eWPTXv3 - Notes
GitHubPortfolioTwitter/X MediumCont@ctHome
  • 📝eWPTXv3
    • Web Application Penetration Testing Methodology
      • 1.1 Introduction to Web App Security Testing
        • 1.1.1 Web Application
        • 1.1.2 Web App Architecture
        • 1.1.3 HTTP/HTTPS
      • 1.2 Web App Pentesting Methodology
    • Web Application Reconnaissance
      • 2.1 Information Gathering
        • 2.1.1 DNS Recon
          • 2.1.1.1 DNS Zone Transfer
          • 2.1.1.2 Subdomain Enumeration
        • 2.1.2 WAF Recon
      • 2.2 Passive Crawling & Spidering
      • 2.3 Web Server Fingerprinting
        • 2.3.1 File & Directory Brute-Force
      • 2.4 Web Proxies
        • 2.4.1 Burp Suite
        • 2.4.2 OWASP ZAP
    • Authentication Attacks
      • 6.1 HTTP Attacks
        • 6.1.1 HTTP Method Tampering
        • 6.1.2 Attacking HTTP Authentication
      • 6.2 Session Attacks
        • 6.2.1 Session Hijacking
        • 6.2.2 Session Fixation
        • 6.2.3 Session Hijacking via Cookie Tampering
      • 6.3 JWT Attacks
      • 6.4 CSRF
    • Injection Vulnerabilities
      • 4.1 Command Injection
      • 4.2 Cross-Site Scripting (XSS)
        • 4.2.1 XSS Anatomy
        • 4.2.2 Reflected XSS
        • 4.2.3 Stored XSS
        • 4.2.4 DOM-Based XSS
        • 4.2.5 Identifying & Exploiting XSS with XSSer
      • 4.3 ​SQL Injection (SQLi)
        • 4.3.1 DB & SQL Introduction
        • 4.3.2 SQL Injection (SQLi)
        • 4.3.3 In-Band SQLi
        • 4.3.4 Blind SQLi
        • 4.3.5 NoSQL
        • 4.3.6 SQLMap
        • 4.3.7 Mitigation Strategies
    • API Penetration Testing
      • 5.1 API Testing
    • Server-Side Attacks
      • 6.1 Server-side request forgery (SSRF)
      • 6.2 Deserialization
      • 6.3 ​File & Resource Attacks
        • 6.1 File Upload Vulnerability
        • 6.2 Directory Traversal
        • 6.3 File Inclusion (LFI and RFI)
          • 6.3.1 Local File Inclusion (LFI)
          • 6.3.2 Remote File Inclusion (RFI)
        • 6.4 CMS Pentesting
          • 6.4.1 Wordpress, Drupal & Magento
    • Filter Evasion & WAF Bypass
      • 7.1 Obfuscating attacks using encodings
    • 📄Report
      • How to write a PT Report
  • 🛣️RoadMap / Exam Preparation
  • 📔eWPTX Cheat Sheet
Powered by GitBook
On this page
  • Background Information
  • Tooling
  • Web
  • Other Resources
  • Guidelines and Templates
  • Testing Checklist and Template
  • Other Guides/Template
  • Reporting
  • CheatSheet

RoadMap / Exam Preparation

PreviousHow to write a PT ReportNexteWPTX Cheat Sheet

Last updated 1 month ago

Here below the path I used and which I would recommend to reach a level necessary to pass the exam. 👇

Background Information

  • OpenVPN 🏠

  • Linux Fundamentals Module 🏠

  • Windows Fundamentals Module 🏠

  • What is Networking 🏠

  • Intro To Networking 🏠

  • Intro To LAN 🏠

  • HTTP in Detail 🏠

  • DNS in Detail 🏠

  • Intro To Offensive Security 🏠

  • Pentesting Fundamentals 🏠

  • Passive Recon 🏠

  • Intro to Research 🏠

  • Google Dorking 🏠

  • Python Basics (to understand the working of exploit) 🏠

  • Active Recon 🏠

  • Vulnerabilities 101 🏠

  • Reverse Shell & Bind Shell 🗒️

  • eJPTv2 Ine Full Course 🗒️

  • eWPTv2 Ine full Course 🗒️

  • ⏩ (Italian)🤌 🇮🇹

  • ⏩ (Italian)🤌 🇮🇹

Tooling

Web

Other Resources

Guidelines and Templates

Can be useful follow these guidelines and templates:

Other Guides/Template

CheatSheet

BurpSuite: The Basics 🏠

BurpSuite: Repeater 🏠

Hydra 🏠

Nmap 🏠

Nmap Live Host Discovery 🏠

Metasploit: Introduction 🏠

Metasploit 🏠

More Detailed Tutorial of Metasploit 🗒️

H4cked 🚩 🟢 -

Smag Grotto 🚩 🟢 -

Lazy Admin 🚩 🟢 -

Carnage 🚩 🟠 - My Writeup

Warzone 1 🚩 🟠 - My Writeup

Mr Robot CTF 🚩 🟠 - My Writeup

Anonymous 🚩 🟠 - My Writeup

Misguided Ghost 🚩 🔴 - My Writeup

OWASP top 10 🏠

Inclusion 🏠

Injection 🏠

Web Application Security 🏠

Overpass2 🚩 🟢 - My Writeup

Vulnversity 🚩 🟢 -

Basic Pentesting 🚩 🟢

StartUp 🚩 🟢 -

All In One 🚩 🟠 - My Writeup

Daily Bugle 🚩 🔴 - My Writeup

eCPPT Field Manual:

🗒️

⏩

⏩

⏩

⏩

🗒️

🛣️
THM Room
THM Room
THM Room
THM Room
THM Room
THM Room
THM Room
NoobLinux Article
THM CTF
My Writeup
THM CTF
My Writeup
THM CTF
My Writeup
THM CTF
THM CTF
THM CTF
THM CTF
THM CTF
THM Room
THM Room
THM Room
THM Room
THM CTF
THM CTF
My Writeup
THM CTF
THM CTF
My Writeup
THM CTF
THM CTF
https://drive.google.com/file/d/1wC7RMTrWjt74rO8u4X-zM89T_hZzF_A5/edit
https://medium.com/@dev-angelist/how-to-get-into-cybersecurity-with-no-experience-a51038ea70f6
Testing Checklist and Template
OWASP - Web Security Testing Guide
OWASP Testing Checklist (Excel)
OWASP Testing Checklist (Markdown)
Google Spreadsheet template
reporting_guide
randorisec
TCM-Security
OSCP Template
HackTheBox Template
https://github.com/Syslifters/sysreptor
Reporting
How to write a PT Report — My Notes
Writing a PT Report — TCM
ITProTV Report
OSCP — How to Take Effective Notes
OSCP — How to Write a Report
eWPTXv3 - CheatSheet
THM Room
THM Room
THM Room
THM Room
THM Room
THM Room
THM Room
THM Room
THM Room
THM Room
THM Room
THM Room
THM Room
THM Room
THM Room
THM Room
Hacking Tutorials Article
eJPTv2 Notes
Linux Course
Ethical Hacking Course
eWPTv2 Notes
DVWA
PortSwigger Web Sec Academy
Mutillidae II
SecureBank