Movement, Pivoting, and Persistence

Wishlist Share
Share Course
Page Link
Share On Social Media

About Course

Movement, Pivoting, and Persistence for Pentesters and Ethical Hackers is the next step in YOUR penetration testing and ethical hacking journey.

Most engagements are conducted remotely, meaning that the tester must have the ability to move about freely from outside of the network into it. We do this using various techniques. Some of the simplest can be utilizing a compromised password to access a desktop environment via remote desktop and attempting to access other machines with those credentials. More complicated techniques include utilizing compromised endpoints to act as a proxy for us, forwarding traffic from internal targets back to our own.

MP&P will cover topics such as:

  • Username and Password List Generation
  • Password Spraying
  • Email Phishing
  • Command and Control (C2)
  • Credential Harvesting and Passing
  • Routing, Port Forwarding, SOCKS Proxies, and Bind Usage
  • Offensive PowerShell
  • How the Misconfigurations We See in Real Pentests Happen
  • Common Remediation Strategies You Can Use to Report to Clients
Show More

Course Content

First Section

  • Introduction
    03:16
  • Course Discord and Share Drive

Lab Setup

Introduction to Command and Control

Student Ratings & Reviews

No Review Yet
No Review Yet