{"version":1,"pages":[{"id":"nC60WZbFCm5nvb8vfhpj","title":"eJPT Study Notes","pathname":"/","siteSpaceId":"sitesp_xkl98","emoji":"1f355","description":"eLearnSecurity Junior Penetration Tester study Notes. Join the community on Discord."},{"id":"4qp707N0g6VaJf0iL2Hi","title":"Description","pathname":"/ine-ejpt-exam/description","siteSpaceId":"sitesp_xkl98","description":"","breadcrumbs":[{"label":"INE eJPT Exam"}]},{"id":"di2Cq5MCTeRkDCfsJi5K","title":"Before the Exam","pathname":"/rfs-tips/before-the-exam","siteSpaceId":"sitesp_xkl98","description":"","breadcrumbs":[{"label":"RFS Tips"}]},{"id":"TqilOh32faDjrkQGNp7O","title":"Prepare your Setup","pathname":"/rfs-tips/prepare-your-setup","siteSpaceId":"sitesp_xkl98","description":"","breadcrumbs":[{"label":"RFS Tips"}]},{"id":"upoktDCkN6vrTmRQcLOW","title":"Questions?","pathname":"/rfs-tips/questions","siteSpaceId":"sitesp_xkl98","description":"","breadcrumbs":[{"label":"RFS Tips"}]},{"id":"2JYpwa6bggLLr2X1ln64","title":"Start Hacking","pathname":"/rfs-tips/start-hacking","siteSpaceId":"sitesp_xkl98","description":"","breadcrumbs":[{"label":"RFS Tips"}]},{"id":"jHm79TH0ehq3nclA8YxJ","title":"To Scan a Network","pathname":"/methodology/to-scan-a-network","siteSpaceId":"sitesp_xkl98","emoji":"0031-20e3","description":"Dive deep into this comprehensive article on the methodology to scan a network. Learn about effective strategies, tools, and best practices used in network scanning techniques.","breadcrumbs":[{"label":"Methodology"}]},{"id":"x6XCFoyNmv8vpLGIec4D","title":"To Attack a Linux Machine","pathname":"/methodology/to-attack-a-linux-machine","siteSpaceId":"sitesp_xkl98","emoji":"0032-20e3","description":"Explore our comprehensive article, focusing on the 'Methodology To Attack a Linux Machine'. Delve into detailed strategies, potential vulnerabilities, and effective prevention tips. Secure your system","breadcrumbs":[{"label":"Methodology"}]},{"id":"0vd5VhXL1sqav0zxEkwM","title":"To Attack a Windows Machine","pathname":"/methodology/to-attack-a-windows-machine","siteSpaceId":"sitesp_xkl98","emoji":"0033-20e3","description":"Discover comprehensive steps in our article on 'Methodology To Attack a Windows Machine'. Uncover potential vulnerabilities, learn about defensive strategies, and improve system security.","breadcrumbs":[{"label":"Methodology"}]},{"id":"Q7MeWCgyac9gDcIsEygO","title":"Pivoting Methodology","pathname":"/methodology/pivoting-methodology","siteSpaceId":"sitesp_xkl98","emoji":"0034-20e3","description":"Pivoting Methodology in cybersecurity with our expert insights. Learn the strategic approach hackers employ to navigate through networks, understand the stages involved, and discover effective defense","breadcrumbs":[{"label":"Methodology"}]},{"id":"O51wb2z8nCvSy09x4qno","title":"Linux Post Exploitation","pathname":"/methodology/linux-post-exploitation","siteSpaceId":"sitesp_xkl98","emoji":"0035-20e3","description":"Uncover the advanced techniques employed by cybersecurity experts to navigate and control Linux systems post-compromise. Elevate your understanding of post-exploitation strategies, privilege escalatio","breadcrumbs":[{"label":"Methodology"}]},{"id":"m1hiucA3gZPmZpEavZBo","title":"Windows Post Exploitation","pathname":"/methodology/windows-post-exploitation","siteSpaceId":"sitesp_xkl98","emoji":"0036-20e3","description":"Windows Post Exploitation Methodology","breadcrumbs":[{"label":"Methodology"}]},{"id":"RRAk2VvlcXR5zjj9QDb9","title":"OSI Layers","pathname":"/networking/osi-layers","siteSpaceId":"sitesp_xkl98","emoji":"1f7e2","description":"Explore our detailed article on OSI Layers protocols tailored for pen-testers. Discover insights on vulnerabilities, security loopholes, and strategies for robust network defense.","breadcrumbs":[{"label":"Networking"}]},{"id":"NSnqLuVylA0vEklp1WMX","title":"Protocols","pathname":"/networking/protocols","siteSpaceId":"sitesp_xkl98","emoji":"1f7e2","description":"Discover invaluable insights in our comprehensive article as we explain Network protocols for pen-testers, enhancing your cybersecurity skills and network testing abilities.","breadcrumbs":[{"label":"Networking"}]},{"id":"Q5ZjsyKS1BHl8YOht7bQ","title":"Subnetting","pathname":"/networking/subnetting","siteSpaceId":"sitesp_xkl98","emoji":"1f7e2","description":"Explore our comprehensive article that thoroughly explains subnetting. Learn how it optimizes network performance by efficiently partitioning IP networks. Master subnetting today!","breadcrumbs":[{"label":"Networking"}]},{"id":"uMOEJeYmxTB94LtSHsn0","title":"Routing","pathname":"/networking/routing","siteSpaceId":"sitesp_xkl98","emoji":"1f7e2","description":"Explore our comprehensive article where we explain routing in-depth. Understand the process, protocols, and more with our detailed guide on network routing.","breadcrumbs":[{"label":"Networking"}]},{"id":"G8S8XomizOdsVq0KCwkW","title":"Pivoting","pathname":"/networking/pivoting","siteSpaceId":"sitesp_xkl98","description":"","breadcrumbs":[{"label":"Networking"}]},{"id":"7d7awoO0nyHYze5Qo05l","title":"FTP 21","pathname":"/network-protocols/ftp-21","siteSpaceId":"sitesp_xkl98","emoji":"1f7e2","description":"How to attack File Transfer Protocol port 21","breadcrumbs":[{"label":"Network Protocols"}]},{"id":"t4Znvc8DwxPA5uulz3GV","title":"SSH 22","pathname":"/network-protocols/ssh-22","siteSpaceId":"sitesp_xkl98","emoji":"1f7e2","description":"Explore the ins and outs of SSH Penetration Testing in our expert-written article. Gain insights on securing servers against cyber threats through proper testing methods.","breadcrumbs":[{"label":"Network Protocols"}]},{"id":"qYEeOr5QLI5TbH3iMGlQ","title":"HTTP 80","pathname":"/network-protocols/http-80","siteSpaceId":"sitesp_xkl98","emoji":"2705","description":"","breadcrumbs":[{"label":"Network Protocols"}]},{"id":"WpBmw2hGOaMpy0IfpGKn","title":"NetBIOS 139","pathname":"/network-protocols/netbios-139","siteSpaceId":"sitesp_xkl98","emoji":"1f7e2","description":"","breadcrumbs":[{"label":"Network Protocols"}]},{"id":"Yr4nQZ1NpbkPi2eLF3Mf","title":"SMB 445","pathname":"/network-protocols/smb-445","siteSpaceId":"sitesp_xkl98","emoji":"1f7e0","description":"","breadcrumbs":[{"label":"Network Protocols"}]},{"id":"Ya9ouBfV7zV9zDG69qjD","title":"MySQL 3306","pathname":"/network-protocols/mysql-3306","siteSpaceId":"sitesp_xkl98","description":"","breadcrumbs":[{"label":"Network Protocols"}]},{"id":"el4l1D8f5DyhBhSomP24","title":"RDP 3389","pathname":"/network-protocols/rdp-3389","siteSpaceId":"sitesp_xkl98","emoji":"1f7e2","description":"eJPT RDP protocol Study guide","breadcrumbs":[{"label":"Network Protocols"}]},{"id":"z3Kj3guM093OjiM5eFTg","title":"XSS","pathname":"/web-attacks/xss","siteSpaceId":"sitesp_xkl98","description":"Explore our comprehensive article on XSS Attacks; understand the impact, prevention strategies, and the latest trends. Stay informed, secure your digital space against XSS Attacks.","breadcrumbs":[{"label":"Web Attacks"}]},{"id":"btTYkusokDZdO7UGnYmp","title":"SQLi","pathname":"/web-attacks/sqli","siteSpaceId":"sitesp_xkl98","description":"","breadcrumbs":[{"label":"Web Attacks"}]},{"id":"Lch6AJcT47YHyvKQEMEk","title":"Path Traversal","pathname":"/web-attacks/path-traversal","siteSpaceId":"sitesp_xkl98","description":"","breadcrumbs":[{"label":"Web Attacks"}]},{"id":"aaAeBo5ZLQAirQkTrlm7","title":"Command Injection","pathname":"/web-attacks/command-injection","siteSpaceId":"sitesp_xkl98","description":"","breadcrumbs":[{"label":"Web Attacks"}]},{"id":"NtjArgCE6AXkLG35v5XG","title":"LFI - Local File Inclusion","pathname":"/web-attacks/lfi-local-file-inclusion","siteSpaceId":"sitesp_xkl98","description":"","breadcrumbs":[{"label":"Web Attacks"}]},{"id":"2YSlYanarX9gYIRxUBUp","title":"LFI cheatsheet - HTB","pathname":"/web-attacks/lfi-cheatsheet-htb","siteSpaceId":"sitesp_xkl98","description":"","breadcrumbs":[{"label":"Web Attacks"}]},{"id":"6NCQ2FTLo2XehY2NPImV","title":"Wordpress","pathname":"/web-cms-attacks/wordpress","siteSpaceId":"sitesp_xkl98","description":"","breadcrumbs":[{"label":"Web CMS Attacks"}]},{"id":"fYph80zDheiqytHPT9HL","title":"Joomla","pathname":"/web-cms-attacks/joomla","siteSpaceId":"sitesp_xkl98","description":"","breadcrumbs":[{"label":"Web CMS Attacks"}]},{"id":"PB7QbGE6wAWWAysoMY6j","title":"TomCat","pathname":"/web-cms-attacks/tomcat","siteSpaceId":"sitesp_xkl98","description":"","breadcrumbs":[{"label":"Web CMS Attacks"}]},{"id":"M2jOYMj20Xik4FrsVPMT","title":"Search Exploits","pathname":"/exploits/search-exploits","siteSpaceId":"sitesp_xkl98","description":"","breadcrumbs":[{"label":"Exploits"}]},{"id":"vKBqqWGgCr8f6Qojvopp","title":"Linux","pathname":"/exploits/linux","siteSpaceId":"sitesp_xkl98","description":"","breadcrumbs":[{"label":"Exploits"}]},{"id":"V6c25uTLOLkG1c7mApu4","title":"Windows","pathname":"/exploits/windows","siteSpaceId":"sitesp_xkl98","description":"","breadcrumbs":[{"label":"Exploits"}]},{"id":"NiYTJTUXfQ0IxDotlNfR","title":"dirb","pathname":"/tools/dirb","siteSpaceId":"sitesp_xkl98","description":"","breadcrumbs":[{"label":"Tools"}]},{"id":"FrW5vMZJDqxsKfEqtLhp","title":"Gobuster","pathname":"/tools/gobuster","siteSpaceId":"sitesp_xkl98","emoji":"1f7e2","description":"","breadcrumbs":[{"label":"Tools"}]},{"id":"O2k1eXBVRZF3R4jYjWNs","title":"Nmap","pathname":"/tools/nmap","siteSpaceId":"sitesp_xkl98","description":"","breadcrumbs":[{"label":"Tools"}]},{"id":"MiN7h16RQATwDZMmrDV2","title":"Netcat","pathname":"/tools/netcat","siteSpaceId":"sitesp_xkl98","description":"","breadcrumbs":[{"label":"Tools"}]},{"id":"HB1w2k3WBp7MpkaxkRJi","title":"Burpsuite","pathname":"/tools/burpsuite","siteSpaceId":"sitesp_xkl98","description":"","breadcrumbs":[{"label":"Tools"}]},{"id":"xSuNANDgxfBUERMb3h8g","title":"SQLMap","pathname":"/tools/sqlmap","siteSpaceId":"sitesp_xkl98","emoji":"1f7e2","description":"","breadcrumbs":[{"label":"Tools"}]},{"id":"V2BkfPCGMcAxfpikntby","title":"Metasploit","pathname":"/tools/metasploit","siteSpaceId":"sitesp_xkl98","emoji":"1f7e2","description":"","breadcrumbs":[{"label":"Tools"}]},{"id":"Jn0Ew16vmnFYMeor7j02","title":"Hydra","pathname":"/tools/hydra","siteSpaceId":"sitesp_xkl98","description":"","breadcrumbs":[{"label":"Tools"}]},{"id":"5tPq3cuYsJB2rEFG6UUL","title":"John the Ripper","pathname":"/tools/john-the-ripper","siteSpaceId":"sitesp_xkl98","emoji":"1f7e2","description":"","breadcrumbs":[{"label":"Tools"}]},{"id":"cUxWvRZxOY40rYa8S64i","title":"Hashcat","pathname":"/tools/hashcat","siteSpaceId":"sitesp_xkl98","description":"","breadcrumbs":[{"label":"Tools"}]},{"id":"9NEwQSvvvaIj4WaJ3kjC","title":"DogCat","pathname":"/tryhackme-rooms/dogcat","siteSpaceId":"sitesp_xkl98","description":"","breadcrumbs":[{"label":"TryHackMe Rooms"}]},{"id":"Jc98HihGpc8ubLF2VPeR","title":"Archangel","pathname":"/tryhackme-rooms/archangel","siteSpaceId":"sitesp_xkl98","description":"","breadcrumbs":[{"label":"TryHackMe Rooms"}]},{"id":"oWhIUUGMw2NBFrbS9v1f","title":"OWASP Juice Shop","pathname":"/tryhackme-rooms/owasp-juice-shop","siteSpaceId":"sitesp_xkl98","description":"","breadcrumbs":[{"label":"TryHackMe Rooms"}]},{"id":"pDqOfK5ky4EarV3uZ2R9","title":"Page 2","pathname":"/hack-the-box-rooms/page-2","siteSpaceId":"sitesp_xkl98","description":"","breadcrumbs":[{"label":"Hack The Box Rooms"}]},{"id":"h1cLWsOB7NPZpNlGLoMJ","title":"Page 3","pathname":"/create-your-own-lab/page-3","siteSpaceId":"sitesp_xkl98","description":"","breadcrumbs":[{"label":"Create Your Own Lab"}]},{"id":"nLtR3eEyzKlQPwC9z0cw","title":"Page 1","pathname":"/other-resources/page-1","siteSpaceId":"sitesp_xkl98","description":"","breadcrumbs":[{"label":"Other Resources"}]},{"id":"ZcB4i91U9MtvhzrpCKWd","title":"Page 4","pathname":"/tcm-security-courses/page-4","siteSpaceId":"sitesp_xkl98","description":"","breadcrumbs":[{"label":"TCM Security Courses"}]},{"id":"yHjwbcg4FoesK0C7g1G7","title":"eLearnSecurity Web Application Penetration Tester (eWPT)","pathname":"/ewpt-web-application-penetration-tester","siteSpaceId":"sitesp_wR3CQ","description":"The eWPT is a 100% practical and highly respected modern web application and penetration testing certification designed to give you the skills needed to conduct a thorough penetration test."},{"id":"kV8bqBNDLjpt6zVmBBpu","title":"TryHackMe Machines","pathname":"/ewpt-web-application-penetration-tester/before-start/tryhackme-machines","siteSpaceId":"sitesp_wR3CQ","description":"","breadcrumbs":[{"label":"Before Start"}]},{"id":"XF7QQ1e61T8zXapmQCtE","title":"Hack The Box Machines","pathname":"/ewpt-web-application-penetration-tester/before-start/hack-the-box-machines","siteSpaceId":"sitesp_wR3CQ","description":"","breadcrumbs":[{"label":"Before Start"}]},{"id":"DN3CeW7yKFJIyKOlV9om","title":"Build Your Lab","pathname":"/ewpt-web-application-penetration-tester/before-start/build-your-lab","siteSpaceId":"sitesp_wR3CQ","description":"","breadcrumbs":[{"label":"Before Start"}]},{"id":"b5q5ddNwMpCzW3HbEx3M","title":"HTTP Cookies and Sessions","pathname":"/ewpt-web-application-penetration-tester/introduction/http-cookies-and-sessions","siteSpaceId":"sitesp_wR3CQ","description":"","breadcrumbs":[{"label":"Introduction","emoji":"0031-20e3"}]},{"id":"8a5XpPVxcoaTYEN8v1gG","title":"Same Origin Policy","pathname":"/ewpt-web-application-penetration-tester/introduction/same-origin-policy","siteSpaceId":"sitesp_wR3CQ","description":"","breadcrumbs":[{"label":"Introduction","emoji":"0031-20e3"}]},{"id":"ZyphLmPcjd3EkuIU5eTq","title":"Burp Suite","pathname":"/ewpt-web-application-penetration-tester/introduction/burp-suite","siteSpaceId":"sitesp_wR3CQ","description":"","breadcrumbs":[{"label":"Introduction","emoji":"0031-20e3"}]},{"id":"LpKv9Ybi3sle1BDXOjXf","title":"OWASP Zap","pathname":"/ewpt-web-application-penetration-tester/introduction/owasp-zap","siteSpaceId":"sitesp_wR3CQ","description":"","breadcrumbs":[{"label":"Introduction","emoji":"0031-20e3"}]},{"id":"2zHEnMbx0dNf448qTSAa","title":"Introduction LAB","pathname":"/ewpt-web-application-penetration-tester/introduction/introduction-lab","siteSpaceId":"sitesp_wR3CQ","description":"","breadcrumbs":[{"label":"Introduction","emoji":"0031-20e3"}]},{"id":"mDx2jRmBwXjd77Eyh9bl","title":"Information Gathering - Study Guide","pathname":"/ewpt-web-application-penetration-tester/information-gathering/information-gathering-study-guide","siteSpaceId":"sitesp_wR3CQ","emoji":"1f600","description":"Information gathering, also known as reconnaissance or enumeration, is a crucial phase in the field of ethical hacking. It serves as the initial step in the process of securing systems and networks...","breadcrumbs":[{"label":"Information Gathering","emoji":"0032-20e3"}]},{"id":"qphf8GvhhAT4rlg8ZJfL","title":"Web Application Information Gathering","pathname":"/ewpt-web-application-penetration-tester/information-gathering/web-application-information-gathering","siteSpaceId":"sitesp_wR3CQ","emoji":"1f600","description":"Web application information gathering, also known as web application reconnaissance or web application enumeration, is a specific type of information gathering that focuses on collecting intelligence","breadcrumbs":[{"label":"Information Gathering","emoji":"0032-20e3"}]},{"id":"2cmAjAQjNKfD3wKeNZiy","title":"Subdomain Enumeration","pathname":"/ewpt-web-application-penetration-tester/information-gathering/subdomain-enumeration","siteSpaceId":"sitesp_wR3CQ","emoji":"1f600","description":"As websites and web applications become more complex and dynamic, organizations often use subdomains to organize and manage different parts of their online presence.","breadcrumbs":[{"label":"Information Gathering","emoji":"0032-20e3"}]},{"id":"cb9CV8ZqWBf4FnypwjS0","title":"Web Application Fingerprint","pathname":"/ewpt-web-application-penetration-tester/information-gathering/web-application-fingerprint","siteSpaceId":"sitesp_wR3CQ","emoji":"1f600","description":"Web application fingerprinting, also known as application profiling, is the process of identifying and gathering information about the type, version, and configuration of a web application running...","breadcrumbs":[{"label":"Information Gathering","emoji":"0032-20e3"}]},{"id":"H5seWDMwCxfbLbOFTjHZ","title":"Crawling and Spidering","pathname":"/ewpt-web-application-penetration-tester/information-gathering/crawling-and-spidering","siteSpaceId":"sitesp_wR3CQ","emoji":"1f600","description":"In the world of web applications, crawling and spidering are two essential techniques used for gathering information from websites. These techniques involve automatically navigating through the pages","breadcrumbs":[{"label":"Information Gathering","emoji":"0032-20e3"}]},{"id":"HGUhmMqe09H9d2V3kK4q","title":"Dirbuster","pathname":"/ewpt-web-application-penetration-tester/information-gathering/dirbuster","siteSpaceId":"sitesp_wR3CQ","emoji":"1f600","description":"DirBuster is a popular open-source tool used for directory and file enumeration in web applications. It is designed to help ethical hackers and security researchers identify hidden directories and ...","breadcrumbs":[{"label":"Information Gathering","emoji":"0032-20e3"}]},{"id":"QxomchmWQtjLrZEYQY5K","title":"Information Gathering - LAB","pathname":"/ewpt-web-application-penetration-tester/information-gathering/information-gathering-lab","siteSpaceId":"sitesp_wR3CQ","description":"","breadcrumbs":[{"label":"Information Gathering","emoji":"0032-20e3"}]},{"id":"xPpCyAKl9L8wZgYx4b4C","title":"Page 1","pathname":"/ewpt-web-application-penetration-tester/web-proxies/page-1","siteSpaceId":"sitesp_wR3CQ","breadcrumbs":[{"label":"Web Proxies"}]},{"id":"RQnHdK51Y0dSbS48B1KN","title":"Cross Site Scripting - Study","pathname":"/ewpt-web-application-penetration-tester/cross-site-scripting/cross-site-scripting-study","siteSpaceId":"sitesp_wR3CQ","description":"","breadcrumbs":[{"label":"Cross Site Scripting","emoji":"0033-20e3"}]},{"id":"mdlCePUrKfddKuix6Ehn","title":"XSS Reflected and Persistent","pathname":"/ewpt-web-application-penetration-tester/cross-site-scripting/xss-reflected-and-persistent","siteSpaceId":"sitesp_wR3CQ","description":"","breadcrumbs":[{"label":"Cross Site Scripting","emoji":"0033-20e3"}]},{"id":"XJzvghpT8jJ7AXp58kdi","title":"XSS DOM","pathname":"/ewpt-web-application-penetration-tester/cross-site-scripting/xss-dom","siteSpaceId":"sitesp_wR3CQ","description":"","breadcrumbs":[{"label":"Cross Site Scripting","emoji":"0033-20e3"}]},{"id":"iVWtGpXKOyLnr93qhtcK","title":"BEEF","pathname":"/ewpt-web-application-penetration-tester/cross-site-scripting/beef","siteSpaceId":"sitesp_wR3CQ","description":"","breadcrumbs":[{"label":"Cross Site Scripting","emoji":"0033-20e3"}]},{"id":"9XEDURzvaErnjJxrJKab","title":"Cross Site Scripting - LAB","pathname":"/ewpt-web-application-penetration-tester/cross-site-scripting/cross-site-scripting-lab","siteSpaceId":"sitesp_wR3CQ","description":"","breadcrumbs":[{"label":"Cross Site Scripting","emoji":"0033-20e3"}]},{"id":"SrECJwke5jmG3uGlyEok","title":"Page 2","pathname":"/ewpt-web-application-penetration-tester/sql-injections/page-2","siteSpaceId":"sitesp_wR3CQ","description":"","breadcrumbs":[{"label":"SQL Injections","emoji":"0034-20e3"}]},{"id":"wv7VNcbYp1k2GlDbno4V","title":"Page 3","pathname":"/ewpt-web-application-penetration-tester/authentication-and-authorization/page-3","siteSpaceId":"sitesp_wR3CQ","description":"","breadcrumbs":[{"label":"Authentication and Authorization","emoji":"0035-20e3"}]},{"id":"un1mgJKbJntdXTtKGO0D","title":"Page 4","pathname":"/ewpt-web-application-penetration-tester/session-security/page-4","siteSpaceId":"sitesp_wR3CQ","description":"","breadcrumbs":[{"label":"Session Security","emoji":"0036-20e3"}]},{"id":"ngWkfPnSTBXiPLdtjXkQ","title":"Flash - Study Guide","pathname":"/ewpt-web-application-penetration-tester/flash/flash-study-guide","siteSpaceId":"sitesp_wR3CQ","description":"","breadcrumbs":[{"label":"Flash","emoji":"0037-20e3"}]},{"id":"u307Y5DnrrNBlVTiOKXC","title":"Flash Security and Attacks","pathname":"/ewpt-web-application-penetration-tester/flash/flash-security-and-attacks","siteSpaceId":"sitesp_wR3CQ","description":"Adobe Flash, also known as Shockwave Flash or simply Flash, was a multimedia software platform developed by Adobe Systems that allowed for the creation of interactive content, such as animations, ...","breadcrumbs":[{"label":"Flash","emoji":"0037-20e3"}]},{"id":"IXMZi6bG4FmBdF27Xf5q","title":"Page 6","pathname":"/ewpt-web-application-penetration-tester/html5/page-6","siteSpaceId":"sitesp_wR3CQ","description":"","breadcrumbs":[{"label":"HTML5","emoji":"0038-20e3"}]},{"id":"24HvHOciBseHxDIakZuq","title":"File and Resources Attacks - Study Guide","pathname":"/ewpt-web-application-penetration-tester/file-and-resources-attacks/file-and-resources-attacks-study-guide","siteSpaceId":"sitesp_wR3CQ","description":"","breadcrumbs":[{"label":"File and Resources Attacks","emoji":"0039-20e3"}]},{"id":"UIjg21Gtzud8MoH5O3mS","title":"File and Resources Attacks - Study","pathname":"/ewpt-web-application-penetration-tester/file-and-resources-attacks/file-and-resources-attacks-study","siteSpaceId":"sitesp_wR3CQ","description":"","breadcrumbs":[{"label":"File and Resources Attacks","emoji":"0039-20e3"}]},{"id":"1EPGr1OZaXGm0nJ94GIs","title":"File and Resources Attacks - LAB","pathname":"/ewpt-web-application-penetration-tester/file-and-resources-attacks/file-and-resources-attacks-lab","siteSpaceId":"sitesp_wR3CQ","description":"","breadcrumbs":[{"label":"File and Resources Attacks","emoji":"0039-20e3"}]},{"id":"6hjM8V7WDYX8x7X75KM5","title":"Other Attacks - Study Guide","pathname":"/ewpt-web-application-penetration-tester/other-attacks/other-attacks-study-guide","siteSpaceId":"sitesp_wR3CQ","description":"","breadcrumbs":[{"label":"Other Attacks","emoji":"1f51f"}]},{"id":"UhFpHvNU650BMfSKTVWC","title":"Clickjacking","pathname":"/ewpt-web-application-penetration-tester/other-attacks/clickjacking","siteSpaceId":"sitesp_wR3CQ","description":"","breadcrumbs":[{"label":"Other Attacks","emoji":"1f51f"}]},{"id":"vO1jD35JoC5cGtb4vKNG","title":"Other Attacks","pathname":"/ewpt-web-application-penetration-tester/other-attacks/other-attacks","siteSpaceId":"sitesp_wR3CQ","description":"","breadcrumbs":[{"label":"Other Attacks","emoji":"1f51f"}]},{"id":"hGMT78wnvVwJOIhdZtp7","title":"Web Services - Study Guide","pathname":"/ewpt-web-application-penetration-tester/web-services/web-services-study-guide","siteSpaceId":"sitesp_wR3CQ","description":"","breadcrumbs":[{"label":"Web Services"}]},{"id":"qV8Y4dUkK3ypCykzKD8R","title":"Web Services: SOAP","pathname":"/ewpt-web-application-penetration-tester/web-services/web-services-soap","siteSpaceId":"sitesp_wR3CQ","description":"","breadcrumbs":[{"label":"Web Services"}]},{"id":"bL4blPY9bA8pW60qTntx","title":"Web Services","pathname":"/ewpt-web-application-penetration-tester/web-services/web-services","siteSpaceId":"sitesp_wR3CQ","description":"","breadcrumbs":[{"label":"Web Services"}]},{"id":"BdZIYCcDvFMSzr59BTsD","title":"XPath - Study Guide","pathname":"/ewpt-web-application-penetration-tester/xpath/xpath-study-guide","siteSpaceId":"sitesp_wR3CQ","description":"","breadcrumbs":[{"label":"XPath"}]},{"id":"t72I6uS9aMiRkyOowxxq","title":"XPATH and XCAT","pathname":"/ewpt-web-application-penetration-tester/xpath/xpath-and-xcat","siteSpaceId":"sitesp_wR3CQ","description":"","breadcrumbs":[{"label":"XPath"}]},{"id":"ouhqgZ0CUe4kszAwUL17","title":"XPath","pathname":"/ewpt-web-application-penetration-tester/xpath/xpath","siteSpaceId":"sitesp_wR3CQ","description":"","breadcrumbs":[{"label":"XPath"}]},{"id":"iEMlQankJpfH6oi9cRDh","title":"Penetration Testing Content Management Systems - Study Guide","pathname":"/ewpt-web-application-penetration-tester/penetration-testing-content-management-systems/penetration-testing-content-management-systems-study-guide","siteSpaceId":"sitesp_wR3CQ","emoji":"1f600","description":"This study guide will provide an overview of penetration testing for CMS, including key concepts, methodologies, tools, and best practices.","breadcrumbs":[{"label":"Penetration Testing Content Management Systems"}]},{"id":"zvypRsIOOAiySiUvp44P","title":"Capturing WordPress Credentials for Lateral Movement","pathname":"/ewpt-web-application-penetration-tester/penetration-testing-content-management-systems/capturing-wordpress-credentials-for-lateral-movement","siteSpaceId":"sitesp_wR3CQ","description":"","breadcrumbs":[{"label":"Penetration Testing Content Management Systems"}]},{"id":"bZ26XPueJa5C0prEDZTR","title":"Exploiting a Vulnerability in WordPress Core","pathname":"/ewpt-web-application-penetration-tester/penetration-testing-content-management-systems/exploiting-a-vulnerability-in-wordpress-core","siteSpaceId":"sitesp_wR3CQ","description":"","breadcrumbs":[{"label":"Penetration Testing Content Management Systems"}]},{"id":"U99G87fT3KA7roRfHs0M","title":"Exploiting WordPress","pathname":"/ewpt-web-application-penetration-tester/penetration-testing-content-management-systems/exploiting-wordpress","siteSpaceId":"sitesp_wR3CQ","description":"","breadcrumbs":[{"label":"Penetration Testing Content Management Systems"}]},{"id":"DVgXsrqXzrJsGtAgWv9H","title":"Chaining Vulnerabilities To Remotely Extract WP Admin Credentials","pathname":"/ewpt-web-application-penetration-tester/penetration-testing-content-management-systems/chaining-vulnerabilities-to-remotely-extract-wp-admin-credentials","siteSpaceId":"sitesp_wR3CQ","description":"","breadcrumbs":[{"label":"Penetration Testing Content Management Systems"}]},{"id":"U7X5gkojg0YReunglqlR","title":"Penetration Testing NoSQL Databases - Study Guide","pathname":"/ewpt-web-application-penetration-tester/penetration-testing-nosql-databases/penetration-testing-nosql-databases-study-guide","siteSpaceId":"sitesp_wR3CQ","description":"","breadcrumbs":[{"label":"Penetration Testing NoSQL Databases"}]},{"id":"eAOgbdqO9p9JgchbFPjl","title":"Redis Exploitation - LAB","pathname":"/ewpt-web-application-penetration-tester/penetration-testing-nosql-databases/redis-exploitation-lab","siteSpaceId":"sitesp_wR3CQ","description":"","breadcrumbs":[{"label":"Penetration Testing NoSQL Databases"}]},{"id":"5KpaKPv2FTUbvYy1evdI","title":"NoSQL Injections Against MongoDB - LAB","pathname":"/ewpt-web-application-penetration-tester/penetration-testing-nosql-databases/nosql-injections-against-mongodb-lab","siteSpaceId":"sitesp_wR3CQ","description":"","breadcrumbs":[{"label":"Penetration Testing NoSQL Databases"}]},{"id":"RB0YW8Lp0UcLrRpwjpZa","title":"CouchDB Exploitation - LAB","pathname":"/ewpt-web-application-penetration-tester/penetration-testing-nosql-databases/couchdb-exploitation-lab","siteSpaceId":"sitesp_wR3CQ","description":"","breadcrumbs":[{"label":"Penetration Testing NoSQL Databases"}]},{"id":"E0pbBau6lTZLjA7j1KOH","title":"eCPPTv2 Study","pathname":"/ecpptv2-certified-professional-penetration-tester","siteSpaceId":"sitesp_lEnL1","emoji":"1f355","description":"Study notes to get eCPPT Certification. Join the community on Discord"},{"id":"A7Unp7zo9vwpCIJaLNGc","title":"Exam Description","pathname":"/ecpptv2-certified-professional-penetration-tester/certification/exam-description","siteSpaceId":"sitesp_lEnL1","emoji":"1f7e2","description":"","breadcrumbs":[{"label":"Certification"}]},{"id":"O2MjlDW4AhNE5UwbRKq2","title":"Before the Exam","pathname":"/ecpptv2-certified-professional-penetration-tester/rfs-tips/before-the-exam","siteSpaceId":"sitesp_lEnL1","emoji":"1f7e2","description":"Some tips before starting the exam.","breadcrumbs":[{"label":"RFS Tips"}]},{"id":"ufu9LjJ88FVCA4ugfdEa","title":"Prepare your Setup","pathname":"/ecpptv2-certified-professional-penetration-tester/rfs-tips/prepare-your-setup","siteSpaceId":"sitesp_lEnL1","emoji":"1f7e2","description":"Prepare your setup to eCPPTv2 certification.","breadcrumbs":[{"label":"RFS Tips"}]},{"id":"6jvUQgc2FYVLvmBmJzPi","title":"Questions?","pathname":"/ecpptv2-certified-professional-penetration-tester/rfs-tips/questions","siteSpaceId":"sitesp_lEnL1","emoji":"1f7e2","description":"","breadcrumbs":[{"label":"RFS Tips"}]},{"id":"PeUP69jVsVjstywQqCoU","title":"Learn more... Get eCPPTv2","pathname":"/ecpptv2-certified-professional-penetration-tester/rfs-tips/learn-more...-get-ecpptv2","siteSpaceId":"sitesp_lEnL1","emoji":"1f393","description":"All documentation you need to pass eCPPTv2 with free training.","breadcrumbs":[{"label":"RFS Tips"}]},{"id":"PKAPSJ3ARWjC1c3VA8la","title":"Start Hacking","pathname":"/ecpptv2-certified-professional-penetration-tester/rfs-tips/start-hacking","siteSpaceId":"sitesp_lEnL1","emoji":"1f7e2","description":"","breadcrumbs":[{"label":"RFS Tips"}]},{"id":"bs1RMgDU1lvwo7VhE570","title":"PwnDoc Documentation","pathname":"/ecpptv2-certified-professional-penetration-tester/reports/pwndoc-documentation","siteSpaceId":"sitesp_lEnL1","description":"Explore our comprehensive article on PwnDoc, unraveling its function, advantages, and usage. Discover how PwnDoc plays a key role in managing and creating pentest reports.","breadcrumbs":[{"label":"Reports"}]},{"id":"BlJkzK7c4QRDJEg9edNK","title":"Templates","pathname":"/ecpptv2-certified-professional-penetration-tester/reports/templates","siteSpaceId":"sitesp_lEnL1","emoji":"1f7e2","description":"eCPPT report templates","breadcrumbs":[{"label":"Reports"}]},{"id":"Ywsk5l6VbgVz14hurxrW","title":"To Scan a Network","pathname":"/ecpptv2-certified-professional-penetration-tester/methodology/to-scan-a-network","siteSpaceId":"sitesp_lEnL1","emoji":"1f7e2","description":"Methodology To Scan a Network on a Penetration testing assessment, understand what to do without triggering IDS alarms.","breadcrumbs":[{"label":"Methodology"}]},{"id":"Yge2PuEMtL40IhV2dRZI","title":"To Attack a Linux Machine","pathname":"/ecpptv2-certified-professional-penetration-tester/methodology/to-attack-a-linux-machine","siteSpaceId":"sitesp_lEnL1","emoji":"1f7e2","description":"Methodology To Attack a Linux Machine","breadcrumbs":[{"label":"Methodology"}]},{"id":"P8RLyY3CYwjMkKIPvNyP","title":"To Attack a Windows Machine","pathname":"/ecpptv2-certified-professional-penetration-tester/methodology/to-attack-a-windows-machine","siteSpaceId":"sitesp_lEnL1","emoji":"1f7e2","description":"Methodology To Attack a Windows Machine","breadcrumbs":[{"label":"Methodology"}]},{"id":"BMrPzaho97dxca81Iiuk","title":"Linux Privilege Escalation","pathname":"/ecpptv2-certified-professional-penetration-tester/methodology/linux-privilege-escalation","siteSpaceId":"sitesp_lEnL1","emoji":"1f7e0","description":"Methodology to Privilege Escalation on Linux","breadcrumbs":[{"label":"Methodology"}]},{"id":"szu8IeZ3SZ7xLDx5qatN","title":"Windows Privilege Escalation","pathname":"/ecpptv2-certified-professional-penetration-tester/methodology/windows-privilege-escalation","siteSpaceId":"sitesp_lEnL1","description":"Methodology to Privilege Escalation on Windows","breadcrumbs":[{"label":"Methodology"}]},{"id":"fawxalQSTFu1hVlXQEdP","title":"Linux Post Exploitation","pathname":"/ecpptv2-certified-professional-penetration-tester/methodology/linux-post-exploitation","siteSpaceId":"sitesp_lEnL1","description":"Linux Post Exploitation Methodology","breadcrumbs":[{"label":"Methodology"}]},{"id":"vjLglJjGPh2JLrKLfP8R","title":"Windows Post Exploitation","pathname":"/ecpptv2-certified-professional-penetration-tester/methodology/windows-post-exploitation","siteSpaceId":"sitesp_lEnL1","description":"Windows Post Exploitation Methodology","breadcrumbs":[{"label":"Methodology"}]},{"id":"XTy5lTTaxaQhWhXP2Er0","title":"Pivoting Methodology","pathname":"/ecpptv2-certified-professional-penetration-tester/methodology/pivoting-methodology","siteSpaceId":"sitesp_lEnL1","description":"Methodology to Pivoting Inside Networks","breadcrumbs":[{"label":"Methodology"}]},{"id":"GDcB4oVS1Rkt7kdwNlaH","title":"Why these Tools","pathname":"/ecpptv2-certified-professional-penetration-tester/web-tools/why-these-tools","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Web Tools"}]},{"id":"ixqErqOjc3DD6pwgkFok","title":"Information Gathering","pathname":"/ecpptv2-certified-professional-penetration-tester/network-security/information-gathering","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Network Security"}]},{"id":"yJeeHu1bnNsqm07qb77p","title":"Intro","pathname":"/ecpptv2-certified-professional-penetration-tester/network-security/information-gathering/intro","siteSpaceId":"sitesp_lEnL1","description":"What is information gathering? Its all about reconnaissance on the target, collect much information as you can active or passively.","breadcrumbs":[{"label":"Network Security"},{"label":"Information Gathering"}]},{"id":"w9TFEJfl8KheMUNUHDR8","title":"Passive / Active","pathname":"/ecpptv2-certified-professional-penetration-tester/network-security/information-gathering/passive-active","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Information Gathering"}]},{"id":"8E6JbHMU6Nxafy5StvrH","title":"OSINT","pathname":"/ecpptv2-certified-professional-penetration-tester/network-security/information-gathering/osint","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Information Gathering"}]},{"id":"28L7p6s2H2cD6YPUMKTC","title":"Social Media","pathname":"/ecpptv2-certified-professional-penetration-tester/network-security/information-gathering/social-media","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Information Gathering"}]},{"id":"U3k2Ce7F663OCssJ8kYh","title":"Infrastructure","pathname":"/ecpptv2-certified-professional-penetration-tester/network-security/information-gathering/infrastructure","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Information Gathering"}]},{"id":"jvYCKNEAClwKVHburmBd","title":"DNS","pathname":"/ecpptv2-certified-professional-penetration-tester/network-security/information-gathering/dns","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Information Gathering"}]},{"id":"XG0IBeeqsBMm5A6fWvIV","title":"NSlookup","pathname":"/ecpptv2-certified-professional-penetration-tester/network-security/information-gathering/dns/nslookup","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Information Gathering"},{"label":"DNS"}]},{"id":"mTdRiKjAVnwtgpLp06cb","title":"Dig","pathname":"/ecpptv2-certified-professional-penetration-tester/network-security/information-gathering/dns/dig","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Information Gathering"},{"label":"DNS"}]},{"id":"KtyVaJpjZbWsjNx70Bic","title":"fierce","pathname":"/ecpptv2-certified-professional-penetration-tester/network-security/information-gathering/dns/fierce","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Information Gathering"},{"label":"DNS"}]},{"id":"1HTP6JUXvxDkbuLoZKpY","title":"DNSenum","pathname":"/ecpptv2-certified-professional-penetration-tester/network-security/information-gathering/dns/dnsenum","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Information Gathering"},{"label":"DNS"}]},{"id":"wO0mOtHystkB46Gcbnxb","title":"DNSmap","pathname":"/ecpptv2-certified-professional-penetration-tester/network-security/information-gathering/dns/dnsmap","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Information Gathering"},{"label":"DNS"}]},{"id":"zvZWFdyPRG5rrurQo4md","title":"DNSrecon","pathname":"/ecpptv2-certified-professional-penetration-tester/network-security/information-gathering/dns/dnsrecon","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Information Gathering"},{"label":"DNS"}]},{"id":"8ATaJ86FbiTZqkcSCJdT","title":"Host Discovery","pathname":"/ecpptv2-certified-professional-penetration-tester/network-security/information-gathering/host-discovery","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Information Gathering"}]},{"id":"tHvsMDfiKV7UbZK1aQDa","title":"Fping","pathname":"/ecpptv2-certified-professional-penetration-tester/network-security/information-gathering/host-discovery/fping","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Information Gathering"},{"label":"Host Discovery"}]},{"id":"FX3R7fxwVORH4b6IvEId","title":"Hping","pathname":"/ecpptv2-certified-professional-penetration-tester/network-security/information-gathering/host-discovery/hping","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Information Gathering"},{"label":"Host Discovery"}]},{"id":"iZeDXchoowibRAnKdnjS","title":"Nmap","pathname":"/ecpptv2-certified-professional-penetration-tester/network-security/information-gathering/host-discovery/nmap","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Information Gathering"},{"label":"Host Discovery"}]},{"id":"UmCBgaG6qjnRkomB9Ymw","title":"Maltego","pathname":"/ecpptv2-certified-professional-penetration-tester/network-security/information-gathering/maltego","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Information Gathering"}]},{"id":"YeeXsFWjFD6dYJeKqjG5","title":"Foca","pathname":"/ecpptv2-certified-professional-penetration-tester/network-security/information-gathering/foca","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Information Gathering"}]},{"id":"f7pTT6eegFLjaVpyLr8Q","title":"Breach Data","pathname":"/ecpptv2-certified-professional-penetration-tester/network-security/information-gathering/breach-data","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Information Gathering"}]},{"id":"AhiorUi87zO3CafhB1U4","title":"Scanning","pathname":"/ecpptv2-certified-professional-penetration-tester/network-security/scanning","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Network Security"}]},{"id":"KLDfyiHVL9bZCidLXSZy","title":"Intro","pathname":"/ecpptv2-certified-professional-penetration-tester/network-security/scanning/intro","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Scanning"}]},{"id":"X9Fivy3WEDVgZ8rPbCkV","title":"Wireshark","pathname":"/ecpptv2-certified-professional-penetration-tester/network-security/scanning/wireshark","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Scanning"}]},{"id":"MOYsda9urJsEL623tYhQ","title":"Promiscuous Interface","pathname":"/ecpptv2-certified-professional-penetration-tester/network-security/scanning/wireshark/promiscuous-interface","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Scanning"},{"label":"Wireshark"}]},{"id":"JTx38Hk58lZ3O4dm4WLW","title":"Filters","pathname":"/ecpptv2-certified-professional-penetration-tester/network-security/scanning/wireshark/filters","siteSpaceId":"sitesp_lEnL1","emoji":"1f7e2","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Scanning"},{"label":"Wireshark"}]},{"id":"VSUpN3PTPf1Zz565p02F","title":"Colors","pathname":"/ecpptv2-certified-professional-penetration-tester/network-security/scanning/wireshark/colors","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Scanning"},{"label":"Wireshark"}]},{"id":"sOZRECdgj6JFS1BrOFNj","title":"Follow Stream","pathname":"/ecpptv2-certified-professional-penetration-tester/network-security/scanning/wireshark/follow-stream","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Scanning"},{"label":"Wireshark"}]},{"id":"K8Qfp6OF5nw7FRqR3Vum","title":"Scan Types","pathname":"/ecpptv2-certified-professional-penetration-tester/network-security/scanning/scan-types","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Scanning"}]},{"id":"gf5f77vpKEw4TV4a4moe","title":"Hping3","pathname":"/ecpptv2-certified-professional-penetration-tester/network-security/scanning/hping3","siteSpaceId":"sitesp_lEnL1","emoji":"1f7e2","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Scanning"}]},{"id":"KmbGbLiAjgKdNmo7zUyx","title":"Nmap","pathname":"/ecpptv2-certified-professional-penetration-tester/network-security/scanning/nmap","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Scanning"}]},{"id":"rFQUM10PAbhcpJe7wjPs","title":"eCPPTv2 - Firewall IDS Evasion","pathname":"/ecpptv2-certified-professional-penetration-tester/network-security/scanning/ecpptv2-firewall-ids-evasion","siteSpaceId":"sitesp_lEnL1","emoji":"1f49a","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Scanning"}]},{"id":"VMdNAdw2yFmct5W5geEf","title":"Enumeration","pathname":"/ecpptv2-certified-professional-penetration-tester/network-security/enumeration","siteSpaceId":"sitesp_lEnL1","emoji":"1f7e2","description":"eCPPTv2 Enumeration process to attack all machines in your exam.","breadcrumbs":[{"label":"Network Security"}]},{"id":"ajWHb7n2iUbR3Cmht54a","title":"Sniffing & MitM Attacks","pathname":"/ecpptv2-certified-professional-penetration-tester/network-security/sniffing-and-mitm-attacks","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Network Security"}]},{"id":"f3SAYG77jS28sJDbCv7e","title":"Passive","pathname":"/ecpptv2-certified-professional-penetration-tester/network-security/sniffing-and-mitm-attacks/passive","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Sniffing & MitM Attacks"}]},{"id":"gLYECSqidiFby7bWFmxA","title":"Active","pathname":"/ecpptv2-certified-professional-penetration-tester/network-security/sniffing-and-mitm-attacks/active","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Sniffing & MitM Attacks"}]},{"id":"8Ldzyb7epFufWBnOrNiy","title":"MiTM","pathname":"/ecpptv2-certified-professional-penetration-tester/network-security/sniffing-and-mitm-attacks/mitm","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Sniffing & MitM Attacks"}]},{"id":"W7Mg43ew6yuo83gF5vXs","title":"Local to Remote","pathname":"/ecpptv2-certified-professional-penetration-tester/network-security/sniffing-and-mitm-attacks/mitm/local-to-remote","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Sniffing & MitM Attacks"},{"label":"MiTM"}]},{"id":"elgoQEfHUUi7x1Anmwbn","title":"DHCP Spoofing","pathname":"/ecpptv2-certified-professional-penetration-tester/network-security/sniffing-and-mitm-attacks/mitm/dhcp-spoofing","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Sniffing & MitM Attacks"},{"label":"MiTM"}]},{"id":"6Q8YQr6KpFejCRXotS79","title":"LLMNR Poisoning","pathname":"/ecpptv2-certified-professional-penetration-tester/network-security/sniffing-and-mitm-attacks/mitm/llmnr-poisoning","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Sniffing & MitM Attacks"},{"label":"MiTM"}]},{"id":"EnYKPZTQJWGDZa1yRjiD","title":"NBT-NS Poisoning","pathname":"/ecpptv2-certified-professional-penetration-tester/network-security/sniffing-and-mitm-attacks/mitm/nbt-ns-poisoning","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Sniffing & MitM Attacks"},{"label":"MiTM"}]},{"id":"uSFrrAWrof9vl08O3k4l","title":"Tools","pathname":"/ecpptv2-certified-professional-penetration-tester/network-security/sniffing-and-mitm-attacks/tools","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Sniffing & MitM Attacks"}]},{"id":"w5dopQgUtAbqJjz6ydH8","title":"Dsniff","pathname":"/ecpptv2-certified-professional-penetration-tester/network-security/sniffing-and-mitm-attacks/tools/dsniff","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Sniffing & MitM Attacks"},{"label":"Tools"}]},{"id":"ycUjZNUtgdFI4GN9DifR","title":"Wireshark","pathname":"/ecpptv2-certified-professional-penetration-tester/network-security/sniffing-and-mitm-attacks/tools/wireshark","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Sniffing & MitM Attacks"},{"label":"Tools"}]},{"id":"027vit3R18YZ6NQCQnHv","title":"TCPDump","pathname":"/ecpptv2-certified-professional-penetration-tester/network-security/sniffing-and-mitm-attacks/tools/tcpdump","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Sniffing & MitM Attacks"},{"label":"Tools"}]},{"id":"pggNx26tsElq6c1T2dX5","title":"Ethercap","pathname":"/ecpptv2-certified-professional-penetration-tester/network-security/sniffing-and-mitm-attacks/tools/ethercap","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Network Security"},{"label":"Sniffing & MitM Attacks"},{"label":"Tools"}]},{"id":"vX2mps1bdAM3BYyt3IlR","title":"Exploitation","pathname":"/ecpptv2-certified-professional-penetration-tester/network-security/exploitation","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Network Security"}]},{"id":"wqK6FxIoowk6q2WBbZW0","title":"Post Exploitation","pathname":"/ecpptv2-certified-professional-penetration-tester/network-security/post-exploitation","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Network Security"}]},{"id":"lZVKRMavf79SIFtaALT7","title":"Social Engineering","pathname":"/ecpptv2-certified-professional-penetration-tester/network-security/social-engineering","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Network Security"}]},{"id":"L6vYROw1Vhvv8SkWT0MM","title":"Anonymity","pathname":"/ecpptv2-certified-professional-penetration-tester/network-security/anonymity","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Network Security"}]},{"id":"uf4pqx1B8oam7mBeVNoW","title":"Introduction","pathname":"/ecpptv2-certified-professional-penetration-tester/linux-exploitation/introduction","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Linux Exploitation"}]},{"id":"JXmRSr7kZ05GYZGVlusH","title":"Information Gathering","pathname":"/ecpptv2-certified-professional-penetration-tester/linux-exploitation/information-gathering","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Linux Exploitation"}]},{"id":"ioy84hdj3OWJcokqcpRq","title":"Remote Enumeration","pathname":"/ecpptv2-certified-professional-penetration-tester/linux-exploitation/information-gathering/remote-enumeration","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Linux Exploitation"},{"label":"Information Gathering"}]},{"id":"IlGPPrfMYo6aPzbN2yLH","title":"Enum NFS","pathname":"/ecpptv2-certified-professional-penetration-tester/linux-exploitation/information-gathering/remote-enumeration/enum-nfs","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Linux Exploitation"},{"label":"Information Gathering"},{"label":"Remote Enumeration"}]},{"id":"cxXt3efr6opIIxAUbk91","title":"rpcbind","pathname":"/ecpptv2-certified-professional-penetration-tester/linux-exploitation/information-gathering/remote-enumeration/rpcbind","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Linux Exploitation"},{"label":"Information Gathering"},{"label":"Remote Enumeration"}]},{"id":"FDtCo80gTRZrf7MoSzuu","title":"SMB","pathname":"/ecpptv2-certified-professional-penetration-tester/linux-exploitation/information-gathering/remote-enumeration/smb","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Linux Exploitation"},{"label":"Information Gathering"},{"label":"Remote Enumeration"}]},{"id":"TaX3n0zMxmU2Jg1alb01","title":"SMTP","pathname":"/ecpptv2-certified-professional-penetration-tester/linux-exploitation/information-gathering/remote-enumeration/smtp","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Linux Exploitation"},{"label":"Information Gathering"},{"label":"Remote Enumeration"}]},{"id":"rQUNHdjM5VyzErdMr2Cn","title":"Local Enumeration","pathname":"/ecpptv2-certified-professional-penetration-tester/linux-exploitation/information-gathering/local-enumeration","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Linux Exploitation"},{"label":"Information Gathering"}]},{"id":"zI4KsBks8zkkc867tEb6","title":"Network Info","pathname":"/ecpptv2-certified-professional-penetration-tester/linux-exploitation/information-gathering/local-enumeration/network-info","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Linux Exploitation"},{"label":"Information Gathering"},{"label":"Local Enumeration"}]},{"id":"FyixfY9hHYKKQYZ4db9n","title":"System Info","pathname":"/ecpptv2-certified-professional-penetration-tester/linux-exploitation/information-gathering/local-enumeration/system-info","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Linux Exploitation"},{"label":"Information Gathering"},{"label":"Local Enumeration"}]},{"id":"jm9hCP7reW3s7BbAN1gj","title":"Exploitation over the Network","pathname":"/ecpptv2-certified-professional-penetration-tester/linux-exploitation/exploitation-over-the-network","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Linux Exploitation"}]},{"id":"jBP3DCGwIeDAO7KOwn8y","title":"Samba","pathname":"/ecpptv2-certified-professional-penetration-tester/linux-exploitation/exploitation-over-the-network/samba","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Linux Exploitation"},{"label":"Exploitation over the Network"}]},{"id":"dGVt88SpWeTjSIcqwG7E","title":"UserMap CVE-2007-2447","pathname":"/ecpptv2-certified-professional-penetration-tester/linux-exploitation/exploitation-over-the-network/samba/usermap-cve-2007-2447","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Linux Exploitation"},{"label":"Exploitation over the Network"},{"label":"Samba"}]},{"id":"ZpNt8gWOyjuDIrcef3Ug","title":"SymLink Directory Traversal","pathname":"/ecpptv2-certified-professional-penetration-tester/linux-exploitation/exploitation-over-the-network/samba/symlink-directory-traversal","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Linux Exploitation"},{"label":"Exploitation over the Network"},{"label":"Samba"}]},{"id":"J9lh4XI4jjxTK8P0pkHY","title":"SambaCry CVE-2017-7494","pathname":"/ecpptv2-certified-professional-penetration-tester/linux-exploitation/exploitation-over-the-network/samba/sambacry-cve-2017-7494","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Linux Exploitation"},{"label":"Exploitation over the Network"},{"label":"Samba"}]},{"id":"QxaiPuHQMu8fN5KyKHY8","title":"Writeable Share to RCE","pathname":"/ecpptv2-certified-professional-penetration-tester/linux-exploitation/exploitation-over-the-network/samba/writeable-share-to-rce","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Linux Exploitation"},{"label":"Exploitation over the Network"},{"label":"Samba"}]},{"id":"NGkCLj9zmHq6Du3Z1ho4","title":"PHP CGI","pathname":"/ecpptv2-certified-professional-penetration-tester/linux-exploitation/exploitation-over-the-network/php-cgi","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Linux Exploitation"},{"label":"Exploitation over the Network"}]},{"id":"3rpA9pDdy6S5EhTAGLQU","title":"Ruby DRB RMI port 8787","pathname":"/ecpptv2-certified-professional-penetration-tester/linux-exploitation/exploitation-over-the-network/ruby-drb-rmi-port-8787","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Linux Exploitation"},{"label":"Exploitation over the Network"}]},{"id":"q4SbwH3y0l1ah5YuTfAD","title":"JAVA RMI Registry - port 1099","pathname":"/ecpptv2-certified-professional-penetration-tester/linux-exploitation/exploitation-over-the-network/java-rmi-registry-port-1099","siteSpaceId":"sitesp_lEnL1","description":"Java RMI Server Insecure Default Configuration Java Code Execution","breadcrumbs":[{"label":"Linux Exploitation"},{"label":"Exploitation over the Network"}]},{"id":"oytagUTpie6UL0RPNgXO","title":"Exploiting Java Deserialization","pathname":"/ecpptv2-certified-professional-penetration-tester/linux-exploitation/exploitation-over-the-network/exploiting-java-deserialization","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Linux Exploitation"},{"label":"Exploitation over the Network"}]},{"id":"GOcYEpZopQy0FA2L5kIk","title":"TomCat","pathname":"/ecpptv2-certified-professional-penetration-tester/linux-exploitation/exploitation-over-the-network/tomcat","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Linux Exploitation"},{"label":"Exploitation over the Network"}]},{"id":"Oa3MpaxS4MhYgC7eQhWm","title":"Password Spray Attack","pathname":"/ecpptv2-certified-professional-penetration-tester/linux-exploitation/exploitation-over-the-network/password-spray-attack","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Linux Exploitation"},{"label":"Exploitation over the Network"}]},{"id":"64j4VbixfpDJ5ckO4O6m","title":"Shellshock","pathname":"/ecpptv2-certified-professional-penetration-tester/linux-exploitation/exploitation-over-the-network/shellshock","siteSpaceId":"sitesp_lEnL1","description":"CVE-2014-6271","breadcrumbs":[{"label":"Linux Exploitation"},{"label":"Exploitation over the Network"}]},{"id":"0V30YrENZ2H2hgDesf6x","title":"Heartbleed","pathname":"/ecpptv2-certified-professional-penetration-tester/linux-exploitation/exploitation-over-the-network/heartbleed","siteSpaceId":"sitesp_lEnL1","description":"The Heartbleed Bug is a serious vulnerability in the popular OpenSSL cryptographic software library.","breadcrumbs":[{"label":"Linux Exploitation"},{"label":"Exploitation over the Network"}]},{"id":"0ocgzAh2zSzwFm8362dN","title":"Post Exploitation","pathname":"/ecpptv2-certified-professional-penetration-tester/linux-exploitation/post-exploitation","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Linux Exploitation"}]},{"id":"r07OHKpsSwbyffkkA20f","title":"Intro","pathname":"/ecpptv2-certified-professional-penetration-tester/linux-exploitation/post-exploitation/intro","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Linux Exploitation"},{"label":"Post Exploitation"}]},{"id":"omDBl5zEr2WFxLsNulf0","title":"msfconsole scripts","pathname":"/ecpptv2-certified-professional-penetration-tester/linux-exploitation/post-exploitation/msfconsole-scripts","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Linux Exploitation"},{"label":"Post Exploitation"}]},{"id":"imb9fD1TMryAolSULA75","title":"Privilege Escalation","pathname":"/ecpptv2-certified-professional-penetration-tester/linux-exploitation/post-exploitation/privilege-escalation","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Linux Exploitation"},{"label":"Post Exploitation"}]},{"id":"KzIsIp0eqh3eEXOJfo0Z","title":"Docker","pathname":"/ecpptv2-certified-professional-penetration-tester/linux-exploitation/post-exploitation/privilege-escalation/docker","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Linux Exploitation"},{"label":"Post Exploitation"},{"label":"Privilege Escalation"}]},{"id":"0HFCdtn1igbv0P361DLK","title":"Unix Sockets Exploitation","pathname":"/ecpptv2-certified-professional-penetration-tester/linux-exploitation/post-exploitation/privilege-escalation/docker/unix-sockets-exploitation","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Linux Exploitation"},{"label":"Post Exploitation"},{"label":"Privilege Escalation"},{"label":"Docker"}]},{"id":"Z2Q7ryEDDpW8iZzRGZBL","title":"Restricted Shells","pathname":"/ecpptv2-certified-professional-penetration-tester/linux-exploitation/post-exploitation/privilege-escalation/restricted-shells","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Linux Exploitation"},{"label":"Post Exploitation"},{"label":"Privilege Escalation"}]},{"id":"Oe9sHWQs8SauxWq5lc43","title":"Cracking Shadow File","pathname":"/ecpptv2-certified-professional-penetration-tester/linux-exploitation/post-exploitation/privilege-escalation/cracking-shadow-file","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Linux Exploitation"},{"label":"Post Exploitation"},{"label":"Privilege Escalation"}]},{"id":"0dcYMLtmquXz6M5ttx7P","title":"Dump Memory Credentials","pathname":"/ecpptv2-certified-professional-penetration-tester/linux-exploitation/post-exploitation/privilege-escalation/dump-memory-credentials","siteSpaceId":"sitesp_lEnL1","emoji":"1f7e2","description":"","breadcrumbs":[{"label":"Linux Exploitation"},{"label":"Post Exploitation"},{"label":"Privilege Escalation"}]},{"id":"RxtBqu5IbQANTBnOh1Fn","title":"Dump SWAP Credentials","pathname":"/ecpptv2-certified-professional-penetration-tester/linux-exploitation/post-exploitation/privilege-escalation/dump-swap-credentials","siteSpaceId":"sitesp_lEnL1","emoji":"1f7e2","description":"","breadcrumbs":[{"label":"Linux Exploitation"},{"label":"Post Exploitation"},{"label":"Privilege Escalation"}]},{"id":"NWd0jNslx50Domdr0o6F","title":"Shared Object Libraries","pathname":"/ecpptv2-certified-professional-penetration-tester/linux-exploitation/post-exploitation/privilege-escalation/shared-object-libraries","siteSpaceId":"sitesp_lEnL1","emoji":"1f7e2","description":"","breadcrumbs":[{"label":"Linux Exploitation"},{"label":"Post Exploitation"},{"label":"Privilege Escalation"}]},{"id":"sGE3xznmiovLjkktpfP9","title":"Kernel Exploits","pathname":"/ecpptv2-certified-professional-penetration-tester/linux-exploitation/post-exploitation/privilege-escalation/kernel-exploits","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Linux Exploitation"},{"label":"Post Exploitation"},{"label":"Privilege Escalation"}]},{"id":"REZ6vguTMZ5SsVWqUQmX","title":"Dirty Cow","pathname":"/ecpptv2-certified-professional-penetration-tester/linux-exploitation/post-exploitation/privilege-escalation/kernel-exploits/dirty-cow","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Linux Exploitation"},{"label":"Post Exploitation"},{"label":"Privilege Escalation"},{"label":"Kernel Exploits"}]},{"id":"M2BADBpM9TJdPsyIdHeR","title":"Stack Clash","pathname":"/ecpptv2-certified-professional-penetration-tester/linux-exploitation/post-exploitation/privilege-escalation/kernel-exploits/stack-clash","siteSpaceId":"sitesp_lEnL1","description":"The Stack Clash is a vulnerability in the memory management of several operating systems.","breadcrumbs":[{"label":"Linux Exploitation"},{"label":"Post Exploitation"},{"label":"Privilege Escalation"},{"label":"Kernel Exploits"}]},{"id":"I8c5u3riVpmGa3nPgafO","title":"DCCP","pathname":"/ecpptv2-certified-professional-penetration-tester/linux-exploitation/post-exploitation/privilege-escalation/kernel-exploits/dccp","siteSpaceId":"sitesp_lEnL1","description":"Linux Kernel 4.4.0 (Ubuntu) - DCCP Double-Free Privilege Escalation","breadcrumbs":[{"label":"Linux Exploitation"},{"label":"Post Exploitation"},{"label":"Privilege Escalation"},{"label":"Kernel Exploits"}]},{"id":"5P32oj6m9kZe5g1fTS8O","title":"Race Condition","pathname":"/ecpptv2-certified-professional-penetration-tester/linux-exploitation/post-exploitation/privilege-escalation/kernel-exploits/race-condition","siteSpaceId":"sitesp_lEnL1","description":"Linux kernel < 4.10.15 - Race Condition Privilege Escalation","breadcrumbs":[{"label":"Linux Exploitation"},{"label":"Post Exploitation"},{"label":"Privilege Escalation"},{"label":"Kernel Exploits"}]},{"id":"wpLNK1gL17OYEB1mKZoI","title":"msfconsole","pathname":"/ecpptv2-certified-professional-penetration-tester/linux-exploitation/post-exploitation/privilege-escalation/kernel-exploits/msfconsole","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Linux Exploitation"},{"label":"Post Exploitation"},{"label":"Privilege Escalation"},{"label":"Kernel Exploits"}]},{"id":"K5MTHNQipBfY8YNCszM9","title":"Lateral Movement","pathname":"/ecpptv2-certified-professional-penetration-tester/linux-exploitation/post-exploitation/lateral-movement","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Linux Exploitation"},{"label":"Post Exploitation"}]},{"id":"xAyoXwGkPGuzcPcvVmc6","title":"Samba","pathname":"/ecpptv2-certified-professional-penetration-tester/linux-exploitation/post-exploitation/lateral-movement/samba","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Linux Exploitation"},{"label":"Post Exploitation"},{"label":"Lateral Movement"}]},{"id":"qvd7NLpm5sS6BCCkNvKR","title":"Dump Samba Secrets","pathname":"/ecpptv2-certified-professional-penetration-tester/linux-exploitation/post-exploitation/lateral-movement/samba/dump-samba-secrets","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Linux Exploitation"},{"label":"Post Exploitation"},{"label":"Lateral Movement"},{"label":"Samba"}]},{"id":"M8NC4xLoiIWxoSmLKncW","title":"SSH","pathname":"/ecpptv2-certified-professional-penetration-tester/linux-exploitation/post-exploitation/lateral-movement/ssh","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Linux Exploitation"},{"label":"Post Exploitation"},{"label":"Lateral Movement"}]},{"id":"bJW0RJ6EqMD6QrddYTX4","title":"SSH Hijacking","pathname":"/ecpptv2-certified-professional-penetration-tester/linux-exploitation/post-exploitation/lateral-movement/ssh/ssh-hijacking","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Linux Exploitation"},{"label":"Post Exploitation"},{"label":"Lateral Movement"},{"label":"SSH"}]},{"id":"V1sdpTRDhCy4PWMiJIx6","title":"Steal SSH credentials","pathname":"/ecpptv2-certified-professional-penetration-tester/linux-exploitation/post-exploitation/lateral-movement/ssh/steal-ssh-credentials","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Linux Exploitation"},{"label":"Post Exploitation"},{"label":"Lateral Movement"},{"label":"SSH"}]},{"id":"cve8Gnre3ep2zcn5QDLv","title":"VPNPivot","pathname":"/ecpptv2-certified-professional-penetration-tester/linux-exploitation/post-exploitation/lateral-movement/vpnpivot","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Linux Exploitation"},{"label":"Post Exploitation"},{"label":"Lateral Movement"}]},{"id":"alSL16tswl3Rsa5smM6F","title":"Dump Firefox Credentials","pathname":"/ecpptv2-certified-professional-penetration-tester/linux-exploitation/post-exploitation/lateral-movement/dump-firefox-credentials","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Linux Exploitation"},{"label":"Post Exploitation"},{"label":"Lateral Movement"}]},{"id":"UPlhgA42zIl88zWmTa1T","title":"Sniffing","pathname":"/ecpptv2-certified-professional-penetration-tester/linux-exploitation/post-exploitation/lateral-movement/sniffing","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Linux Exploitation"},{"label":"Post Exploitation"},{"label":"Lateral Movement"}]},{"id":"cQgntoehQ2NNll7nJ0ct","title":"Data Exfiltration","pathname":"/ecpptv2-certified-professional-penetration-tester/linux-exploitation/post-exploitation/data-exfiltration","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Linux Exploitation"},{"label":"Post Exploitation"}]},{"id":"UTE7dHiK5NO4kGNWfARk","title":"Maintaining Access","pathname":"/ecpptv2-certified-professional-penetration-tester/linux-exploitation/post-exploitation/maintaining-access","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Linux Exploitation"},{"label":"Post Exploitation"}]},{"id":"j84yNj2KF8tuhSNB39yd","title":"HTTPS","pathname":"/ecpptv2-certified-professional-penetration-tester/linux-exploitation/post-exploitation/maintaining-access/https","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Linux Exploitation"},{"label":"Post Exploitation"},{"label":"Maintaining Access"}]},{"id":"1FxZ2wg7orQZDi1kkv3y","title":"Reverse Shells","pathname":"/ecpptv2-certified-professional-penetration-tester/linux-exploitation/post-exploitation/maintaining-access/reverse-shells","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Linux Exploitation"},{"label":"Post Exploitation"},{"label":"Maintaining Access"}]},{"id":"Fg0dabDFMSLKWcaSnm6K","title":"Custom Services","pathname":"/ecpptv2-certified-professional-penetration-tester/linux-exploitation/post-exploitation/maintaining-access/custom-services","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Linux Exploitation"},{"label":"Post Exploitation"},{"label":"Maintaining Access"}]},{"id":"ceg8BdHTsJwSo89mbH82","title":"Notes","pathname":"/ecpptv2-certified-professional-penetration-tester/metasploit/notes","siteSpaceId":"sitesp_lEnL1","description":"Metasploit study for eCPPTv2 certification by INE. Learn how to use Metasploit to simple pass your exam using advanced techniques.","breadcrumbs":[{"label":"Metasploit"}]},{"id":"q5ZsozGlV9KJNB6Y5xDI","title":"Detect Live Hosts with Metasploit","pathname":"/ecpptv2-certified-professional-penetration-tester/metasploit/detect-live-hosts-with-metasploit","siteSpaceId":"sitesp_lEnL1","emoji":"1f7e2","description":"How to detect live hosts with Metasploit inside a corporate network.","breadcrumbs":[{"label":"Metasploit"}]},{"id":"NpINjyobcih4kH2gvRG4","title":"Port Scanning with Metasploit","pathname":"/ecpptv2-certified-professional-penetration-tester/metasploit/port-scanning-with-metasploit","siteSpaceId":"sitesp_lEnL1","emoji":"1f7e2","description":"Learn how to use Metasploit to scan remote hosts while pivoting.","breadcrumbs":[{"label":"Metasploit"}]},{"id":"DKaukFqVNutSUg7jQg0T","title":"Network Services Scanning","pathname":"/ecpptv2-certified-professional-penetration-tester/metasploit/network-services-scanning","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Metasploit"}]},{"id":"11dz5ZpFOy9zDF2EZbTk","title":"Payloads","pathname":"/ecpptv2-certified-professional-penetration-tester/metasploit/payloads","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Metasploit"}]},{"id":"rBuIZMYJvI3AuV1ZRn3B","title":"Exploitation with Metasploit","pathname":"/ecpptv2-certified-professional-penetration-tester/metasploit/exploitation-with-metasploit","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Metasploit"}]},{"id":"doOylsgI0UJviPwybyk7","title":"Post Exploitation with Metasploit","pathname":"/ecpptv2-certified-professional-penetration-tester/metasploit/post-exploitation-with-metasploit","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Metasploit"}]},{"id":"HPNwBWVs9kkFBhVKiCWK","title":"Page 5","pathname":"/ecpptv2-certified-professional-penetration-tester/system-security/page-5","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"System Security"}]},{"id":"3lNvTEITT4XKNVLBN9CW","title":"Best Academy","pathname":"/ecpptv2-certified-professional-penetration-tester/web-app-security/best-academy","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Web App Security"}]},{"id":"UYXvZHnHYQBgWzUFpO3t","title":"HTTP","pathname":"/ecpptv2-certified-professional-penetration-tester/web-app-security/http","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Web App Security"}]},{"id":"VgKwep7fbFvabuPZN7EQ","title":"Basics","pathname":"/ecpptv2-certified-professional-penetration-tester/web-app-security/http/basics","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Web App Security"},{"label":"HTTP"}]},{"id":"XWix6CPbxx9nTKSan9sB","title":"Encoding","pathname":"/ecpptv2-certified-professional-penetration-tester/web-app-security/http/encoding","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Web App Security"},{"label":"HTTP"}]},{"id":"eq3S2LBMVVGwnUD5GMq7","title":"Same Origin","pathname":"/ecpptv2-certified-professional-penetration-tester/web-app-security/http/same-origin","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Web App Security"},{"label":"HTTP"}]},{"id":"eNhGJ8yHXa7V75UAP1UJ","title":"Cookies","pathname":"/ecpptv2-certified-professional-penetration-tester/web-app-security/http/cookies","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Web App Security"},{"label":"HTTP"}]},{"id":"Q9flODcI7E27b7HAEb9o","title":"Sessions","pathname":"/ecpptv2-certified-professional-penetration-tester/web-app-security/http/sessions","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Web App Security"},{"label":"HTTP"}]},{"id":"zXbDqIK52CEj6yPz1tFD","title":"Web Proxies","pathname":"/ecpptv2-certified-professional-penetration-tester/web-app-security/http/web-proxies","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Web App Security"},{"label":"HTTP"}]},{"id":"QdQzMNQjhPQTlPndKPOs","title":"Enumerating","pathname":"/ecpptv2-certified-professional-penetration-tester/web-app-security/enumerating","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Web App Security"}]},{"id":"KIMhVhApTiMGp2LWWJGu","title":"Infrastructure","pathname":"/ecpptv2-certified-professional-penetration-tester/web-app-security/enumerating/infrastructure","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Web App Security"},{"label":"Enumerating"}]},{"id":"lWWtVNSLCeqxfKQDGUIc","title":"Mapping Application","pathname":"/ecpptv2-certified-professional-penetration-tester/web-app-security/enumerating/mapping-application","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Web App Security"},{"label":"Enumerating"}]},{"id":"SwpLgmX0oawvVzcicN3x","title":"Tools","pathname":"/ecpptv2-certified-professional-penetration-tester/web-app-security/tools","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Web App Security"}]},{"id":"1WqamasdRWJwDxjW3L1t","title":"XSS","pathname":"/ecpptv2-certified-professional-penetration-tester/web-app-security/xss","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Web App Security"}]},{"id":"8IZlILC8IZkxDp77mKND","title":"Free Courses","pathname":"/ecpptv2-certified-professional-penetration-tester/web-app-security/xss/free-courses","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Web App Security"},{"label":"XSS"}]},{"id":"jjUyWeUkjPUI7ZP6XOUF","title":"XSS Types","pathname":"/ecpptv2-certified-professional-penetration-tester/web-app-security/xss/xss-types","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Web App Security"},{"label":"XSS"}]},{"id":"Da3hTlWBBWdAbRtC9TjZ","title":"Attack Types","pathname":"/ecpptv2-certified-professional-penetration-tester/web-app-security/xss/attack-types","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Web App Security"},{"label":"XSS"}]},{"id":"BllvtSYw8ueyy6dhDNXZ","title":"SQL Injection","pathname":"/ecpptv2-certified-professional-penetration-tester/web-app-security/sql-injection","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Web App Security"}]},{"id":"BTaFqr7MX0NQ5W5Tu0aV","title":"CMSs","pathname":"/ecpptv2-certified-professional-penetration-tester/web-app-security/cmss","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Web App Security"}]},{"id":"7dn6Tds2VFpR29qFePTC","title":"Page 2","pathname":"/ecpptv2-certified-professional-penetration-tester/powershell-for-pentesters/page-2","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Powershell for Pentesters"}]},{"id":"HBuqEoqCuMFnCI5ePfs9","title":"Page 6","pathname":"/ecpptv2-certified-professional-penetration-tester/wi-fi-security/page-6","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Wi-Fi Security"}]},{"id":"bZHRuLtfSeVc8aF4Ckhz","title":"Information Gathering","pathname":"/ecpptv2-certified-professional-penetration-tester/commands-notes/information-gathering","siteSpaceId":"sitesp_lEnL1","emoji":"1f7e2","description":"","breadcrumbs":[{"label":"Commands Notes"}]},{"id":"JBlHXK9RlAJ9dECObad7","title":"Host Discovery","pathname":"/ecpptv2-certified-professional-penetration-tester/commands-notes/host-discovery","siteSpaceId":"sitesp_lEnL1","emoji":"1f7e2","description":"eCPPTv2 host discovery techniques.","breadcrumbs":[{"label":"Commands Notes"}]},{"id":"SsHyGpEvBvnjjUB0cfD8","title":"Scanning","pathname":"/ecpptv2-certified-professional-penetration-tester/commands-notes/scanning","siteSpaceId":"sitesp_lEnL1","emoji":"1f7e2","description":"","breadcrumbs":[{"label":"Commands Notes"}]},{"id":"Y3us2mb8BaOTy4eFvgNf","title":"Enumeration","pathname":"/ecpptv2-certified-professional-penetration-tester/commands-notes/enumeration","siteSpaceId":"sitesp_lEnL1","emoji":"1f7e2","description":"","breadcrumbs":[{"label":"Commands Notes"}]},{"id":"engGpQgdypVnTqTZd9ay","title":"MSFVenom","pathname":"/ecpptv2-certified-professional-penetration-tester/commands-notes/msfvenom","siteSpaceId":"sitesp_lEnL1","emoji":"1f7e2","description":"","breadcrumbs":[{"label":"Commands Notes"}]},{"id":"XVLBnQ9g3kvGPgW0RRhl","title":"Tips","pathname":"/ecpptv2-certified-professional-penetration-tester/pivoting/tips","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Pivoting"}]},{"id":"bIbqkmAsMqwWY4K9uB0Q","title":"Socks4 vs Socks5","pathname":"/ecpptv2-certified-professional-penetration-tester/pivoting/socks4-vs-socks5","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Pivoting"}]},{"id":"iJsYkaoQygBJDwVuHgo7","title":"Pivoting Techniques","pathname":"/ecpptv2-certified-professional-penetration-tester/pivoting/pivoting-techniques","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Pivoting"}]},{"id":"4yLfiknBx5r2CLI2pz62","title":"Meterpreter","pathname":"/ecpptv2-certified-professional-penetration-tester/pivoting/meterpreter","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Pivoting"}]},{"id":"KLn4NjJ29ITjLh4akXD1","title":"SSH","pathname":"/ecpptv2-certified-professional-penetration-tester/pivoting/ssh","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Pivoting"}]},{"id":"n2AgqbjCzc8s8MjYmanT","title":"Proxy Chains","pathname":"/ecpptv2-certified-professional-penetration-tester/pivoting/proxy-chains","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Pivoting"}]},{"id":"SDeRXZ3jaqop7tL9ivvA","title":"Chisel","pathname":"/ecpptv2-certified-professional-penetration-tester/pivoting/chisel","siteSpaceId":"sitesp_lEnL1","emoji":"1f7e2","description":"","breadcrumbs":[{"label":"Pivoting"}]},{"id":"Dq7yWQKGh5vxZzue8Rcg","title":"Socat","pathname":"/ecpptv2-certified-professional-penetration-tester/pivoting/socat","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Pivoting"}]},{"id":"u6940YcRYyk1gEw7oheO","title":"Tips for Bof in eCPPTv2","pathname":"/ecpptv2-certified-professional-penetration-tester/buffer-overflow/tips-for-bof-in-ecpptv2","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Buffer OverFlow"}]},{"id":"4a3iwfbzq5SCG4sqYbqW","title":"Computerphile - Buffer Overflow","pathname":"/ecpptv2-certified-professional-penetration-tester/buffer-overflow/computerphile-buffer-overflow","siteSpaceId":"sitesp_lEnL1","description":"Running a Buffer Overflow Attack - Computerphile","breadcrumbs":[{"label":"Buffer OverFlow"}]},{"id":"XfbeAhuZaZqkxxy1t4tX","title":"The Cyber Mentor - BoF","pathname":"/ecpptv2-certified-professional-penetration-tester/buffer-overflow/the-cyber-mentor-bof","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Buffer OverFlow"}]},{"id":"ZjEVEYJysLDFE6GZv1oa","title":"Privilege Escalation","pathname":"/ecpptv2-certified-professional-penetration-tester/tryhackme-rooms/privilege-escalation","siteSpaceId":"sitesp_lEnL1","emoji":"1f7e2","description":"","breadcrumbs":[{"label":"TryHackMe Rooms","emoji":"1f7e2"}]},{"id":"mkDWP4Zcj5sSkMidtPv8","title":"Pivoting","pathname":"/ecpptv2-certified-professional-penetration-tester/tryhackme-rooms/pivoting","siteSpaceId":"sitesp_lEnL1","emoji":"1f7e2","description":"","breadcrumbs":[{"label":"TryHackMe Rooms","emoji":"1f7e2"}]},{"id":"DN9DynIIBYOJpz3s8NKO","title":"Buffer Overflow","pathname":"/ecpptv2-certified-professional-penetration-tester/tryhackme-rooms/buffer-overflow","siteSpaceId":"sitesp_lEnL1","emoji":"1f7e2","description":"","breadcrumbs":[{"label":"TryHackMe Rooms","emoji":"1f7e2"}]},{"id":"7KJCuvFxU276ZCQ4b31y","title":"Metasploit","pathname":"/ecpptv2-certified-professional-penetration-tester/tryhackme-rooms/metasploit","siteSpaceId":"sitesp_lEnL1","emoji":"1f7e2","description":"","breadcrumbs":[{"label":"TryHackMe Rooms","emoji":"1f7e2"}]},{"id":"EMUyVCGVY9YHhZG7I0gd","title":"Exploits","pathname":"/ecpptv2-certified-professional-penetration-tester/community-exam-tips/exploits","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Community Exam Tips"}]},{"id":"zQd4Ph8CNTi35jVjWTf7","title":"Shells","pathname":"/ecpptv2-certified-professional-penetration-tester/community-exam-tips/shells","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Community Exam Tips"}]},{"id":"b9gxkRFPQEaNklJutWjw","title":"PrivEsc","pathname":"/ecpptv2-certified-professional-penetration-tester/community-exam-tips/privesc","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Community Exam Tips"}]},{"id":"nVaMiM23pZOvTs74Paeb","title":"Report","pathname":"/ecpptv2-certified-professional-penetration-tester/community-exam-tips/report","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Community Exam Tips"}]},{"id":"ABnK7YNzVNBd1mY52LPy","title":"BoF","pathname":"/ecpptv2-certified-professional-penetration-tester/community-exam-tips/bof","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Community Exam Tips"}]},{"id":"quKGq6MUk3tIvKzY1NFB","title":"Wordlists","pathname":"/ecpptv2-certified-professional-penetration-tester/community-exam-tips/wordlists","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Community Exam Tips"}]},{"id":"GcjnWUfxa9LgProvgQ3P","title":"Articles - Exam Reviews","pathname":"/ecpptv2-certified-professional-penetration-tester/community-exam-tips/articles-exam-reviews","siteSpaceId":"sitesp_lEnL1","emoji":"1f7e2","description":"","breadcrumbs":[{"label":"Community Exam Tips"}]},{"id":"PeQzVNnHCgBemv8Xv7Vb","title":"Videos - Exam Reviews","pathname":"/ecpptv2-certified-professional-penetration-tester/community-exam-tips/videos-exam-reviews","siteSpaceId":"sitesp_lEnL1","emoji":"1f7e2","description":"","breadcrumbs":[{"label":"Community Exam Tips"}]},{"id":"lxwdNvwIQA2MofFxCQQn","title":"Page 1","pathname":"/ecpptv2-certified-professional-penetration-tester/free-courses/page-1","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Free Courses"}]},{"id":"nTkAGerykdwmsOxpZcwI","title":"Page 3","pathname":"/ecpptv2-certified-professional-penetration-tester/paid-courses/page-3","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"Paid Courses"}]},{"id":"C9a4lwzvlFizChsCGHvq","title":"Page 4","pathname":"/ecpptv2-certified-professional-penetration-tester/after-exam/page-4","siteSpaceId":"sitesp_lEnL1","description":"","breadcrumbs":[{"label":"After Exam"}]},{"id":"g9z39j3EZTYRWBfhAs25","title":"Study Notes","pathname":"/ecptx-certified-penetration-tester-extreme","siteSpaceId":"sitesp_m0VxU","description":"eLearnSecurity Certified Penetration Tester eXtreme"},{"id":"mCr5f3z9pnSzwr3Q2jdT","title":"Social Engineering Attack Vectors","pathname":"/ecptx-certified-penetration-tester-extreme/preparing-the-attack/social-engineering-attack-vectors","siteSpaceId":"sitesp_m0VxU","emoji":"2705","description":"Social engineering attack vectors are insidious techniques used by malicious actors to exploit human psychology and behavior for nefarious purposes.","breadcrumbs":[{"label":"Preparing the Attack"}]},{"id":"m0dInbJIfmlSNeOlAbNW","title":"Delivering a Triggerable Outlook Malware via Macros","pathname":"/ecptx-certified-penetration-tester-extreme/preparing-the-attack/delivering-a-triggerable-outlook-malware-via-macros","siteSpaceId":"sitesp_m0VxU","emoji":"2705","description":"Malware bytes knows that delivering a triggerable Outlook-based malware via macros is one of the most effective methods of wreaking havoc.","breadcrumbs":[{"label":"Preparing the Attack"}]},{"id":"yfGRv9r5Y99h5AlbN8Lb","title":"Custom Undetectable Macro Development","pathname":"/ecptx-certified-penetration-tester-extreme/preparing-the-attack/custom-undetectable-macro-development","siteSpaceId":"sitesp_m0VxU","description":"","breadcrumbs":[{"label":"Preparing the Attack"}]},{"id":"j7ull1bCxVEquM2fMkv9","title":"Establishing A Shell Through The Victim's Browser","pathname":"/ecptx-certified-penetration-tester-extreme/preparing-the-attack/establishing-a-shell-through-the-victims-browser","siteSpaceId":"sitesp_m0VxU","description":"","breadcrumbs":[{"label":"Preparing the Attack"}]},{"id":"lj4KjAy2bbkoWSGeAOol","title":"Reconnaissance & Enumeration","pathname":"/ecptx-certified-penetration-tester-extreme/red-teaming-active-directory/reconnaissance-and-enumeration","siteSpaceId":"sitesp_m0VxU","emoji":"2705","description":"Advanced Active Directory reconnaissance and enumeration refer to sophisticated techniques used by ethical hackers or malicious actors to gather detailed information about an organization...","breadcrumbs":[{"label":"Red Teaming Active Directory"}]},{"id":"ASMZJ6Znk2OLuQJK3qQe","title":"Red Teaming Active Directory","pathname":"/ecptx-certified-penetration-tester-extreme/red-teaming-active-directory/red-teaming-active-directory","siteSpaceId":"sitesp_m0VxU","description":"","breadcrumbs":[{"label":"Red Teaming Active Directory"}]},{"id":"pRUpbMp05XeeSGmFAEU5","title":"Red Teaming MS SQL Server","pathname":"/ecptx-certified-penetration-tester-extreme/red-teaming-critical-domain-infrastructure/red-teaming-ms-sql-server","siteSpaceId":"sitesp_m0VxU","description":"","breadcrumbs":[{"label":"Red Teaming Critical Domain Infrastructure"}]},{"id":"gXVE65v5JxsY7uNbOxQ7","title":"Red Teaming Exchange","pathname":"/ecptx-certified-penetration-tester-extreme/red-teaming-critical-domain-infrastructure/red-teaming-exchange","siteSpaceId":"sitesp_m0VxU","emoji":"2705","description":"Red teaming Exchange refers to conducting simulated adversarial attacks on Microsoft Exchange, which is a popular email and messaging platform used by many organizations worldwide.","breadcrumbs":[{"label":"Red Teaming Critical Domain Infrastructure"}]},{"id":"0Rla5r7Kw9sCcO3z5EMH","title":"Red Teaming WSUS","pathname":"/ecptx-certified-penetration-tester-extreme/red-teaming-critical-domain-infrastructure/red-teaming-wsus","siteSpaceId":"sitesp_m0VxU","emoji":"2705","description":"This website provides resources related to red teaming WSUS systems, which allows you to simulate advanced security threats. Whether you are a security researcher, blue teamer, or penetration tester,","breadcrumbs":[{"label":"Red Teaming Critical Domain Infrastructure"}]},{"id":"osMV8UiZRzEjPx4JqCyP","title":"Defense Evasion","pathname":"/ecptx-certified-penetration-tester-extreme/evasion/defense-evasion","siteSpaceId":"sitesp_m0VxU","description":"","breadcrumbs":[{"label":"Evasion"}]}]}