This repository will encompass all Hack The Box Academy modules of "Certified Penetration Testing Specialist" job role path. Here you will find everything that will help you to ace your CPTS exam, including all walkthroughs of all modules, all skills assessments, as well as some tips and most useful commands and techniques which I use myself. Although the HTB CPTS job role path consists of 28 modules, but I also included some additional ones, which in my opinion will help to get better understanding of the whole process and cover all topics. Here is what a layout of modules looks like, divided into phases of a real penetration test:
- Penetration Testing Process
- Getting Started
- Introduction to Networking
- Linux Fundamentals
- Windows Fundamentals
- Introduction to Windows CLI
- Introduction to Active Directory
- Introduction to Web Applications
- Web Requests
- Network Enumeration with NMAP
- Footprinting
- Information Gathering - Web Addition
- Vulnerability Assessment
- File Transfers
- Shells & Payloads
- Using the Metasploit Framework
- Password Attacks
- Attacking Common Services
- Pivoting, Tunneling, and Port Forwarding
- Active Directory Enumeration & Attacks
- Using Web Proxies
- Attacking Web Applications with Ffuf
- Login Brute Forcing
- SQL Injection Fundamentals
- SQLMap Essentials
- Cross-Site Scripting (XSS)
- File Inclusion
- File Upload Attacks
- Command Injections
- Web Attacks
- Attacking Common Applications
- Linux Privilege Escalation
- Windows Privilege Escalation
- Documentation & Reporting
- Attacking Enterprise Networks
This path can be adjusted according to your level of knowledge and previous experience. If you are a complete beginner, I think that this path is just for you. If you are an advanced specialist, you can skip some introduction modules where necessary. Also, if you conduct a black box pentest, then you can swap Exploitation & Lateral Movement and Web Attacks modules, as in black box pentest you only have some IP addresses, domains and usually you start by testing web application and exploiting vulnerabilities there, which then, will give you access to the internal part (Active Directory as an example)