Personal notes for the Practical Junior Penetration Tester (PJPT) certification from TCM Security.
Based on the Practical Ethical Hacking course.
- Note Taking - Tools and methodology
- Networking - IP, MAC, TCP/UDP, ports, OSI model, subnetting
- Kali Linux - Commands, navigation, services, scripting
- Python - Basics through sockets and file I/O
- Information Gathering
- Passive recon, subdomains, website tech identification, Burp Suite
- Scanning and Enumeration
- Website enumeration (dirb, ffuf, gobuster, nikto)
- Exploitation Basics
- SMB/SSH enumeration, vulnerability research, password cracking, reverse shells
- AD Overview - Components, data store, logical structure
- Initial Attack Vectors
- LLMNR poisoning, SMB relay attacks
- IPv6 Attacks
- Post-Compromise Enumeration
- PowerView, BloodHound, ldapdomaindump
- Post-Compromise Attacks
- Pass attacks, token impersonation, Kerberoasting, GPP/cPassword, Mimikatz, Golden Ticket
- Web Application Attacks
- SQL injection, XSS, command injection, IDOR, file inclusion, XXE
- Post Exploitation
- File transfers, pivoting, maintaining access, cleanup
- Report Writing
- Legal documents, scope, report structure
| Module | Status |
|---|---|
| Note Taking | β Done |
| Networking | β Done |
| Kali Linux | β Done |
| Python | β Done |
| Ethical Hacker Methodology | β Done |
| Information Gathering | β Done |
| Scanning and Enumeration | β Done |
| Exploitation Basics | β Done |
| Active Directory Overview | β Done |
| AD Initial Attack Vectors | β Done |
| AD Post-Compromise Enumeration | β Done |
| AD Post-Compromise Attacks | β Done |
| Web Application Attacks | β Done |
| Post Exploitation | β Done |
| Report Writing | β Done |
These are personal study notes. For comprehensive learning, take the official course.