π£οΈRoadMap
eLearnSecurity Junior Penetration Tester (eJPT) v2 RoadMap

The path to becoming a penetration tester is like a winding river, ever-changing and unpredictable. To navigate it, one must be adaptable, resourceful, and always willing to learn.
The journey to becoming a penetration tester is a lifelong one. It is a journey of continuous learning, discovery, and self-improvement.
I will try to indicate the path I used and which I would recommend to reach a level necessary to pass the exam. π
Background Information
OpenVPN π THM Room
Linux Fundamentals Module π THM Room
Windows Fundamentals Module π THM Room
What is Networking π THM Room
Intro To Networking π THM Room
Intro To LAN π THM Room
HTTP in Detail π THM Room
DNS in Detail π THM Room
Intro To Offensive Security π THM Room
Pentesting Fundamentals π THM Room
Passive Recon π THM Room
Intro to Research π THM Room
Google Dorking π THM Room
Python Basics (to understand the working of exploit) π THM Room
Active Recon π THM Room
Vulnerabilities 101 π THM Room
Reverse Shell & Bind Shell ποΈ Hacking Tutorials Article
Tooling
BurpSuite: The Basics π THM Room
BurpSuite: Repeater π THM Room
Hydra π THM Room
Nmap π THM Room
Nmap Live Host Discovery π THM Room
Metasploit: Introduction π THM Room
Metasploit π THM Room
More Detailed Tutorial of Metasploit ποΈ NoobLinux Article
Nessus π THM Room
WireShark The Basics π THM Room
Tmux π THM Room
TShark π THM Room
H4cked π© THM CTF π’ - My Writeup
Smag Grotto π© THM CTF π’ - My Writeup
Carnage π© THM CTF π - My Writeup
Warzone 1 π© THM CTF π - My Writeup
Misguided Ghost π© THM CTF π΄ - My Writeup
Web
OWASP top 10 π THM Room
Inclusion π THM Room
Injection π THM Room
Web Application Security π THM Room
Overpass2 π© THM CTF π’ - My Writeup
Vulnversity π© THM CTF π’ - My Writeup
Basic Pentesting π© THM CTF π’
StartUp π© THM CTF π’ - My Writeup
Daily Bugle π© THM CTF π΄ - My Writeup
Post Exploitation
Post Exploitation Basics π THM Room
Sudo Security Bypass π THM Room
Sudo Buffer Overflow π THM Room
Windows Privilege Escalation ποΈ Hackersploit Article
Windows Privesc Arena π THM Room
Linux Privesc Arena π THM Room
Windows Privesc π THM Room
Bypass UAC π THM Room
Blaster π© THM CTF π’ - My Writeup
Ignite π© THM CTF π’ - My Writeup
Kenobi π© THM CTF π’ - My Writeup
Capture the flag π© THM CTF π’ - My Writeup
Pickle Rick π© THM CTF π’ - My Writeup
Pivoting using Metasploit ποΈ TutorialsPoint Article
Other Resources
Last updated