Study Notes
eLearnSecurity Certified Penetration Tester eXtreme
Last updated
eLearnSecurity Certified Penetration Tester eXtreme
Last updated
Advanced penetration testing processes and methodologies
Advanced Exploitation using Metasploit and Empire
Network/traffic manipulation
Pivoting
Advanced Lateral Movement (WMI, PS Remoting, DCOM, etc.)
Advanced Active Directory Information Gathering, Enumeration and Reconnaissance
Custom Attack Vector Development
Deep knowledge of Active Directory and Windows internals
Knowledge of Windows authentication weaknesses
Web application Manual exploitation
Stealthy Scanning and Profiling the target
Advanced Persistence / Backdooring
Privilege escalation