Pentest+ Study
Security Tools
- Scanners
- Credential Testing Tools
- Debuggers
- Software Assurance
- OSINT
- Wireless
- Social Engineering Tools
- Web Proxies
- Remote Access Tools
- Network Tools
- Mobile Tools
- Misc
Attacks and Exploits
- Social Engineering Attacks
- Phishing
- Elicitation
- Interrogation
- Impersonation
- Shoulder Surfing
- USB Key Drop
- Motication Techniques
- Network-Based Vulnerabilities
- Name Resolution Exploits
- SMB Exploits
- SNMP Exploits
- SMTP Exploits
- FTP Exploits
- DNS Cache Poinsoning
- Pass The Hash
- Man-In-The-Middle
- DoS/Stress Test
- NAC Bypass
- VLAN Hopping
- Wireless and RF-Based Vulnerabilities
- Evil Twin
- Deauthentication Attacks
- Fragmentation Attacks
- Credential Harvesting
- WPS Implementation Weakness
- Bluejacking
- Bluesnarfing
- RFID Cloning
- Jamming
- Repeating
- Application-Based Attacks
- OS Vulnerabilities
- Unsecure Service and Protocol Configurations
- Privilege Escalation
- Linux-Specific
- Windows-Specific
- Cpassword
- Clear Text Credentials in LDAP
- Kerberoasting
- Credentials in LSASS
- Unattended Installation
- SAM Database
- DLL Hijacking
- Exploitable Services
- Unsecure File/Folder Permissions
- Keylogger
- Scheduled Tasks
- Kernel Exploits
- Default Account Settings
- Sandbox Escape
- Physical Device Security
- Piggybacking/Tailgating
- Fence Jumping
- Dumpster Diving
- Lock Picking
- Lock Bypass
- Egress Sensor
- Badge Cloning