Hacker Kayra
Ctrlk
  • πŸ“Introduction Page
  • ⭐Learning Process
  • πŸ” Fundamentals
  • 🧰Tools
  • ✍️Write Ups
  • πŸ“šStudy Notes
  • πŸ§‘β€πŸ’»Other
  • πŸ—„οΈArchive/Backup/Bin
    • Sysmon Usecases (IBM)
    • 🐧Linux Fundamentals (TryHackMe)
    • πŸͺŸWindows Fundamentals (TryHackMe)
    • Active Directory (TryHackMe)
    • FOR508: Advanced Incident Response, Threat Hunting, and Digital Forensics
    • Certified Threat Hunting Professional (eCTHPv2)
    • OSCP
    • ⚑Port Swigger (Web Penetration Testing)
    • Certified Bug Bounty Hunter (CBBH)
    • Getting Started
    • Certified Penetration Testing Specialist (CPTS)
      • Introduction
        • βœ…Penetration Testing Process
        • Getting Started with Hack The Box (HTB)
      • Reconnaissance, Enumeration & Attack Planning
      • Exploitation & Lateral Movement
      • Web Exploitation
      • Post-Exploitation
      • Reporting & Capstone
    • Old Active Directory
    • Tib3rius Privilege Escalation
    • HTB Archived Write-Ups (Check)
    • πŸ“‹Cheat Sheets
Powered by GitBook
On this page
  1. πŸ—„οΈArchive/Backup/Bin
  2. Certified Penetration Testing Specialist (CPTS)

Introduction

  • In this learning path, there are a total of 28 modules which are divided into 6 categories,

Introduction
  • Penetration Testing Process

  • Getting Started

Reconnaissance, Enumeration & Attack Planning
  • Network Enumeration with Nmap

  • Footprinting

  • Information Gathering - Web Edition

  • Vulnerability Assessment

  • File Transfers

  • Shells & Payloads

  • Using the Metasploit Framework

Exploitation & Lateral Movement
  • Password Attacks

  • Attacking Common Services

  • Pivoting, Tunneling, and Port Forwarding

  • Active Directory Enumeration & Attacks

Web Explitation
  • Using Web Proxies

  • Attacking Web Applications with Ffuf

  • Login Brute Forcing

  • SQL Injection Fundamentals

  • SQLMap Essentials

  • Cross-Site Scripting (XSS)

  • File Inclusion

  • File Upload Attacks

  • Command Injections

  • Web Attacks

  • Attacking Common Applications

Post-Explitation
  • Linux Privilege Escalation

  • Windows Privilege Escalation

Reporting & Capstone
  • Documentation & Reporting

  • Attacking Enterprise Networks

PreviousCertified Penetration Testing Specialist (CPTS)NextPenetration Testing Process

Last updated 8 months ago