Exploiting Discovered Vulnerabilities
Welcome to the Exploiting Discovered Vulnerabilities Practice Lab. In this module, you will be provided with the instructions and devices needed to develop your hands-on skills.

Introduction
Welcome to the Exploiting Discovered Vulnerabilities Practice Lab. In this module, you will be provided with the instructions and devices needed to develop your hands-on skills.
Learning Outcomes
In this module, you will complete the following exercises:
- Exercise 1 - Exploiting Discovered Vulnerabilities
After completing this lab, you will be able to:
- Switch Off the Windows Firewall on PLABWIN810
- Perform Lateral Movement with Named Pipes
- Create a Persistent Backdoor
- Explain Pivoting
Exam Objectives
The following exam objectives are covered in this lab:
- PT0-001: 2.4 Explain the process of leveraging information to prepare for exploitation
- PT0-001: 3.5 Given a scenario, exploit local host vulnerabilities
- PT0-001: 4.2 Compare and contrast various use cases of tools
Lab Duration
It will take approximately 1 hour to complete this lab.
Exercise 1- Exploiting Discovered Vulnerabilities
After you have established the initial connection with the victim’s system, you should be able to exploit the vulnerabilities. For example, you can exploit the SMB vulnerabilities or any application-specific vulnerabilities. You should be able to perform several tasks, such as deploying a backdoor for the current session or even deploy a persistent backdoor. Pivoting is another major task that can be accomplished if you get hold of the right system.
In this exercise, you will learn about exploiting discovered vulnerabilities.
Learning Outcomes
After completing this exercise, you will be able to:
- Switch Off the Windows Firewall on PLABWIN810
- Perform Lateral Movement with Named Pipes
- Create a Persistent Backdoor
- Explain Pivoting
See the full benefits of our immersive learning experience with interactive courses and guided career paths.