Complete Post Exploit Tasks

Practice Labs Module
Time
57 minutes
Difficulty
Intermediate

Welcome to the Complete Post Exploit Tasks Practice Lab. In this module, you will be provided with the instructions and devices needed to develop your hands-on skills.

Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Overview

Introduction

Welcome to the Complete Post Exploit Tasks Practice Lab. In this module, you will be provided with the instructions and devices needed to develop your hands-on skills.

Learning Outcomes

In this module, you will complete the following exercises:

  • Exercise 1 - Complete Post Exploitation Tasks

After completing this lab, you will be able to:

  • Switch Off the Windows Firewall on PLABWIN810
  • Start a Meterpreter Session on a Windows System
  • Migrate Malicious Code to an Exploited Windows Host
  • Start a Keylogger
  • Capture Screenshots
  • Perform Privilege Escalation

-Search for Files

  • Enable Remote Desktop
  • Find the Installed Applications
  • Perform an ARP Scan
  • Clear Tracks

Exam Objectives

The following exam objective is covered in this lab:

  • PT0-001: 3.7 Given a scenario, perform post-exploitation techniques

Lab Duration

It will take approximately 1 hour to complete this lab.

Exercise 1- Complete Post Exploitation Tasks

First, exploiting a system is not an easy task. You discover a vulnerability but discover that the system that you want to exploit is already updated. You find another method to exploit the system in such cases. After a system has been exploited, the most important tasks of an attacker begin. You could be wanting to extract the information out of the system or perform lateral movement.

There are no hard and fast rules that a specific set of tasks must be performed. For example, you might want to enable remote connection with the exploited system or even start a keylogger so that you can capture critical information. It depends on what your requirements and intentions are. In the end, you want to remain undetected and leave no traces that you were in the system.

In this exercise, you will learn to complete post exploit tasks.

Learning Outcomes

After completing this exercise, you will be able to:

  • Switch Off the Windows Firewall on PLABWIN810
  • Start a Meterpreter Session on a Windows System
  • Migrate Malicious Code to an Exploited Windows Host
  • Start a Keylogger
  • Capture Screenshots
  • Perform Privilege Escalation
  • Search for Files
  • Enable Remote Desktop
  • Find the Installed Applications
  • Perform an ARP Scan
  • Clear Tracks
Learning Partner
Comprehensive Learning

See the full benefits of our immersive learning experience with interactive courses and guided career paths.