Complete Post Exploit Tasks
Welcome to the Complete Post Exploit Tasks Practice Lab. In this module, you will be provided with the instructions and devices needed to develop your hands-on skills.
Already have an account? Sign In »

Introduction
Welcome to the Complete Post Exploit Tasks Practice Lab. In this module, you will be provided with the instructions and devices needed to develop your hands-on skills.
Learning Outcomes
In this module, you will complete the following exercises:
- Exercise 1 - Complete Post Exploitation Tasks
After completing this lab, you will be able to:
- Switch Off the Windows Firewall on PLABWIN810
- Start a Meterpreter Session on a Windows System
- Migrate Malicious Code to an Exploited Windows Host
- Start a Keylogger
- Capture Screenshots
- Perform Privilege Escalation -Search for Files
- Enable Remote Desktop
- Find the Installed Applications
- Perform an ARP Scan
- Clear Tracks
Exam Objectives
The following exam objective is covered in this lab:
- PT0-001: 3.7 Given a scenario, perform post-exploitation techniques
Lab Duration
It will take approximately 1 hour to complete this lab.
Exercise 1- Complete Post Exploitation Tasks
First, exploiting a system is not an easy task. You discover a vulnerability but discover that the system that you want to exploit is already updated. You find another method to exploit the system in such cases. After a system has been exploited, the most important tasks of an attacker begin. You could be wanting to extract the information out of the system or perform lateral movement.
There are no hard and fast rules that a specific set of tasks must be performed. For example, you might want to enable remote connection with the exploited system or even start a keylogger so that you can capture critical information. It depends on what your requirements and intentions are. In the end, you want to remain undetected and leave no traces that you were in the system.
In this exercise, you will learn to complete post exploit tasks.
Learning Outcomes
After completing this exercise, you will be able to:
- Switch Off the Windows Firewall on PLABWIN810
- Start a Meterpreter Session on a Windows System
- Migrate Malicious Code to an Exploited Windows Host
- Start a Keylogger
- Capture Screenshots
- Perform Privilege Escalation
- Search for Files
- Enable Remote Desktop
- Find the Installed Applications
- Perform an ARP Scan
- Clear Tracks
See the full benefits of our immersive learning experience with interactive courses and guided career paths.