Checklist

Certification

You will get a certificate on completing this course.

University

This course is not affiliated with any university.

Price

This course costs very less.

Edvicer's Rewards

You can get a cashback of ₹ 100 on buying this course.

Post Exploitation: Performing Infrastructure Analysis

Post Exploitation: Performing Infrastructure Analysis

1425/month
Start anytime
Self paced
English
Course by
PluralsightCourses from Pluralsight
Certificate awarded
Intermediate
Login to earn ₹ 100

Limited Time Discount Offers

Save your money with Edvicer. Check out our premium courses with discount offers.

Discount offers - Edvicer

Limited Time Discount Offers

Save your money with Edvicer. Check out our premium courses with discount offers.

Map your Career

Not sure which job profiles this course will open for you? Check out our AI based tool to get a complete personalized career map.

Career Mapper - Edvicer

Map your Career

Not sure which job profiles this course will open for you? Check out our AI based tool to get a complete personalized career map.

Checklist

Certification

You will get a certificate on completing this course.

University

This course is not affiliated with any university.

Price

This course costs very less.

Edvicer's Rewards

You can get a cashback of ₹ 100 on buying this course.

Why should you choose this course?

Description

Everything that comes after the shell during a penetration test is called post exploitation. This course introduces post exploitation and performing infrastructure analysis through service and configuration enumeration in a compromised network.

Syllabus

Course Overview
Introduction
Demo - Setting up Your Virtual Lab
Revisiting the Rules of Engagement
Summary
Introduction and Overview
Demo Overview
Network Interfaces
Routing
The ARP Table
DNS Servers
Cached DNS Entries
Proxy Servers
Summary
Introduction and Overview
PowerShell Scripting
PowerView
A Custom Script for Windows
A Pre-installed Script on Windows
LinEnum
A Custom Script for Linux
Summary
Introduction and Overview
What Is a Network Service?
Identifying Listening Services
Identifying VPN Connections
Identifying Directory Services
Who's Next Door? Identifying Network Neighbors
Summary
Course Summary

What others say about this course

Write your review of Post Exploitation: Performing Infrastructure Analysis

Facebook account of EdvicerLinkedin account of EdvicerInstagram account of Edvicer
Twitter account of EdvicerPinterest account of EdvicerYoutube account of Edvicer