Carmelo Vazquez
Skillsoft issued completion badges are earned based on viewing the percentage required or receiving a passing score when assessment is required. Conducting host-based attacks during a penetration testing (pen testing) exercise requires careful planning and authorization to ensure it's done ethically and legally. Penetration testers need to be aware of the multitude of host based attack types and how to execute them using the appropriate tools.
In this course, you'll explore a variety of host based attacks including privileged escalation, credential dumping, misconfigured endpoints, payload obfuscation, shell escape, kiosk escape, and log tampering. Next, you'll explore tools used to carry out host-based attacks including Mimikatz, Rubeus, Certify, Seatbelt, PowerShell, PsExec, Evil-WinRM, and Living Off the Land.
This course is one of a collection that helps prepare learners for the CompTIA PenTest+ (PT0-003) certification exam.
Issued on
April 23, 2025
Expires on
Does not expire