7 Part 2: Attacks and Exploits Chapter 5: Exploiting Systems Exploiting Systems with Metasploit Understanding Social Engineering Looking at Attacks on Physical Security Common Attack Techniques Exploiting Network-Based Vulnerabilities Exploiting Local Host Vulnerabilities Lab Exercises Reviewing Key Concepts Prep Test Answers Chapter 6: Exploiting Wireless Vulnerabilities Understanding Wireless Terminology Introducing Wireless Standards Looking at Wireless Configuration and Troubleshooting Implementing Wireless Security Practices Exploiting Wireless Vulnerabilities Lab Exercises Reviewing Key Concepts Prep Test Answers Chapter 7: Exploiting Application-Based Vulnerabilities Looking at Common Application-Based Attacks Understanding Application Security Vulnerabilities Identifying Unsecure Coding Practices Secure Coding Best Practices Lab Exercises Reviewing Key Concepts Prep Test Answers
8 Part 3: Post-Exploitation and Reporting Chapter 8: Understanding Post-Exploitation Actions Common Post-Exploitation Tasks Performing Lateral Movement Maintaining Access (Persistence) Covering Your Tracks Lab Exercises Reviewing Key Concepts Prep Test Answers Chapter 9: Common Penetration Testing Tools Understanding Use Cases for Common Pentest Tools Looking at Common Pentest Tools Analyzing Tool Output Lab Exercises Reviewing Key Concepts Prep Test Answers Chapter 10: Analyzing Script Functionality Reviewing Scripting Concepts Using Bash Scripting Understanding Python Scripting Working with Ruby Scripting Coding in PowerShell Scripting Lab Exercises Reviewing Key Concepts Prep Test Answers Chapter 11: Reporting and Communication Communicating During a PenTest Findings and Remediations Focusing Your Remediation Strategies Writing