This section, Attacks and Exploits, focuses on the practical execution of penetration tests. It covers how to exploit vulnerabilities and mimic real-world attacks to understand security weaknesses.
Network attacks target the communication systems and protocols that connect devices. These attacks often exploit weaknesses in how systems communicate with one another.
ARP Spoofing:
DNS Poisoning:
MITM (Man-in-the-Middle):
Replay Attack:
Application attacks target weaknesses in software, especially web applications, APIs, or services. They often exploit improper input validation, authentication, or session management.
SQL Injection (SQLi):
' OR '1'='1 into a login form to bypass authentication.XSS (Cross-Site Scripting):
<script>alert('hacked')</script> into a comment section.CSRF (Cross-Site Request Forgery):
Unauthorized Access:
Exploiting Unvalidated Input Parameters:
Social engineering relies on manipulating people rather than systems to gain access to sensitive information.
Phishing:
Physical Testing:
Post-exploitation refers to actions taken after successfully compromising a system. These steps help attackers deepen access or extract valuable data.
Privilege Escalation:
Lateral Movement:
Data Exfiltration:
Understanding attacks and exploits is essential for simulating real-world threats:
This knowledge area introduces techniques for attacking and exploiting networks, applications, and people. It also emphasizes the importance of post-exploitation steps like privilege escalation and data exfiltration. Mastery of these techniques helps you become a more effective penetration tester while adhering to ethical and legal guidelines.
Understanding how to validate a successful exploit is essential. In the PenTest+ exam and real-world engagements, being able to interpret tool output is just as important as launching the attack.
Scenario: Exploiting a vulnerable FTP service using Metasploit.
msfconsole
use exploit/unix/ftp/vsftpd_234_backdoor
set RHOSTS 192.168.1.100
run
Sample Output (Partial):
[*] Banner: 220 (vsFTPd 2.3.4)
[*] Exploit running as background job.
[*] Triggering backdoor command shell...
[*] Command shell session 1 opened (192.168.1.50:4444 -> 192.168.1.100:6200)
The key indicator is:Command shell session 1 opened
This means a shell has been created on the remote system — you now have code execution.
If Meterpreter is used, you might see:Meterpreter session 1 opened, indicating a more advanced interactive shell.
The exam may ask:
"Which of the following outputs confirms that the attack was successful?"
Being familiar with this style of response from tools like Metasploit, Hydra, or SQLmap will help you choose the correct answer.
Attack types can be overwhelming without a clear taxonomy. This table will help organize the various forms of attacks covered in this module and in the exam.
| Type | Description | Example |
|---|---|---|
| Active Attack | Alters system or data, disrupts operation | MITM, SQL injection |
| Passive Attack | Gathers data without altering systems | Packet sniffing |
| Layer | Example Attacks | Tools Commonly Used |
|---|---|---|
| Network Layer | ARP spoofing, DNS poisoning, MITM | Ettercap, dnsspoof |
| Application Layer | SQL injection, XSS, CSRF | Burp Suite, OWASP ZAP |
| User Layer | Phishing, physical testing, vishing | SET (Social-Engineer Toolkit) |
| Type | Description | Examples |
|---|---|---|
| Static Attack | Targets code or configuration (non-runtime) | Hardcoded credentials, misconfigured headers |
| Dynamic Attack | Targets live execution behavior | Session hijacking, DoS, CSRF |
You may be asked to select:
“Which type of attack involves unauthorized interception of traffic at the network layer?”
Understanding where each attack fits helps eliminate wrong answers quickly and select the right protocols, tools, and methods.
Connecting attack types with the tools used to perform them gives learners a deeper understanding of methodology and tool selection. Here’s a table you can insert into your content:
| Attack Type | Tool Used | Method / Feature Highlighted |
|---|---|---|
| XSS | Burp Suite | Intercept HTTP request and inject <script> |
| SQL Injection | SQLmap | Automated testing of injectable parameters |
| DNS Poisoning | dnsspoof |
ARP + spoof DNS reply to redirect traffic |
| Credential Brute Force | Hydra / Medusa | Multi-protocol brute-force capability |
| MITM (Man-in-the-Middle) | Ettercap | ARP poisoning + traffic injection |
| Phishing | SET (Social Engineering Toolkit) | Email template and payload generator |
| CSRF | OWASP ZAP | Identifies CSRF tokens and simulates actions |
| Area Enhanced | Key Additions |
|---|---|
| Tool Output Interpretation | Example: Metasploit’s “session opened” as success indicator |
| Attack Type Classification | Organized by activity (active/passive), layer (network/app), static/dynamic |
| Tool-to-Attack Mapping | Helps with practical understanding of tool capabilities per exploit type |
During a penetration test, a tester successfully exploits a system and gains limited access. What is the primary objective of the next phase?
Perform post-exploitation activities to expand access and gather additional information.
Post-exploitation occurs after an initial compromise has been achieved. The tester focuses on determining the value of the compromised system and identifying opportunities to escalate privileges or pivot deeper into the network. Activities may include credential harvesting, system enumeration, lateral movement, and persistence techniques. The goal is not simply to maintain access but to understand how far an attacker could realistically move within the environment. This phase helps organizations evaluate the potential impact of a successful breach and identify weaknesses in monitoring and internal segmentation controls.
Demand Score: 88
Exam Relevance Score: 93
Why do penetration testers often use exploitation frameworks such as Metasploit?
Because they provide prebuilt exploits, payloads, and automation for testing vulnerabilities efficiently.
Exploitation frameworks simplify the exploitation process by providing a structured environment for launching attacks against known vulnerabilities. They include databases of exploits, payloads for gaining control of systems, and modules for post-exploitation tasks. Testers can configure targets, select payloads, and execute attacks with reduced manual coding. Frameworks also help standardize testing workflows and allow rapid validation of vulnerabilities identified during scanning or reconnaissance. However, testers must still understand how the exploits function in order to interpret results accurately and avoid false assumptions about vulnerability impact.
Demand Score: 86
Exam Relevance Score: 91
What is the purpose of privilege escalation in a penetration test?
To obtain higher-level system permissions after initial access.
Initial exploitation often results in limited privileges, such as access under a low-privileged user account. Privilege escalation techniques allow the tester to gain administrative or root-level control over the system. This may involve exploiting operating system vulnerabilities, weak permissions, or credential reuse. Higher privileges enable the tester to access sensitive data, install persistence mechanisms, and pivot to other systems in the network. Demonstrating privilege escalation helps organizations understand how a small vulnerability could lead to full system compromise.
Demand Score: 85
Exam Relevance Score: 90
Why might a penetration tester attempt lateral movement within a network?
To access additional systems after compromising an initial host.
Lateral movement allows a tester to explore how attackers could spread through the network once a foothold has been established. By using harvested credentials, network shares, or remote management protocols, the tester can attempt to access other hosts. This phase reveals weaknesses in network segmentation, credential management, and internal monitoring. Successful lateral movement demonstrates how attackers can expand their control beyond the originally compromised system and potentially reach critical assets such as domain controllers or sensitive databases.
Demand Score: 84
Exam Relevance Score: 92
Why are web applications frequently targeted during penetration testing?
Because they are publicly accessible and commonly contain exploitable vulnerabilities.
Web applications often serve as entry points into an organization's infrastructure because they are exposed to the internet and interact with user input. Common vulnerabilities such as injection flaws, authentication weaknesses, and insecure session management can allow attackers to bypass security controls. Testing web applications helps identify weaknesses that could allow unauthorized data access or system compromise. Since many organizations rely heavily on web services, vulnerabilities in these systems often present high-impact security risks.
Demand Score: 83
Exam Relevance Score: 89
Why are social engineering attacks included in penetration testing engagements?
To evaluate the human element of an organization’s security posture.
Technical defenses alone cannot fully protect an organization if employees can be manipulated into revealing sensitive information or performing unsafe actions. Social engineering assessments test whether employees follow security policies when confronted with deceptive communications or requests. Examples include phishing emails, pretexting phone calls, and physical access attempts. These tests help organizations identify weaknesses in security awareness training and internal processes. Addressing human vulnerabilities is essential because attackers frequently exploit people rather than technology to gain initial access.
Demand Score: 82
Exam Relevance Score: 88