brain_fuck
Ctrlk
  • 📁What Is It
  • 🐧Linux Hardening
    • 🏔️Privilege Escalation - Linux
  • 🖼️Windows Hardening
    • 🌋Privilege Escalation - Windows
    • 🧙‍♂️AD - Active Directory
  • Others
    • 🧰Tools
    • 📦Modules HTB
    • 🧮TCM-Security
  • 📡Ports
  • 🍎Red - Bash Scripting
  • 👨‍💻Pentesting Methodology
  • 🌐OSINT
  • 🪪Certifications
    • 🕷️HTB-CBBH
    • 📶CWP-Certified WiFiChallenge Professional
    • 📵INE-eMAPT
    • 🗡️HTB-CPTS
      • Background & Preparation
      • Getting Started
      • Attacking Your First Box - Nibbles
      • Network Enumeration with Nmap
      • Footprinting
      • Information Gathering - Web Edition
      • Vulnerability Assessment
      • File Transfers - Windows
      • Shells & Payloads
      • Using the Metasploit Framework
      • Password Attacks
Powered by GitBook
On this page
  1. 🪪Certifications
  2. 🗡️HTB-CPTS

Background & Preparation

Introduction

1. Penetration Testing Process

2. Getting Started

Reconnaissance, Enumeration & Attack Planning

3. Network Enumeration with Nmap

4. Footprinting

5. Information Gathering - Web Edition

6. Vulnerability Assessment

7. File Transfers

8. Shells & Payloads

9. Using the Metasploit Framework

Exploitation & Lateral Movement

10. Password Attacks

11. Attacking Common Services

12. Pivoting, Tunneling, and Port Forwarding

13. Active Directory Enumeration & Attacks

Web Exploitation

14. Using Web Proxies

15. Attacking Web Applications with Ffuf

16. Login Brute Forcing

17. SQL Injection Fundamentals

18. SQLMap Essentials

19. Cross-Site Scripting (XSS)

20. File Inclusion

21. File Upload Attacks

22. Command Injections

23. Web Attacks

24. Attacking Common Applications

Post-Exploitation

25. Linux Privilege Escalation

26. Windows Privilege Escalation

Reporting & Capstone

27. Documentation & Reporting

28. Attacking Enterprise Networks

PreviousHTB-CPTSNextGetting Started

Last updated 2 months ago