Advanced Search
Search Results
23 total results found
Post Exploitation: Enumeration
Post Exploitation: Attacks
FFUF
Port Forwarding
gobuster
Automation with Ansible
FleetDM On Debian 11
Initial Attack Vectors
Internal: --------- Attack vectors that are ideal for internal penetration tests, where the attacker plants a device on the network or uploads tools to a compromised host. External: --------- Attack vectors that could work in both internal and external ...
Mapping Mailboxes with Mutt
General
General Information
Command Line Tricks
WordPress
Session 2: Nov. 13, 2023
In this lesson, we go over computer networking and programming concepts as part of preparation for the both the PJPT and PNPT certifications. Computer networking and programming are both concepts that are covered lightly in TCM's PEH course, so we do a deeper ...
Computer Networking Fundamentals
Brute Force Web Logins with Hydra
Joining Linux Hosts to Active Directory Domain
Session 8: Jan. 8, 2024
In this lesson, we focus on attacking Active Directory from an external assessment. So, enumerating an "externally" facing service, establishing a foothold, and pivoting into the network. This lesson is better suited to those preparing for the PNPT certificati...
Session 10: Jan. 18, 2024
In this lesson, we focus on attacking Active Directory from the perspective of an internal assessment. So, this lesson plan is better suited to those preparing for the PJPT, but can still provide some valuable insights to those preparing for the PNPT as well.