Attacks and Exploits

Execute network, authentication, host-based, web application, cloud-based, and AI attacks using appropriate tools and techniques (35% of exam).

5 minutes 5 Questions

In the context of the CompTIA PenTest+ certification, understanding the distinction and relationship between attacks and exploits is fundamental to the vulnerability assessment and penetration testing lifecycle. An **exploit** is a specific piece of software, a chunk of data, or a sequence of comma…

Concepts covered
VLAN hopping attacksOn-path attacks (MITM)ARP spoofing and poisoningDNS poisoning attacksService exploitationNetwork protocol attacksWireless network attacksBluetooth attacksLLMNR/NBT-NS poisoningBrute-force attacksPassword sprayingCredential stuffingPass-the-hash attacksPass-the-ticket attacksKerberoastingAS-REP roastingGolden ticket attacksSilver ticket attacksNTLM relay attacksPrivilege escalation techniquesWindows privilege escalationLinux privilege escalationProcess injectionDLL hijackingCredential dumpingMimikatz usageToken manipulationUAC bypass techniquesLiving off the land binaries (LOLBins)SQL injection attacksCross-site scripting (XSS)Cross-site request forgery (CSRF)Directory traversal attacksFile inclusion vulnerabilitiesCommand injectionServer-side request forgery (SSRF)XML external entity (XXE) attacksInsecure deserializationAuthentication bypass techniquesSession hijackingCookie manipulationAPI security testingREST API vulnerabilitiesGraphQL security issuesAPI authentication attacksRate limiting bypassCloud penetration testingContainer escape attacksMetadata service attacksIAM misconfiguration exploitationS3 bucket misconfigurationAzure security testingAWS security testingKubernetes security attacksServerless function attacksAI system attack vectorsPrompt injection attacksModel manipulation attacksAI data poisoningAdversarial machine learningIoT penetration testingEmbedded device attacksFirmware analysisHardware hacking basicsMetasploit frameworkCobalt Strike basicsEmpire frameworkSQLmap usageHydra password crackingJohn the RipperHashcat password crackingResponder toolImpacket toolkitBloodHound for AD
Test mode:
PenTest+ - Attacks and Exploits Example Questions

Test your knowledge of Attacks and Exploits

Question 1

What does the --format flag specify when executing John the Ripper against a hash file?

Question 2

What is the default communication port used by Empire's HTTP listener when establishing initial agent connectivity?

Question 3

Which character sequence is commonly used in directory traversal attacks to reference the parent directory in file path manipulation?

More Attacks and Exploits questions
2207 questions (total)