CompTIA PenTest+: Network-Based Exploits


Overview/Description
Expected Duration
Lesson Objectives
Course Number
Expertise Level



Overview/Description

Discover how to exploit vulnerabilities in wired and wireless networks that take advantage of weaknesses at several layers of the OSI model. During this course, you will explore name resolution, SMB, FTP, DNS, and pass the hash exploits, as well as denial-of-service, NAC bypass and VLAN hopping. Other topics include evil twin, bluejacking, bluesnarfing, cloning, jamming, man-in-the-middle, and repeating. This course can be used as part of the preparation for the PT0-001: CompTIA PenTest+ certification exam. As a review exercise, you will name four weaknesses or specific attacks on WEP, list four scanner SMB auxiliary Metasploit modules, and list four of the five top DNS attacks during 2017/2018.



Expected Duration (hours)
1.3

Lesson Objectives

CompTIA PenTest+: Network-Based Exploits

  • compare name resolution and SMB exploits
  • exploit SNMP and SMTP protocols
  • describe FTP and DNS exploits
  • define pass the hash
  • describe man-in-the-middle attacks
  • classify denial-of-service exploits
  • describe NAC bypass and VLAN hopping
  • describe evil twin and deauthentication
  • classify fragmentation and WPS exploits
  • compare bluejacking to bluesnarfing
  • identify cloning, jamming, and repeating
  • describe network exploits
  • Course Number:
    it_cspent_06_enus

    Expertise Level
    Intermediate