Reviewing the Practical Network Penetration Tester (PNPT) Courses Pt. 6

Let’s dive into the Practical Ethical Hacking — The Complete Course: Attacking Active Directory — Initial Attack Vectors, and Attacking Active Directory — Post Compromise Enumeration The Initial Attack Vectors section starts off with Heath’s overview of what LLMNR (formerly NetBIOS Name Service) is, how it’s used to identify hosts when DNS resolution fails, and…

Read More

Reviewing the Practical Network Penetration Tester (PNPT) Course Pt. 3

Previously I covered the initial sections of the Practical Ethical Hacking — The Complete Course: Before We Begin, and Introduction sections. And last week I covered three sections: Notekeeping, Network Refresher, and Setting Up Our Lab. That review touched on the importance good note-keeping can have when you’re learning material, documenting findings, compiling post-test reports,…

Read More