Category Archives: Uncategorized
CompTIA Pentest+ PT0-002 – Section 5: Active Reconnaissance Part 1
37. Active Reconnaissance (OBJ 2.2 and 2.3) In this section of the course, we’re going to discuss Active Reconnaissance. Now, as we continue to move forward with information gathering and vulnerability scanning, we’re going to find that we’re going to move from being passive to active in our information gathering. Active reconnaissance is a type… Read More »
CompTIA Pentest+ PT0-002 – Section 4: Passive Reconnaissance Part 6
34. URL Analysis (OBJ 2.1) URL analysis. Now, at this point in your career, you should know what a URL is. A URL is a uniform resource locator. It’s that little address that you type and the top of your web browser to get to diontraining.com or comtia.org or whatever other website you want to… Read More »
CompTIA Pentest+ PT0-002 – Section 4: Passive Reconnaissance Part 5
32. Public Repositories (OBJ 2.1) As you’ve seen by now, data is everywhere online if you just know where to look at it now. Now, some other great places to look when you’re doing your reconnaissance is public source code repositories as well as website archives. Now public source code repositories are websites that allow… Read More »
CompTIA Pentest+ PT0-002 – Section 4: Passive Reconnaissance Part 4
30. DNS Information (OBJ 2.1) There is a lot of information you can gather from the domain name system. Now, we’re going to talk about each of the different record types that we have inside of DNS and the purpose of DNS, but we’re not going to do a really deep, deep dive here because… Read More »
CompTIA Pentest+ PT0-002 – Section 4: Passive Reconnaissance Part 3
28. OSINT Tools (OBJ 2.1) Open-source intelligence tools are used during the reconnaissance phase to find actionable intelligence from various publicly available sources. This intelligence can help the penetration tester to be more precise and targeted in their attack development and future exploits during their engagement. because OSINT is publicly available. You’re not going to… Read More »
CompTIA Pentest+ PT0-002 – Section 4: Passive Reconnaissance Part 2
26. Open-Source Intelligence (OSINT) (OBJ 2.1) There is a lot of great information available online for free that can help you understand how a business or organization is operating. This information is just sitting out there waiting for you to find it. This information is considered open source in the world of information and intelligence… Read More »
CompTIA Pentest+ PT0-002 – Section 4: Passive Reconnaissance Part 1
24. Passive Reconnaissance (OBJ 2.1) In this section of the course, we’re going to discuss Passive Reconnaissance. As we move from our planning and scoping phase of our penetration test, we find ourselves in the second stage of the engagement, Information Gathering and Vulnerability Scanning. During this stage, we’re going to be focused on conducting… Read More »
CompTIA Pentest+ PT0-002 – Section 3: Scooping an Engagement Part 5
22. Limitations and Permission (OBJ 1.1 and OBJ 1.3) During your penetration test, you may also find a lot of confidential information about the target organization. Remember, it is your responsibility to safeguard this information, and if you’re able to access an area of their network you think you shouldn’t be in, it’s important to… Read More »
CompTIA Pentest+ PT0-002 – Section 3: Scooping an Engagement Part 4
20. Assessment Types (OBJ 1.2) There are many different types of penetration tests and assessments, including goals-based, objectives-based, compliance-based, premerger, supply chain and red team assessments. A goals-based assessment is designed with a specific goal in mind. In this case, the penetration tester may attempt to define as many unique ways as possible to achieve… Read More »
CompTIA Pentest+ PT0-002 – Section 3: Scooping an Engagement Part 3
18. Identifying Restrictions (OBJ 1.2) Every organization has a different risk tolerance threshold. This risk tolerance threshold will become a big point of contention during the planning of the timing, the tempo, and the scope of your engagement. If the organization is quite risk averse, you’re going to need to be extra careful not to… Read More »