to fix those vulnerabilities. However, once these vulnerabilities are exposed, what's next?
Post-exploit pentesting is the next step in penetration testing that looks to expose how deep a pentester can navigate an internal IT environment undetected by IT admins and security solutions in the environment. This next step in the penetration testing strategy can be extremely valuable to organizations as it can expose a great number of vulnerabilities and expose how malicious users may gain access to an organization's environment completely undetected.
A wide range of organizations are now adopting these additional measures in the PenTesting process to not only assess the initial vulnerability of their environment but to also assess how much damage a hacker could pose once gaining entry to their environment.