eCPPTv3-PTP-Notes
HomeGitHubPortfolioTwitter/XMediumCont@ct
  • 📝eCPPT / PTP - Notes
    • eCPPTv3
      • 1️⃣1 - Resource Development & Initial Access
        • 1.1 - PowerShell for Pentesters
        • 1.2 - Client-Side Attacks
          • 1.2.1 - System/Host Based Attacks
            • 1.2.1.1 Windows Vulnerabilities
          • 1.2.2 - The Metasploit Framework (MSF)
            • 1.2.2.1 MSF Introduction
            • 1.2.2.2 Information Gathering & Enumeration
            • 1.2.2.3 Vulnerability Scanning
            • 1.2.2.4 Client-Side Attacks
            • 1.2.2.5 Post Exploitation
            • 1.2.2.6 Armitage
          • 1.2.3 Exploitation
          • 1.2.4 Social Engineering
      • 2️⃣2 - Web Application Penetration Testing
        • 2.1 - Web App Concepts
          • 2.1.1 HTTP/S Protocol
          • 2.1.2 Encoding
          • 2.1.3 Same Origin
          • 2.1.4 Cookies
          • 2.1.5 Session
          • 2.1.6 Web App Proxies
        • 2.2 - Information Gathering
          • 2.2.1 Gathering Information on Your Targets
          • 2.2.2 Infrastructure
          • 2.2.3 Fingerprinting Frameworks and Applications
          • 2.2.4 Fingerprinting Custom Applications
          • 2.2.5 Enumerating Resources
          • 2.2.6 Information Disclosure Through Misconfiguration
          • 2.2.7 Google Hacking
          • 2.2.8 Shodan HQ
        • 2.3 - Cross Site Scripting
          • 2.3.1 XSS Anatomy
          • 2.3.2 Reflected XSS
          • 2.3.3 Stored XSS
          • 2.3.4 DOM-Based XSS
          • 2.3.5 Identifying & Exploiting XSS with XSSer
        • 2.4 - SQL Injection
          • 2.4.1 Introduction to SQL Injection
          • 2.4.2 Finding SQL Injection
          • 2.4.3 Exploiting In-Band SQL Injection
          • 2.4.4 Exploiting Error-Based SQL Injection
          • 2.4.5 Exploiting Blind SQL Injection
          • 2.4.6 SQLMap
          • 2.4.7 Mitigation Strategies
          • 2.4.8 From SQLi to Server Takeover
        • 2.5 - Other Common Web Attacks
          • 2.5.1 Session Attacks
          • 2.5.2 CSRF
          • 2.5.3 File and Resource Attacks
      • 3️⃣3 - Network Security
        • 3.1 Network Based Attacks
        • 3.2 Linux Vulnerabilities
        • 3.3 - Exploitation
          • 3.3.1 Linux Exploitation
      • 4️⃣4 - Exploit Development
        • 4.1 Architecture Foundamentals
        • 4.2 Assemblers and Tools
        • 4.3 Buffer Overflow
        • 4.4 Cryptography
        • 4.5 Malware
        • 4.6 Shellcoding
      • 5️⃣5 - Post-Exploitation
        • 5.1 Linux Post-Exploitation
        • 5.2 - Linux Privilege Escalation
          • 5.2.1 Kernel Exploitation
          • 5.2.2 SUID Exploitation
          • 5.2.3 CronJobs
        • 5.3 - Post Expolitation / Pivoting
          • 5.3.1 Pivoting Guidelines
          • 5.3.2 Pivoting Example (3 Targets)
      • 6️⃣6 - ​Red Teaming
        • 6.1 - Active Directory Penetration Testing
          • 6.1.1 Introduction to Active Directory (AD)
            • 6.1.1.1 Users, Groups & Computers
            • 6.1.1.2 Organizational Units (OUs)
            • 6.1.1.3 Trees, Forest & Trust
          • 6.1.2 AD Authentication
          • 6.1.3 AD Penetration Testing Methodology
        • 6.1.4 AD Enumeration
        • 6.1.5 AD Privilege Escalation
        • 6.1.6 AD Lateral Movement
        • 6.1.7 AD Persistence
        • 6.2 - Command & Control (C2/C&C)
    • eCPPTv2
      • 1️⃣1 - ​System Security
        • 1.1 Architecture Foundamentals
        • 1.2 Assemblers and Tools
        • 1.3 Buffer Overflow
        • 1.4 Cryptography
        • 1.5 Malware
        • 1.6 Shellcoding
      • 2️⃣2 - Network Security
        • 2.1 System/Host Based Attacks
          • 2.1.1 Windows Vulnerabilities
        • 2.2 Network Based Attacks
        • 2.3 The Metasploit Framework (MSF)
          • MSF Introduction
          • Information Gathering & Enumeration
          • Vulnerability Scanning
          • Client-Side Attacks
          • Post Exploitation
          • Armitage
        • 2.4 Exploitation
        • 2.5 - Post Expolitation / Pivoting
          • 2.5.1 Pivoting Guidelines
          • 2.5.2 Pivoting Example (3 Targets)
        • 2.6 Social Engineering
      • 3️⃣3 - PowerShell for PT
        • 3.1 PowerShell
      • 4️⃣4 - Linux Exploitation
        • 4.1 Linux Vulnerabilities
        • 4.2 Linux Exploitation
        • 4.3 Linux Post-Exploitation
        • 4.4 Linux Privilege Escalation
          • 4.4.1 Kernel Exploitation
          • 4.4.2 SUID Exploitation
          • 4.4.3 CronJobs
      • 5️⃣5 - Web App Security
        • 5.1 - Web App Concepts
          • 5.1.1 HTTP/S Protocol
          • 5.1.2 Encoding
          • 5.1.3 Same Origin
          • 5.1.4 Cookies
          • 5.1.5 Session
          • 5.1.6 Web App Proxies
        • 5.2 - Information Gathering
          • 5.2.1 Gathering Information on Your Targets
          • 5.2.2 Infrastructure
          • 5.2.3 Fingerprinting Frameworks and Applications
          • 5.2.4 Fingerprinting Custom Applications
          • 5.2.5 Enumerating Resources
          • 5.2.6 Information Disclosure Through Misconfiguration
          • 5.2.7 Google Hacking
          • 5.2.8 Shodan HQ
        • 5.3 - Cross Site Scripting
          • 5.3.1 XSS Anatomy
          • 5.3.2 Reflected XSS
          • 5.3.3 Stored XSS
          • 5.3.4 DOM-Based XSS
          • 5.3.5 Identifying & Exploiting XSS with XSSer
        • 5.4 - SQL Injection
          • 5.4.1 Introduction to SQL Injection
          • 5.4.2 Finding SQL Injection
          • 5.4.3 Exploiting In-Band SQL Injection
          • 5.4.4 Exploiting Error-Based SQL Injection
          • 5.4.5 Exploiting Blind SQL Injection
          • 5.4.6 SQLMap
          • 5.4.7 Mitigation Strategies
          • 5.4.8 From SQLi to Server Takeover
        • 5.5 - Other Common Web Attacks
          • 5.5.1 Session Attacks
          • 5.5.2 CSRF
      • 6️⃣6 - ​Wi-Fi Security
        • 6.1 Traffic Analysis
      • 7️⃣7 - ​Metasploit & Ruby
        • 7.1 Metasploit
      • 📄Report
        • How to write a PT Report
  • 🛣️RoadMap & My Experience
  • 📔eCPPT Cheat Sheet
Powered by GitBook
On this page
  • Background Information
  • Tooling
  • Web
  • Buffer Overflow
  • Post Exploitation
  • Pivoting
  • Red Team & Active Directory (only for v3)
  • Reporting (only for v2)
  • Other Resources
  • CheatSheet

RoadMap & My Experience

PreviousHow to write a PT ReportNexteCPPT Cheat Sheet

The path to becoming a penetration tester is like a winding river, ever-changing and unpredictable. To navigate it, one must be adaptable, resourceful, and always willing to learn.

The journey to becoming a penetration tester is a lifelong one. It is a journey of continuous learning, discovery, and self-improvement.

I'm writing this '' to assist aspiring candidates in their journey towards obtaining the eCPPTv2 certification. My aim is to share the resources, insights, and tools essential for preparation, offering advice and addressing common concerns. Unlike the eJPTv2 exam, where you have a only two days to tackle everything alongside multiple-choice questions, the eCPPTv2 certification presents a different challenge. This exam grants you a generous timeframe of 7 days to compromise the entire environment and an additional 7 days to compile a comprehensive professional report detailing all identified vulnerabilities, their criticality, and proposed resolutions.

While seven days may seem ample, completing the exam in less time is entirely feasible. Personally, I managed to conquer it within four days, allowing myself one day of respite, and dedicated two days to crafting a detailed report spanning a total of 80 pages. Is it worth the effort? Undoubtedly. The eCPPTv2 certification rigorously evaluates your prowess in pivoting, buffer overflow exploits, and, most importantly, your comprehension of the pentesting process. Success hinges not on merely reaching the root but on uncovering every vulnerability within the environment. Hence, a robust methodology and thorough enumeration are indispensable. Unlike conventional CTF challenges, you won’t find user.txt or root.txt flags; instead, you’ll encounter files containing crucial information such as passwords, IPs, or network segments, facilitating your progression within the network. I recommend using a diagram/map of the entire environment since otherwise you can get very involved and it is better to work organized, for example Excalidraw.com or Draft.io.

Not having much experience in writing reports, it was not easy and I recommend practicing beforehand. I received the positive result after just 24 hours, unlike what you read online of 15/25 working days.

Here are some tips and insights to aid your preparation:

  1. Thoroughly Review the Letter of Engagement: Pay close attention to the “Letter of Engagement” document as it provides insights into the exam’s structure and requirements. This document must be included in your final report, along with a graphical representation of the compromised areas marked in red.

  2. It’s Not a CTF: Unlike traditional Capture The Flag (CTF) challenges, the eCPPTv2 exam is designed to be more approachable.

  3. Master Metasploit: Proficiency in utilizing Metasploit is paramount, as a good portion of the exam necessitates its usage.

  4. Emphasize Post-Exploitation Techniques: Effective post-exploitation strategies are crucial for gathering information and pivoting to other machines.

  5. Mind Your Nmap Switches: Be cautious when using Nmap with non-aggressive settings. Setting it to -T1 can prevent accidental resets and loss of progress during scanning or pivoting.

  6. Patience is Key: Don’t be discouraged if it takes the full 7 days to compromise the environment. Persistence pays off in the long run.

  7. Act like you’re a journalist: Take as many screens as possible during the 7 days of access to the lab, or if possible start filling out the report at the same time, because if you forgot to track something, it would be a problem.

Creating a customized homemade lab, composed of three or more network interfaces is the best training for this exam, starting with network of 2/3 interfaces and machines without vulnerabilities (direct access with SSH for example, ), increasing the network interfaces with more vulnerable machines (including one vulnerable to BoF, such as ).

Remember that you already have an OVA machine on your VMWare/VirtualBox running on Windows 10, with ImmunityDebugger and the Mona plugin installed, to be used to test and prepare the shellcode to exploit the BoF-vulnerable software running on one of the machines on the network.

The PowerShell, Wi-Fi Security and Ruby modules are certainly important, but not mandatory for passing the exam.

Here below the path I used and which I would recommend to reach a level necessary to pass the exam. 👇

Background Information

Tooling

Web

  • INE eCPPT BoF Material 🗒️

Post Exploitation

  • INE eCPPT Pivoting Material 🗒️

Red Team & Active Directory (only for v3)

It's a good choice use one of these source: TCM's template, Offensive Security's pentest report, the ITProTv sample report, and INE's reporting guide.

Other Resources

CheatSheet

Personally I didn’t follow the INE course, but I relied on the resources found online that I tried to list on .

OpenVPN 🏠

Linux Fundamentals Module 🏠

Windows Fundamentals Module 🏠

What is Networking 🏠

Intro To Networking 🏠

Intro To LAN 🏠

HTTP in Detail 🏠

DNS in Detail 🏠

Intro To Offensive Security 🏠

Pentesting Fundamentals 🏠

Passive Recon 🏠

Intro to Research 🏠

Google Dorking 🏠

Python Basics (to understand the working of exploit) 🏠

Active Recon 🏠

Vulnerabilities 101 🏠

Reverse Shell & Bind Shell 🗒️

eJPTv2 Ine Full Course 🗒️

⏩ (Italian)🤌 🇮🇹

⏩ (Italian)🤌 🇮🇹

BurpSuite: The Basics 🏠

BurpSuite: Repeater 🏠

Hydra 🏠

Nmap 🏠

Nmap Live Host Discovery 🏠

Metasploit: Introduction 🏠

Metasploit 🏠

More Detailed Tutorial of Metasploit 🗒️

Nessus 🏠

WireShark The Basics 🏠

Tmux 🏠

TShark 🏠

H4cked 🚩 🟢 -

Smag Grotto 🚩 🟢 -

Lazy Admin 🚩 🟢 -

Carnage 🚩 🟠 - My Writeup

Warzone 1 🚩 🟠 - My Writeup

Mr Robot CTF 🚩 🟠 - My Writeup

Anonymous 🚩 🟠 - My Writeup

Misguided Ghost 🚩 🔴 - My Writeup

OWASP top 10 🏠

Inclusion 🏠

Injection 🏠

Web Application Security 🏠

Overpass2 🚩 🟢 - My Writeup

Vulnversity 🚩 🟢 -

Basic Pentesting 🚩 🟢

StartUp 🚩 🟢 -

All In One 🚩 🟠 - My Writeup

Daily Bugle 🚩 🔴 - My Writeup

TCM BoF 🗒️

Post Exploitation Basics 🏠

Sudo Buffer Overflow 🏠

Tiberius Buffer Overflow Prep Room🏠

Brainstorm 🏠

Gatekeeper 🚩 🟠 - My Writeup

Brainpan 1 🚩 🔴 -

🗒️

🗒️

🗒️

Windows Privilege Escalation -

Post Exploitation Basics 🏠

Sudo Security Bypass 🏠

Sudo Buffer Overflow 🏠

Windows Privilege Escalation 🗒️

Windows Privesc Arena 🏠

Linux Privesc Arena 🏠

Windows Privesc 🏠

Bypass UAC 🏠

⏩ (Spanish) 🇪🇸

Simple CTF 🚩 🟢 -

Blaster 🚩 🟢 -

Blue 🚩 🟢 -

Bounty Hacker 🚩 🟢 -

Ignite 🚩 🟢 -

Kenobi 🚩 🟢 -

Capture the flag 🚩 🟢 - My Writeup

Pickle Rick 🚩 🟢 -

Empline 🚩 🟠 - My Writeup

Internal 🚩 🔴 - My Writeup

Pivoting using Metasploit 🗒️

ContainMe 🚩 🟢 - My Writeup

Wreath 🏠 -

🗒️

🗒️

⏩

⏩

⏩ (Spanish) 🇪🇸

⏩ (Spanish) 🇪🇸

⏩ (Spanish) 🇪🇸

⏩ (Spanish) 🇪🇸

🗒️

🇬🇧 🎦

🇬🇧 🎦

🇬🇧 🎦

🇬🇧 🎦

🇬🇧 🎦

🇬🇧 🎦

🇮🇹 🎦

(only for v2)

🗒️

⏩

⏩

⏩

⏩

eCPPT Field Manual:

🗒️

🗒️

🗒️

🛣️
my github
THM Room
THM Room
THM Room
THM Room
THM Room
THM Room
THM Room
THM Room
THM Room
THM Room
THM Room
THM Room
THM Room
THM Room
THM Room
THM Room
Hacking Tutorials Article
eJPTv2 Notes
Linux Course
Ethical Hacking Course
THM Room
THM Room
THM Room
THM Room
THM Room
THM Room
THM Room
NoobLinux Article
THM Room
THM Room
THM Room
THM Room
THM CTF
My Writeup
THM CTF
My Writeup
THM CTF
My Writeup
THM CTF
THM CTF
THM CTF
THM CTF
THM CTF
THM Room
THM Room
THM Room
THM Room
THM CTF
THM CTF
My Writeup
THM CTF
THM CTF
My Writeup
THM CTF
THM CTF
Buffer Overflow
Material
THM Room
THM Room
THM Room
THM Room
THM CTF
THM CTF
My Writeup
https://github.com/Tib3rius/Pentest-Cheatsheets/blob/master/exploits/buffer-overflows.rst
https://github.com/gh0x0st/Buffer_Overflow
https://boschko.ca/braindead-buffer-overflow-guide-to-pass-the-oscp-blindfolded/
Notes
THM Room
THM Room
THM Room
Hackersploit Article
THM Room
THM Room
THM Room
THM Room
MsfVenom Guide
THM CTF
My Writeup
THM CTF
My Writeup
THM CTF
My Writeup
THM CTF
My Writeup
THM CTF
My Writeup
THM CTF
My Writeup
THM CTF
THM CTF
My Writeup
THM CTF
THM CTF
Pivoting
TutorialsPoint Article
THM CTF
THM Room
Writeup
https://www.offsec.com/metasploit-unleashed/pivoting/
https://pentest.blog/explore-hidden-networks-with-double-pivoting/
Home Lab: ProxyChains - eCPPT prep
Pivoting with Ligolo
Pivoting with Metasploit
Manual Pivoting using Chisel and Socat
Double Pivoting
Pivoting Manual Playlist S4vitar
CRTP Notes
Windows Privilege Escalation - Video EN
OSCP Guide 10/12 – Active Directory - Video EN
The Cyber Mentor (TCM) - Hacking Active Directory for Beginners - Video EN
The Cyber Mentor (TCM) - Windows Privilege Escalation for Beginners - Video EN
Cisco and Pentester Academy Attacking Active Directory Class with Nikhil Mittal - Video EN
Active Directory - John Hammond Series - Video EN
Active Directory THM Room Walkthrough - Esadecimale - Video ITA
Reporting
How to write a PT Report — My Notes
Writing a PT Report — TCM
ITProTV Report
OSCP — How to Take Effective Notes
OSCP — How to Write a Report
https://drive.google.com/file/d/1wC7RMTrWjt74rO8u4X-zM89T_hZzF_A5/edit
https://www.hackingarticles.in/lateral-movement-pass-the-hash-attack/
https://www.sans.org/posters/pivot-cheat-sheet/
https://medium.com/@dev-angelist/learning-path-my-experience-for-the-eccptv2-ptp-certification-april-2024-15ddf6b29a8f
eCPPT — CheatSheet
Windows Privilege Escalation Cheatsheet
CRTP (Active Directory Notes) Cheatsheet
review
see here
Brainpain