Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

23 total results found

Post Exploitation: Enumeration

Active Directory

post-exploitation
active-directory

Post Exploitation: Attacks

Active Directory

active-directory
post-exploitation
attack-vectors

FFUF

Web

ffuf
brute-force
web

Port Forwarding

Network Pivoting

port-forwarding

gobuster

Web

gobuster

Automation with Ansible

Ansible

information-technology
automation
ansible

FleetDM On Debian 11

Fleet DM

defend
fleetdm
osquery

Initial Attack Vectors

Active Directory

Internal: --------- Attack vectors that are ideal for internal penetration tests, where the attacker plants a device on the network or uploads tools to a compromised host. External: --------- Attack vectors that could work in both internal and external ...

attack-vectors
active-directory

Mapping Mailboxes with Mutt

Mail

General

Web

General Information

web

Command Line Tricks

Linux Administration

command-line
shell

WordPress

Web

wordpress
web
enumeration
nmap

Session 2: Nov. 13, 2023

PJPT & PNPT Study Group Lessons

In this lesson, we go over computer networking and programming concepts as part of preparation for the both the PJPT and PNPT certifications. Computer networking and programming are both concepts that are covered lightly in TCM's PEH course, so we do a deeper ...

pentesting
study
tcm-pjpt
tcm-pnpt
computer-network-101
computer-networking
programming
code
powershell
python

Computer Networking Fundamentals

Computer Networking

computer-networking
networking
computer-network-101

Brute Force Web Logins with Hydra

Hydra

brute-force
password-spraying
credential-spraying
web
hydra

Joining Linux Hosts to Active Directory Domain

Linux Administration

active-directory
linux
systems-administration
sysadmin

Session 8: Jan. 8, 2024

PJPT & PNPT Study Group Lessons

In this lesson, we focus on attacking Active Directory from an external assessment. So, enumerating an "externally" facing service, establishing a foothold, and pivoting into the network. This lesson is better suited to those preparing for the PNPT certificati...

active-directory
external
tcm-pnpt
pivoting

Session 10: Jan. 18, 2024

PJPT & PNPT Study Group Lessons

In this lesson, we focus on attacking Active Directory from the perspective of an internal assessment. So, this lesson plan is better suited to those preparing for the PJPT, but can still provide some valuable insights to those preparing for the PNPT as well.

tcm-pjpt
active-directory
internal

Canon ImageClass MF644CDW

Printers

information-technology
printers

Burp Suite

Web

burp-suite
burp
web