Category Archives: Uncategorized
CompTIA Pentest+ PT0-002 – Section 12: Application Attacks Part 3
116. SQL Injections (OBJ 3.3) In this lesson, we’re going to discuss SQL injection attacks. Now, before we dive into SQL injection attacks though, we need to talk a little bit about SQL in general and provide some background. Now, when you’re dealing with databases, you have to have a way to talk to the… Read More »
CompTIA Pentest+ PT0-002 – Section 12: Application Attacks Part 2
114. Cross-Site Scripting (XXS) (OBJ 3.3) In this lesson, we’re going to discuss cross-site scripting, also known as XSS. Now, cross-site scripting is a malicious script that’s hosted on an attacker site or coded inside of a link that’s injected into a trusted site, designed to compromise the client that is browsing that trusted site.… Read More »
CompTIA Pentest+ PT0-002 – Section 12: Application Attacks Part 1
111. Application Attacks (OBJ 3.3) In this section of the course, we’re going to discuss the different types of application attacks that we can use against web applications to wreck havoc on a target organization’s network. As we move into this section, we’re going to continue looking at various attacks and exploits that we can… Read More »
CompTIA Pentest+ PT0-002 – Section 11: Application Vulnerabilities Part 4
108. Software Composition (OBJ 3.3) In this lesson, we’re going to discuss Software Composition Analysis. Software Composition Analysis describes a process by which software can be analyzed for open-source components because these open-source components could contain vulnerabilities in their source code and those vulnerabilities will then be assumed by our applications when we use those… Read More »
CompTIA Pentest+ PT0-002 – Section 11: Application Vulnerabilities Part 3
105. Improper Headers (OBJ 3.3) In this lesson, we’re going to discuss vulnerabilities associated with improper headers in your web applications. Now, the OWASP Secure Headers Project describes different HTTP response headers that your application can use to increase the security of your application while placing its calls. HTTP response headers are used to control… Read More »
CompTIA Pentest+ PT0-002 – Section 11: Application Vulnerabilities Part 2
102. Buffer Overflows Attacks (OBJ 3.3) In this demonstration, I’m going to show you how a buffer overflow attack is conducted. Now I’m going to do this by using a simple program that’s written here. This program is called narnia0.c. This tells me that the program was written in the C programming language. You can… Read More »
CompTIA Pentest+ PT0-002 – Section 11: Application Vulnerabilities Part 1
99. Application Vulnerabilities (OBJ 3.3) In this section of the course, we’re going to discuss the different vulnerabilities that can affect web applications and how these are exploited by attackers. Now, as we move into this section we’re going to be continuing to look at attacks and exploits that we can use during the third… Read More »
CompTIA Pentest+ PT0-002 – Section 10: Network Attacks Part 5
96. Intro to Metasploit (OBJ 3.1) In this lesson, we’re going to talk about Metasploit which is a multipurpose computer security and penetration testing framework. It contains a lot of great things inside of Metasploit. Now it comes installed by default inside of Kali and Parrot Linux and most other penetration testing distributions, because it… Read More »
CompTIA Pentest+ PT0-002 – Section 10: Network Attacks Part 4
93. On-path Attack (OBJ 3.1) In this lesson, we’re going to very briefly cover the concept of an on-path attack. Now, an on-path attack is an attack where the penetration tester is able to put their workstation logically between two hosts during the communication in order to transparently capture, monitor and relay the communications between… Read More »
CompTIA Pentest+ PT0-002 – Section 10: Network Attacks Part 3
90. MAC Spoofing (OBJ 3.1) Spoofing is a category of network attacks that occurs when an attacker masquerades as another person by falsifying their identity. Just like a person in real life might use a mask to cover their face and hide their true identity, spoofing is the electronic equivalent. Really, anything that identifies a… Read More »