description |
---|
Practical Network Penetration Tester (PNPT) by TCM Security |
- OSINT
-> Information Gathering
- External Network
-> Finding initial footholds
-> Scanning Network
- Internal Network
-> Active Directory based
-> Enumeration is critical
-> Privilege Escalation Skills are critical
-> Maintaining Access
- Report Writing
-> Attack Overview
-> Found Vulnerabilities
-> Possible Remediations or Recommendations
-> Identify Criticality of Vulnerability
- Debrief
-> Explain your report
Step 1: TCM Security Practical Ethical Hacking Course
{% embed url="https://academy.tcm-sec.com/courses/enrolled/1152300" %}
{% content-ref url="peh/" %} peh {% endcontent-ref %}
Step 2: TCM OSINT Fundamentals
{% embed url="https://academy.tcm-sec.com/courses/enrolled/1214089" %}
{% content-ref url="osint/" %} osint {% endcontent-ref %}
Step 3: TCM External Pentest Playbook
{% embed url="https://academy.tcm-sec.com/courses/enrolled/1368686" %}
{% content-ref url="external-pentest-playbook.md" %} external-pentest-playbook.md {% endcontent-ref %}
Step 4: Conda Entry Level Pentesting Lab
{% embed url="https://www.youtube.com/watch?v=LHto_BYt1ug&t=0s" %}
Step 5: "Wreath" Lab on TryHackMe
{% embed url="https://tryhackme.com/room/wreath" %}
Step 6: "Holo" Lab on TryHackMe
{% embed url="https://tryhackme.com/room/hololive" %}