Overview

Introduction

Welcome to the Exploiting Discovered Vulnerabilities Practice Lab. In this module, you will be provided with the instructions and devices needed to develop your hands-on skills.

Learning Outcomes

In this module, you will complete the following exercises:

  • Exercise 1 - Exploiting Discovered Vulnerabilities

After completing this lab, you will be able to:

  • Switch Off the Windows Firewall on PLABWIN810
  • Perform Lateral Movement with Named Pipes
  • Create a Persistent Backdoor
  • Explain Pivoting

Exam Objectives

The following exam objectives are covered in this lab:

  • PT0-001: 2.4 Explain the process of leveraging information to prepare for exploitation
  • PT0-001: 3.5 Given a scenario, exploit local host vulnerabilities
  • PT0-001: 4.2 Compare and contrast various use cases of tools

Lab Duration

It will take approximately 1 hour to complete this lab.

Exercise 1- Exploiting Discovered Vulnerabilities

After you have established the initial connection with the victim’s system, you should be able to exploit the vulnerabilities. For example, you can exploit the SMB vulnerabilities or any application-specific vulnerabilities. You should be able to perform several tasks, such as deploying a backdoor for the current session or even deploy a persistent backdoor. Pivoting is another major task that can be accomplished if you get hold of the right system.

In this exercise, you will learn about exploiting discovered vulnerabilities.

Learning Outcomes

After completing this exercise, you will be able to:

  • Switch Off the Windows Firewall on PLABWIN810
  • Perform Lateral Movement with Named Pipes
  • Create a Persistent Backdoor
  • Explain Pivoting

Comprehensive Learning

See the full benefits of our immersive learning experience with interactive courses and guided career paths.