Property
Details
🏷️ Certification
eJPT – Junior Penetration Tester
🏢 Provider
eLearnSecurity / INE
📝 Format
35 Questions + Practical Pentest Lab
⏱️ Duration
48 Hours
✅ Passing Score
70%
📖 Open Book
Yes
🧩 Domains
Networking · Web Apps · Host & Network Pentesting
Click any topic below to jump directly to its notes.
🕵️ Reconnaissance & Information Gathering
🔬 Assessment & Enumeration
🚀 Exploitation & Post-Exploitation
#
File
Description
10
📄 Exploitation
Exploiting services, CVEs, manual attacks
11
📄 Post Exploitation
Privilege escalation, pivoting, persistence
#
File
Description
12
📄 CheatSheet
All key commands in one place
Information Gathering ████████████████████ 100%
Footprinting & Scanning ████████████████████ 100%
Vulnerability Assessment ████████████████████ 100%
Enumeration ████████████████████ 100%
Exploitation ████████████████████ 100%
Web Application Attacks ████████████████████ 100%
Post Exploitation ████████████████████ 100%
Metasploit Framework ████████████████████ 100%
🗺️ Pentesting Methodology
┌─────────────────────────────────────────────────────┐
│ │
│ 1. Information Gathering ──► 2. Scanning │
│ │ │ │
│ ▼ ▼ │
│ 3. Enumeration ──► 4. Vuln Assessment │
│ │ │ │
│ ▼ ▼ │
│ 5. Exploitation ──► 6. Post Exploitation │
│ │ │
│ 7. Reporting │
└─────────────────────────────────────────────────────┘
⚡ Key Tools Quick Reference
Tool
Use Case
nmap
Port scanning & service detection
netdiscover
Host discovery on local networks
gobuster / dirb
Web directory brute-forcing
nikto
Web server vulnerability scanning
hydra
Online brute-force (SSH, FTP, HTTP)
john / hashcat
Offline password / hash cracking
metasploit
Exploitation framework
msfvenom
Custom payload generation
sqlmap
Automated SQL injection
wireshark / tcpdump
Packet capture & traffic analysis
enum4linux
SMB/Samba enumeration
netcat
Bind/reverse shells, port listening
burpsuite
Web app interception & testing
Made with 💻 for eJPT exam prep