Author Archives: blog_admin

CompTIA Pentest+ PT0-002 – Section 7: Nmap Part 1

55. Nmap (OBJ 2.3 and 2.4) In this section of the course, we’re going to cover Nmap, which is an extremely versatile security tool that can be used to conduct active reconnaissance, enumeration, and even some basic vulnerability scanning when you use the Nmap scanning engine or NSE. Because of this, Nmap really does fit… Read More »

CompTIA Pentest+ PT0-002 – Section 6: Vulnerability Scanning Part 2

>51. Scanning Considerations (OBJ 2.3 and 2.4) There are several scanning considerations that need to be made before you start running a vulnerability scanner, like Nmap, OpenVAS, Nessus, or Nikto. Now these considerations include things like the time to run the scans, the protocols to scan, the topology of the network, the bandwidth limitations you… Read More »

CompTIA Pentest+ PT0-002 – Section 6: Vulnerability Scanning Part 1

48. Vulnerability Scanning (OBJ 2.3 and 2.4) In this section of the course, we’re going to discuss vulnerability scanning. This is going to be the second part of the information gathering and vulnerability scanning stage of our engagement. Up until this point, we’ve conducted both passive and active reconnaissance, but now we’re going to try… Read More »

CompTIA Pentest+ PT0-002 – Section 5: Active Reconnaissance Part 6

47. Networking Traffic Analysis (OBJ 2.3) In this lesson, we’re going to conduct some basic network traffic analysis. Now, for the exam, you need to be able to understand how to analyze the results of a reconnaissance exercise as you look at network traffic. You can do this either using Wireshark or tcpdump, or some… Read More »

CompTIA Pentest+ PT0-002 – Section 5: Active Reconnaissance Part 5

45. Wardriving (OBJ 2.2) Another form of active reconnaissance is known as wardriving. Now, wardriving is specifically focused against wireless networks. Wardriving involves driving around near a facility to detect if there are any wireless networks that you might be able to attack as part of your attack and exploitation phrase. Now often, wardriving was… Read More »

CompTIA Pentest+ PT0-002 – Section 5: Active Reconnaissance Part 4

43. Packet Crafting (OBJ 2.2) As a penetration tester, you’ll often find that there are times where you need to manipulate the way TCP/IP works in a given network. When we do this manipulation we call it packet crafting. Packet crafting is a technique that allows someone to generate a network packet with a specific… Read More »

CompTIA Pentest+ PT0-002 – Section 5: Active Reconnaissance Part 3

41. Website Reconnaissance (OBJ 2.3) There are a lot of websites available online and many organizations are seriously invested in their websites to reach new customers or to sell their products to their existing customers. For this reason, you’re often going to find yourself conducting a lot of penetration tests and engagements that involve website… Read More »

CompTIA Pentest+ PT0-002 – Section 5: Active Reconnaissance Part 2

39. Conducting Enumeration (OBJ 2.3) In this video, I’m going to demonstrate how to use Zenmap to conduct scanning and enumeration. For this example, I am connected directly to the local area network of my victim machines. So now Zenmap pops up and we can start doing our scans. The first scan we want to… Read More »

CompTIA Pentest+ PT0-002 – Section 5: Active Reconnaissance Part 1

37. Active Reconnaissance (OBJ 2.2 and 2.3) In this section of the course, we’re going to discuss Active Reconnaissance. Now, as we continue to move forward with information gathering and vulnerability scanning, we’re going to find that we’re going to move from being passive to active in our information gathering. Active reconnaissance is a type… Read More »

CompTIA Pentest+ PT0-002 – Section 4: Passive Reconnaissance Part 6

34. URL Analysis (OBJ 2.1) URL analysis. Now, at this point in your career, you should know what a URL is. A URL is a uniform resource locator. It’s that little address that you type and the top of your web browser to get to diontraining.com or comtia.org or whatever other website you want to… Read More »

img