Hacker Kayra
  • 📍Introduction Page
  • ⭐Learning Process
    • 🧠Learning Mindset
    • 🖇️Learning Dependencies
    • 🧮Learning Process
  • 🔠Fundamentals
    • 🛜Networking Fundamentals
    • 🐧Linux Fundamentals
    • 🪟Windows Fundamentals
    • 🕵️Active Directory
    • 🕸️Introduction to Web Applications
    • 🗃️Other Useful Concepts
      • Regular Expressions (RegEx)
    • Cyber Security Products
      • Lab Setup
      • ✅Fortigate Firewall
      • MDM Lab
      • IAM Lab
      • PAM Lab
      • DLP Lab
  • 🧰Tools
    • Nmap
    • Nessus
    • Ffuf
    • Hydra
    • John The Ripper
  • ✍️Write Ups
    • 🗃️Hack The Box Machines
      • 🐧Linux
        • Code
    • 🗃️Proving Grounds Boxes
      • 🐧Linux
        • Stapler
        • eLection
        • Loly
        • Blogger
        • Potato
        • Amaterasu
        • Exfiltrated
        • Pelican
        • Astronaut
        • Cockpit
        • Levram
        • Extplorer
        • LaVita
        • pc
        • Scrutiny
        • Zipper
        • Flu
        • Twiggy
        • Codo
        • Crane
        • Hub
        • BlackGate
        • Boolean
        • ClamAV
        • PayDay
        • Snookums
        • Bratarina
        • Nibbles
      • 🪟Windows
        • Algernon
        • AuthBy
        • Craft
        • Kevin
        • Squid
        • Jacko
        • DVR4
        • Hepet
        • Shenzi
        • Nickel
        • Slort
        • MedJed
        • Active Directory
          • Access
          • Vault
    • 🪪Certificates
      • Certified Professional Penetration Tester (eCPPTv3)
      • Web Application Penetration Tester eXtreme (eWPTXv3)
    • 🚩CTF Events
      • Cyber Hub 2025 CTF
  • 📚Study Notes
    • Penetration Tester (HTB CPTS)
      • Penetration Testing Process
      • Reconnaissance, Enumeration & Attack Planning
        • Network Enumeration with Nmap (Continue Here)
        • Footprinting (Just Do Formatting)
        • Vulnerability Scanning (Check)
        • File Transfers
        • Using the Metasploit Framework
        • Web Information Gathering
        • Shells & Payloads
      • Exploitation & Lateral Movement
        • Attacking Common Services (Just Do Formatting)
        • Password Attacks
        • Active Directory Enumeration & Attacks (TBC)
        • Pivoting, Tunneling, and Port Forwarding
      • Web Exploitation
        • Using Web Proxies (Check)
        • Attacking Web Applications With Ffuf (Check)
        • Login Bruteforcing
        • Cross-Site Scripting (XSS)
        • Command Injection
        • SQL Injection
        • File Upload Attacks
        • File Inclusion
        • Web Attacks (Check)
        • Attacking Common Applications (Check)
      • Post-Exploitation
        • Linux Privilege Escalation
        • Windows Privilege Escalation (TBC)
      • Documentation & Reporting
  • 🧑‍💻Other
    • Leet Code
      • Quick Guide: Big-O Notation
      • Problem 01 - Two Sum
    • Data Structure & Algorithms (DSA)
  • 🗄️Archive/Backup/Bin
    • Sysmon Usecases (IBM)
    • 🐧Linux Fundamentals (TryHackMe)
      • Introduction
      • Basic Commands
      • Wildcards & Operators
      • Permissions
      • Common Directories
      • Terminal Text Editors
      • General/Useful Utilities
    • 🪟Windows Fundamentals (TryHackMe)
      • Introduction
      • The File System
      • User Accounts
      • Settings & Control Panel & Task Manager
      • System Configuration
    • Active Directory (TryHackMe)
      • Breaching Active Directory
    • FOR508: Advanced Incident Response, Threat Hunting, and Digital Forensics
      • Book 2 - Intrusion Analysis
        • Credential Theft
        • Event Log Analysis for Responders and Hunters
    • Certified Threat Hunting Professional (eCTHPv2)
      • Threat Hunting: Hunting the Endpoint & Endpoint Analysis
        • Event IDs, Logging, & SIEMs
    • OSCP
      • Report Writing
      • ✅Passive Information Gathering
      • ✅Active Information Gathering
      • ✅Vulnerability Scanning
      • Introduction to Web Application Attacks
      • Common Web Application Attacks
        • ✅Cross-Site Scripting (XSS)
        • ✅Directory Traversal
        • ✅File Inclusion
        • ✅File Upload Vulnerabilities
        • Command Injection
        • SQL Injection Attacks
        • Client Side Attacks
      • ✅Locating Public Exploits
      • ✅Exploiting Walkthrough
      • Fixing Exploits
      • ✅Antivirus Evasion
      • Password Attacks
      • Windows Privilege Escalation
      • Linux Privilege Escalation
      • Port Redirection and SSH Tunneling
      • Tunneling Through Deep Packet Inspection
      • The Metasploit Framework
      • Active Directory Introduction & Enumeration
      • Attacking Active Directory Authentication
      • Lateral Movement in Active Directory
      • Assembling the Pieces
      • Other General Information
    • ⚡Port Swigger (Web Penetration Testing)
      • ✅Information Disclosure
      • ✅Path Traversal (Directory Traversal)
      • ✅OS Command Injection
      • Business Logic Vulnerabilities
      • ✅Authentication
      • ✅Access Control
    • Certified Bug Bounty Hunter (CBBH)
      • Web Requests
        • HTTP Fundamentals
    • Getting Started
      • Introduction
      • Pentesting Basics
    • Certified Penetration Testing Specialist (CPTS)
      • Introduction
        • ✅Penetration Testing Process
          • Penetration Testing Overview
          • Laws & Regulations
          • Penetration Testing Process
          • Pre-Engagement
          • Information Gathering
          • Vulnerability Assessment
          • Exploitation
          • Post-Exploitation
          • Lateral Movement
          • Proof-of-Concept
          • Post-Engagement
          • Practice
          • Academy Module Layout
        • Getting Started with Hack The Box (HTB)
      • Reconnaissance, Enumeration & Attack Planning
        • ✅Network Enumeration with Nmap
          • Enumeration & Introduction to Nmap
          • Host Discovery
          • Host and Port Scanning
          • Saving The Results
          • Service Enumeration
          • Nmap Scripting Engine
          • Scanning Performance
          • Firewall and IDS/IPS Evasion
        • Footprinting
        • ✅Information Gathering - Web Edition
          • Introduction
          • Passive Information Gathering
          • Active Information Gathering
        • Vulnerability Assessment
        • File Transfers
        • Shells & Payloads
        • Using the Metasploit Framework
      • Exploitation & Lateral Movement
        • Password Attacks
        • Attacking Common Services
        • Pivoting, Tunneling, and Port Forwarding
        • Active Directory Enumeration & Attacks
      • Web Exploitation
        • Using Web Proxies
        • ✅Attacking Web Applications with Ffuf
        • ✅Login Brute Forcing
        • SQL Injection Fundamentals
        • SQLMap Essentials
        • Cross-Site Scripting (XSS)
        • File Inclusion
        • File Upload Attacks
        • Command Injections
        • Web Attacks
        • Attacking Common Applications
      • Post-Exploitation
        • Linux Privilege Escalation
        • Windows Privilege Escalation
      • Reporting & Capstone
        • Documentation & Reporting
        • Attacking Enterprise Networks
    • Old Active Directory
    • Tib3rius Privilege Escalation
      • Linux Privilege Escalation
    • HTB Archived Write-Ups (Check)
      • Irked
      • Nibbles
      • Brainfuck
      • Lame (Check)
    • 📋Cheat Sheets
      • Penetration Testing Cheat Sheet (In Progress)
Powered by GitBook
On this page
  • Exam Structure & Logistics
  • Preparation: How I (Barely) Survived
  • The Ride
  • Struggles
  • Advice for Future Test-Takers
  • Final Thoughts
  1. Write Ups
  2. Certificates

Certified Professional Penetration Tester (eCPPTv3)

Exam Structure & Logistics

  • 24-hour marathon: 45 questions split between MCQs and hands-on challenges.

  • Instant Gratification: Immediate pass/fail verdict after submission (no agonizing wait, at least).

  • Browser-accessed Kali machine. Worked surprisingly well, though it disconnected briefly a few times.

  • Progress saves if you close/reopen the tab, but stopping the lab resets everything.

  • No internet access: Forget apt-get install your_favorite_tool. You’ll be copy-pasting scripts like a medieval scribe.

  • Scattered questions: Questions for the same machine are spread out like breadcrumbs (Q1, Q30, Q45…). I suggest reading all the questions before proceeding, at least, that's what I did.

  • One Dynamic flag: Once submitted, you can't resubmit or edit the flag, as it changes with each lab restart. Other than that, you can freely re-edit answers and navigate through the questions.

Preparation: How I (Barely) Survived

  • I skipped the INE material for preparation. Instead, I followed the Certified Penetration Testing Specialist (CPTS) path from HackTheBox, completing over 50 boxes/labs from Proving Grounds and HackTheBox. This gave me enough confidence to just skim the slides and labs before diving in. Here are the HTB Academy modules that aligned with the test:

    • Network Enumeration with Nmap

    • Using the Metasploit Framework

    • Password Attacks

    • Login Brute Forcing

    • Active Directory Enumeration & Attacks

    • Linux Privilege Escalation

    • Windows Privilege Escalation

  • For privilege escalation, I relied on Tib3rius’s course, which was just excellent.

  • Here’s a rundown of the tools I used during the exam:

    • nmap

    • Hydra

    • WpScan

    • impacket-GetNPUsers

    • crackmapexec

    • Bloodhound

    • impacket-GetADUsers

    • impacket-psexec

    • impacket-wmiexec

  • These tools were critical for enumeration, exploitation, and navigating the exam’s challenges.

The Ride

  • I started the exam sleep-deprived at midday. Don’t follow my lead. By hour 15, I submitted my answers half-conscious, with a few questions left unanswered, my eyes wouldn’t stay open, and my head kept dropping onto the keyboard.

  • The questions were divided equally between Active Directory, Linux, and general topics (some felt like they escaped a CompTIA exam, "Just Google it", without any real connection to the test's context).

  • Non-sequential question arrangement: Questions related to the same machine were scattered (Q1, Q30, Q45…).

  • Two terminals available: Do not use Lxterminal; instead, use QTerminal, which offers better color support and readability.

  • Difficulty level: The Linux questions were similar to medium-rated HackTheBox boxes. I couldn’t complete all the AD questions, so I can’t fully assess that section. However, the ones I attempted were simple and straightforward.

  • Question Wording and Brute-Forcing: The wording often drops hints. For example, a question like, "Which account was exposed using technique X?" tells you to use technique X. Also, brute-forcing was everywhere, I had to crack something at nearly every turn, making it a recurring theme.

Struggles

  • Limited tools: The attack machine lacks some of the tools I usually rely on, as using our own machine isn't allowed.

  • No internet access: Downloading additional tools isn’t possible, you’re stuck with copy-pasting simple scripts.

  • Alternative exploits led to dead ends: Sometimes, I exploited a machine through a different vector, but then I couldn't answer the specific question being asked.

Advice for Future Test-Takers

  • Study Active Directory Well: Active Directory is a big deal in this exam. Make sure you understand how it works, how to navigate it, and how to exploit it. It’s not just a buzzword, it’s a core skill here.

  • Be Fluent with Searchsploit: You’ll need to quickly find exploits, and searchsploit is your go-to tool. Practice using it until it’s second nature.

  • Privilege Escalation Techniques: Get comfortable with privilege escalation, knowing how to move from a low-privilege user to owning the system is key. Tib3rius is the OG here; their course is a fantastic resource, so check it out.

  • Bruteforcing Is Your Friend: Don’t hesitate to lean on bruteforcing when needed. It can open doors (sometimes literally) during the exam.

Final Thoughts

  • The videos and slides I skimmed were meh, but I didn’t dive deep, so take that with a grain of salt. I took the eCPPT certificate mainly for the magic CV letters.

  • This exam feels like a middle child: practical enough, but outshined by competitors. The autograded format skips real-world reporting skills, OSCP boasts more recognition, and CPTS offers a tougher, richer learning experience. It’s a solid test, but it’s not the star of the show.

PreviousCertificatesNextWeb Application Penetration Tester eXtreme (eWPTXv3)

Last updated 1 month ago

✍️
🪪
eCPPTv3 Badge