eCPPTv3-PTP-Notes
HomeGitHubPortfolioTwitter/XMediumCont@ct
  • πŸ“eCPPT / PTP - Notes
    • eCPPTv3
      • 1️⃣1 - Resource Development & Initial Access
        • 1.1 - PowerShell for Pentesters
        • 1.2 - Client-Side Attacks
          • 1.2.1 - System/Host Based Attacks
            • 1.2.1.1 Windows Vulnerabilities
          • 1.2.2 - The Metasploit Framework (MSF)
            • 1.2.2.1 MSF Introduction
            • 1.2.2.2 Information Gathering & Enumeration
            • 1.2.2.3 Vulnerability Scanning
            • 1.2.2.4 Client-Side Attacks
            • 1.2.2.5 Post Exploitation
            • 1.2.2.6 Armitage
          • 1.2.3 Exploitation
          • 1.2.4 Social Engineering
      • 2️⃣2 - Web Application Penetration Testing
        • 2.1 - Web App Concepts
          • 2.1.1 HTTP/S Protocol
          • 2.1.2 Encoding
          • 2.1.3 Same Origin
          • 2.1.4 Cookies
          • 2.1.5 Session
          • 2.1.6 Web App Proxies
        • 2.2 - Information Gathering
          • 2.2.1 Gathering Information on Your Targets
          • 2.2.2 Infrastructure
          • 2.2.3 Fingerprinting Frameworks and Applications
          • 2.2.4 Fingerprinting Custom Applications
          • 2.2.5 Enumerating Resources
          • 2.2.6 Information Disclosure Through Misconfiguration
          • 2.2.7 Google Hacking
          • 2.2.8 Shodan HQ
        • 2.3 - Cross Site Scripting
          • 2.3.1 XSS Anatomy
          • 2.3.2 Reflected XSS
          • 2.3.3 Stored XSS
          • 2.3.4 DOM-Based XSS
          • 2.3.5 Identifying & Exploiting XSS with XSSer
        • 2.4 - SQL Injection
          • 2.4.1 Introduction to SQL Injection
          • 2.4.2 Finding SQL Injection
          • 2.4.3 Exploiting In-Band SQL Injection
          • 2.4.4 Exploiting Error-Based SQL Injection
          • 2.4.5 Exploiting Blind SQL Injection
          • 2.4.6 SQLMap
          • 2.4.7 Mitigation Strategies
          • 2.4.8 From SQLi to Server Takeover
        • 2.5 - Other Common Web Attacks
          • 2.5.1 Session Attacks
          • 2.5.2 CSRF
          • 2.5.3 File and Resource Attacks
      • 3️⃣3 - Network Security
        • 3.1 Network Based Attacks
        • 3.2 Linux Vulnerabilities
        • 3.3 - Exploitation
          • 3.3.1 Linux Exploitation
      • 4️⃣4 - Exploit Development
        • 4.1 Architecture Foundamentals
        • 4.2 Assemblers and Tools
        • 4.3 Buffer Overflow
        • 4.4 Cryptography
        • 4.5 Malware
        • 4.6 Shellcoding
      • 5️⃣5 - Post-Exploitation
        • 5.1 Linux Post-Exploitation
        • 5.2 - Linux Privilege Escalation
          • 5.2.1 Kernel Exploitation
          • 5.2.2 SUID Exploitation
          • 5.2.3 CronJobs
        • 5.3 - Post Expolitation / Pivoting
          • 5.3.1 Pivoting Guidelines
          • 5.3.2 Pivoting Example (3 Targets)
      • 6️⃣6 - ​Red Teaming
        • 6.1 - Active Directory Penetration Testing
          • 6.1.1 Introduction to Active Directory (AD)
            • 6.1.1.1 Users, Groups & Computers
            • 6.1.1.2 Organizational Units (OUs)
            • 6.1.1.3 Trees, Forest & Trust
          • 6.1.2 AD Authentication
          • 6.1.3 AD Penetration Testing Methodology
        • 6.1.4 AD Enumeration
        • 6.1.5 AD Privilege Escalation
        • 6.1.6 AD Lateral Movement
        • 6.1.7 AD Persistence
        • 6.2 - Command & Control (C2/C&C)
    • eCPPTv2
      • 1️⃣1 - ​System Security
        • 1.1 Architecture Foundamentals
        • 1.2 Assemblers and Tools
        • 1.3 Buffer Overflow
        • 1.4 Cryptography
        • 1.5 Malware
        • 1.6 Shellcoding
      • 2️⃣2 - Network Security
        • 2.1 System/Host Based Attacks
          • 2.1.1 Windows Vulnerabilities
        • 2.2 Network Based Attacks
        • 2.3 The Metasploit Framework (MSF)
          • MSF Introduction
          • Information Gathering & Enumeration
          • Vulnerability Scanning
          • Client-Side Attacks
          • Post Exploitation
          • Armitage
        • 2.4 Exploitation
        • 2.5 - Post Expolitation / Pivoting
          • 2.5.1 Pivoting Guidelines
          • 2.5.2 Pivoting Example (3 Targets)
        • 2.6 Social Engineering
      • 3️⃣3 - PowerShell for PT
        • 3.1 PowerShell
      • 4️⃣4 - Linux Exploitation
        • 4.1 Linux Vulnerabilities
        • 4.2 Linux Exploitation
        • 4.3 Linux Post-Exploitation
        • 4.4 Linux Privilege Escalation
          • 4.4.1 Kernel Exploitation
          • 4.4.2 SUID Exploitation
          • 4.4.3 CronJobs
      • 5️⃣5 - Web App Security
        • 5.1 - Web App Concepts
          • 5.1.1 HTTP/S Protocol
          • 5.1.2 Encoding
          • 5.1.3 Same Origin
          • 5.1.4 Cookies
          • 5.1.5 Session
          • 5.1.6 Web App Proxies
        • 5.2 - Information Gathering
          • 5.2.1 Gathering Information on Your Targets
          • 5.2.2 Infrastructure
          • 5.2.3 Fingerprinting Frameworks and Applications
          • 5.2.4 Fingerprinting Custom Applications
          • 5.2.5 Enumerating Resources
          • 5.2.6 Information Disclosure Through Misconfiguration
          • 5.2.7 Google Hacking
          • 5.2.8 Shodan HQ
        • 5.3 - Cross Site Scripting
          • 5.3.1 XSS Anatomy
          • 5.3.2 Reflected XSS
          • 5.3.3 Stored XSS
          • 5.3.4 DOM-Based XSS
          • 5.3.5 Identifying & Exploiting XSS with XSSer
        • 5.4 - SQL Injection
          • 5.4.1 Introduction to SQL Injection
          • 5.4.2 Finding SQL Injection
          • 5.4.3 Exploiting In-Band SQL Injection
          • 5.4.4 Exploiting Error-Based SQL Injection
          • 5.4.5 Exploiting Blind SQL Injection
          • 5.4.6 SQLMap
          • 5.4.7 Mitigation Strategies
          • 5.4.8 From SQLi to Server Takeover
        • 5.5 - Other Common Web Attacks
          • 5.5.1 Session Attacks
          • 5.5.2 CSRF
      • 6️⃣6 - ​Wi-Fi Security
        • 6.1 Traffic Analysis
      • 7️⃣7 - ​Metasploit & Ruby
        • 7.1 Metasploit
      • πŸ“„Report
        • How to write a PT Report
  • πŸ›£οΈRoadMap & My Experience
  • πŸ“”eCPPT Cheat Sheet
Powered by GitBook
On this page
  • πŸ“• eCPPT - Version 3 (newest - after 2024)
  • Course duration & Topics β³πŸ“š
  • E-Links πŸ”—πŸ“”
  • Resources πŸ“‘πŸ“˜
  • πŸ‘‰ eCPPT/PTP Cheat Sheet πŸ“”
  • πŸ“™ eCPPT - Version 2 (until 2024)
  • Course duration & Topics β³πŸ“š
  • E-Links πŸ”—πŸ“”
  • ​eCPPT Exam πŸ“„πŸ–ŠοΈ
  • Resources πŸ“‘πŸ“˜
  • πŸ‘‰ eCPPT/PTP Cheat Sheet πŸ“”
  • Other Resources πŸ“‘πŸ“˜
  • πŸ‘‰ Preparation RoadMap to pass eCPPT/PTP exam πŸ›£οΈ
  • πŸ‘‰ Exam Experience (v2) πŸ’―

eCPPT / PTP - Notes

INE/eLearnSecurity Certified Professional Penetration Tester (eCPPT) / PTP v2 and v3 Notes

NexteCPPTv3

Last updated 4 months ago

πŸ“• eCPPT - Version 3 (newest - after 2024)

Course duration & Topics β³πŸ“š

~ 107 hours (~97 of videos) 10 courses , 172 videos, 124 quizzes, 67 labs

E-Links πŸ”—πŸ“”

  • Time limit: 24h

  • Expiration date: yes

  • Objectives:

    Information Gathering & Reconnaissance (10%)

    • Perform Host Discovery and Port Scanning on Target Networks

    • Enumerate Information From Services Running on Open Ports

    Initial Access (15%)

    • Perform Username Enumeration to Identify Valid User Accounts on Target Systems

    • Perform Password Spraying Attacks to Identify Valid Credentials for Initial Access

    • Perform Brute-Force Attacks on Remote Access Services for Initial Access

    Web Application Penetration Testing (15%)

    • Perform Web Application Enumeration to Identify Potential Vulnerabilities & Misconfigurations

    • Identify and Exploit Common Web Application Vulnerabilities For Initial Access (SQLi, XSS, Command Injection, etc)

    • Perform Brute-Force Attacks Against Login Forms

    • Exploit Vulnerable and Outdated Web Application Components

    • Exfiltrate Data and Credentials From Compromised Web Applications and Databases

    Exploitation & Post-Exploitation (25%)

    • Identify and Exploit Vulnerabilities or Misconfigurations in Services

    • Identify and Exploit Privilege Escalation Vulnerabilities

    • Dump and Crack Password Hashes

    • Identify Locally Stored Unsecured Credentials

    Exploit Development (5%)

    • Develop/Modify Exploit Code For Initial Access and Post-Exploitation

    • Identify and Exploit Memory Corruption Vulnerabilities (Stack Overflow, Buffer Overflow)

    Active Directory Penetration Testing (30%)

    • Perform Active Directory Enumeration

    • Identify Domain Accounts With Weak or Empty Passwords

    • Perform AS-REP Roasting to Steal Kerberos Tickets for Authentication

    • Perform Active Directory Lateral Movement Techniques (Pass-the-Hash, Pass-the-Ticket)

    • Obtain Domain Admin Privileges/Access

Resources πŸ“‘πŸ“˜


πŸ“™ eCPPT - Version 2 (until 2024)

Course duration & Topics β³πŸ“š

~ 84 hours (~56h of videos) 8 courses , 85 videos, 83 quizzes, 27 labs

E-Links πŸ”—πŸ“”

  • Time limit: 7 days + 7 days for report

  • Expiration date: no

  • Objectives:

    • Penetration testing processes and methodologies, against Windows and Linux targets

    • Vulnerability Assessment of Networks

    • Vulnerability Assessment of Web Applications

    • Advanced Exploitation with Metasploit

    • Performing Attacks in Pivoting

    • Web application Manual exploitation

    • Information Gathering and Reconnaissance

    • Scanning and Profiling the target

    • Privilege escalation and Persistence

    • Exploit Development

    • Advanced Reporting skills and Remediation

Resources πŸ“‘πŸ“˜


Other Resources πŸ“‘πŸ“˜

~ 22 hours

~ 14 hours

~ 17 hours

~ 7 hours

~ 18 hours

~ 19 hours

πŸ›£οΈ πŸ§‘πŸ»β€πŸ«

Where to find the eCPPTv3 certification exam? -

Where to find the PTPv3 (Professional Penetration Testing v3) course

​​ Exam πŸ“„πŸ–ŠοΈ

πŸ‘‰ πŸ“”

πŸ“– πŸ“–

​ ~ 13 hours

~ 33 hours

~ 6 hours

​ ~ 9 hours

~ 10 hours

​ ~ 6 hours

​ ~ 8 hours

πŸ›£οΈ πŸ§‘πŸ»β€πŸ«

Where to find the PTPv2 (Professional Penetration Testing v2) course? - ​

Where to find the eCPPTv2 certification exam? - ​

​ Exam πŸ“„πŸ–ŠοΈ

πŸ‘‰ πŸ“”

πŸ“– πŸ“–

πŸ‘‰ (v2) πŸ’―

πŸ“
Resource Development & Initial Access
Web Application Attacks
Network Security
Exploit Development
Post Exploitation
Red Teaming
RoadMap / Exam Preparation
eCPPTv3
INE Learning Paths​
eCPPT
eCPPT/PTP Cheat Sheet
Read the Lab Guidelines
System Security
Network Security
PowerShell for Pentesters
Linux Exploitation
​Web App Security
Wi-Fi Security
Metasploit & Ruby
RoadMap / Exam Preparation
INE Learning Paths
eCPPTv2
eCPPT
eCPPT/PTP Cheat Sheet
Read the Lab Guidelines
πŸ‘‰ Preparation RoadMap to pass eCPPT/PTP exam πŸ›£οΈ
Exam Experience
https://security.ine.com/certifications/ecppt-certification/