VulnableOne
  • 🧘‍♂️About Me
  • Offensive Treasure
    • 🧌Penetration Testing
      • Reconnaissance
        • Identify Ports/Hosts/Data
      • Enumeration
        • Service Ports
          • FTP (21)
          • SSH (22)
          • SMTP (25)
          • DNS (53)
          • TFTP (69/udp)
          • Finger (79)
          • SaMBa (139/445)
          • RPC/NFS (111/135)
          • SNMP (161/udp)
          • LDAP (389)
          • isakmp (500/udp)
          • Java (1099)
          • MS-SQL (1433)
          • MySQL (3306)
          • Distcc (3622)
          • PostgreSQL (5437)
          • Redis (6379)
      • Password Attack
        • Wordlist
        • Brute-Force
        • Crack Hash
      • File Transfer
        • Linux
        • Window
      • Misc
      • Theory
        • Nmap
        • Wireless
        • OSI Model - TCP/IP
        • R* Service
        • Hash
        • Solaris
        • SIP
        • Cisco Password Encryption
        • Time to Live
        • Windows
          • WMIC
          • IIS Version
          • Windows Version
          • Active Directory
        • Linux
        • Database
          • Page 7
          • MSSQL
          • PostgreSQL
          • MySQL
        • Asymmetric Encryption
        • Symmetric Encryption
        • Tools
        • ICMP
        • IP Address
        • VLAN
        • Acronyms
        • HTTP Status
        • HTTP Method
        • Protocol
        • Common Ports
    • 🧙‍♂️AD Attack
      • Domain Enumeration
        • PowerView
        • AD-Module
        • Bloodhound
      • Abuse ACLs
        • GenericAll
        • GenericWrite
        • WriteDACL
        • ForceChangePassword
      • Kerberos Attack
        • Kerberoasting
        • ASREPRoasting
        • Unconstrained Delegation
        • Constrained Delegation
        • Resource Based Constrained Delegation
      • LAPs
      • MS SQL Servers
        • PowerUpSQL
        • SQL Server Management
        • Impacket-MSSQL
    • 🥷Red Team
      • Reconnaissance
        • Active Scanning
          • Scanning IP Blocks
          • Vulnerability Scanning
          • Wordlist Scanning
        • Gather Victim Host Information
          • Software
        • Gather Victim Identity Information
          • Credentials
          • Email Addresses
        • Search Open Websites/Domains
          • Social Media
          • Search Engines
          • Code Repositories
        • Search Victim-Owned Websites
      • Resource Development
        • C2 Infrastructure
        • Metasploit
      • Execution
        • Bash - Reverse Shell
        • HTA
        • JScript Dropper
        • Macro
        • Metasploit
        • Network Tools
        • Powershell
        • Python
        • VBA
        • Web Shell
        • WSH
      • Persistence
        • Logon Script
        • Startup Folder
        • WinLogon (Elevated)
        • Run / RunOnce (Elevated)
        • Scheduled Tasks (Elevated )
      • Privilege Escalation
        • Windows
          • SeBackup / SeRestore
          • SeTakeOwnership
          • SeImpersonate / SeAssignPrimaryToken
          • UAC Bypass
          • AutoInstall Elevate
          • Unquoted Service Paths
          • Weak Service Permissions
          • Weak Service Binary Permissions
        • Linux
          • Escalation
      • Defense Evasion
        • Bypassing AV
          • Pack Shellcode
        • Security Control
          • CLM
          • AppLocker
        • Use Alternate Authentication Material
          • Pass The Hash
          • Over Pass The Hash
          • Extract Tickets
          • Pass The Ticket
        • Impersonate
      • Credential Access
        • Adversary-in-the-Middle
          • LLMNR/NBT-NS/MDNS Poisoning
          • Evil SSDP
        • OS Credential Dumping
          • Protected LSASS
          • Invoke-Mimikatz
          • Mimikatz.exe
          • Secretsdump
          • Meterpreter Kiwi
          • Registry
          • Shadow Copy
          • DCSync
        • Steal or Forge Kerberos Tickets
          • Silver Ticket
          • Golden Ticket
        • Steal Web Session Cookie
      • Lateral Movement
        • Remote Access
        • Pivoting
          • Linux
          • Window
    • Web Application
      • Basic Recon
  • Blog
    • 📝Empty!!!
  • Course Review
    • 👨‍🎓Cyber Security Courses Journey
      • PNPT Journey
      • OSCP Journey
        • 🚩CTF
          • Hack The Box
            • Linux Boxes
              • ✅Admirer (Easy)
              • ✅Bashed (Easy)
              • ✅Beep (Easy)
              • ✅Blocky (Easy)
              • ✅FriendZone (Easy)
              • ✅Irked (Easy)
              • ✅Lame (Easy)
              • ✅Mirai (Easy)
              • ✅Networked (Easy)
              • ✅Nibbles (Easy)
              • ✅OpenAdmin (Easy)
              • ✅Sense (Easy)
              • ✅Shocker (Easy)
              • ✅Sunday (Easy)
              • ✅Tabby (Easy)
              • ✅Traverxec (Easy)
              • ✅Valentine (Easy)
              • ✅Cronos (Medium)
              • ✅Haircut (Medium)
              • ✅Jarvis (Medium)
              • ✅Magic (Medium)
              • ✅Nineveh (Medium)
              • ✅Node (Medium)
              • ✅Poison (Medium)
              • ✅SolidState (Medium)
              • ✅TartarSauce (Medium)
            • Window Boxes
              • ✅Arctic (Easy)
              • ✅Active (Easy)
              • ✅Blue (Easy)
              • ✅Bounty (Easy)
              • ✅Devel (Easy)
              • ✅Forest (Easy)
              • ✅Granny (Easy)
              • ✅Granpa (Easy)
              • ✅Jerry (Easy)
              • ✅Legacy (Easy)
              • ✅Optimum (Easy)
              • ✅Bastard (Medium)
              • ✅Silo (Medium)
          • Buffer Overflow
            • BOF - Tib3rius
            • BOF - TCM
              • 1- Spiking
              • 2- Fuzzing
              • 3- Finding Offset
              • 4- Overwriting EIP
              • 5- Finding Bad Characters
              • 6- Finding the Right Module
              • 7- Generating Shellcode
Powered by GitBook
On this page
  • Introduction
  • About Course
  • About Exam
  • Conclusion
  1. Course Review
  2. Cyber Security Courses Journey

PNPT Journey

PreviousCyber Security Courses JourneyNextOSCP Journey

Last updated 7 months ago

PNPT Exam:

In early October 2021, I passed my first practical penetration testing exam on TCM Security’s Certification, PNPT (Practical Network Penetration Tester). Since the exam is interesting and different from other platforms, you need to perform the full scope of penetration testing and especially the Debrief part. So, I would like to share my experience with this exam and courses.

Introduction

Before releasing the PNPT exam and courses, I had learned from The Cyber Mentor channel and there is a series of videos called "Zero to Hero Pentesting".

There are two more series I want to mention that is really helpful for me as I'm looking for free resource and well-explained at that time.

Pentetsing for n00bs: This series is about some walkthroughs of HTB machines and the methodology of how to compromise those machines.

Buffer Overflows Made Easy: This one is explaining about Buffer Overflow vulnerability. He's sharing some python scripts and step by step to exploit.

About Course

By 2021, I've seen some people doing reviews on the PNPT exam and courses. Without any further, I've enrolled in PNPT Exam with training as it contained 5 courses.

PEH: Since I have followed his youtube channel, I'm familiar with course content but still there are new topics and content updated as well.

Windows / Linux Privilege Escalation: This one not just prepared me for PNPT, but it help me a lot for my future course as I have concepts from the courses.

External Pentest Playbook: This course had been defined with a clear objective for external attack infrastructure.

  • "Low chance of RCE, High chance of weak passwords"

  • "Don't start web app assessment when you're focusing on external infrastructure"

  • "If you find XSS, how are you gonna branch into the internal network??"

  • "If you see the login portal, you could try SQL injection to see if you can breach the website."

All of the courses are affordable at just 29.99$ and they always offer Coupon discounts. Anyway, if you still thinking about the price, he also shares the course content on his youtube channel as well.

About Exam

People don't have experience in doing penetration testing. You could follow along with those courses. As they have mentioned 2 options for you.

On exam day, I received a VPN package and Role of Engagement from TCM.

As we have 5 full days to perform penetration testing on the exam environment and 2 days for doing report. By this, you don't need to stay awake and stress out about the time.

On the engagement letter, we have a Penetration Test scope and some actions are out of scope which clearly defines the objective.

As I couldn't expose what is going on in the exam but it's the same as what they mentioned.

  • Perform OSINT to gather information on the target

  • Perform external penetration testing

  • Leveraging into network, lateral and vertical network movement

  • Ultimately compromise the exam domain controller

Then we have to do a report on all finding items and submit the report via email. Next, we will receive a link to schedule our debrief with Heath.

Finally, the debriefing part for 15 minutes with Heath on finding items. It was really good for me as it was my first time debriefing my report and he also gave advice on Reporting style and debriefing as well.

Once you have cleared all the processes, he will generate the certificate for you and invite you to a private group on discord for PNPT candidates.

Conclusion

I might share some advice for those who don't have experience and want to take the exam:

  • I would recommend completing the OSINT and External Pentest Courses.

  • Read the letter of engagement and pay attention.

  • Make sure you understand the Active Directory attack path in the course.

  • Try not to overthink or think about it in a complicated way.

  • Try to look for "how to Access it rather than how to Exploit it".

  • Don't forget Pivoting Tools and Techniques

You will never be ready. Just Start it.

For those who are looking to start up your penetration testing career, you can check out the TCM Security content. It's really helpful for you as it has a fully completed penetration testing process from end to end. Even though you have failed, they offer you a free retake as well.

As this course and exam is a Real-World penetration testing process. After completing this, you will have a lot of concepts on performing pentest. Of course, the price is affordable rather than any other cyber security platform.

Youtube playlist:

Youtube Playlist:

Youtube Playlist:

OSINT: Sock Puppets? This one is my favorite course and I realized the internet is a scary place

After completing those 5 courses, I enrolled in extra one as . That one contained a C2 framework, Email Phishing, Port Forwarding, and more.

Youtube Channel:

👨‍🎓
😂
https://www.youtube.com/watch?v=qlK174d_uu8&list=PLLKT__MCUeiwBa7d7F_vN1GUwz_2TmVQj
https://www.youtube.com/watch?v=JZN3JhoAdWo&list=PLLKT__MCUeiyxF54dBIkzEXT7h8NgqQUB
https://www.youtube.com/watch?v=qSnPayW6F7U&list=PLLKT__MCUeix3O0DPbmuaRuR_4Hxo4m3G
Practical Ethical Hacking
Linux Privilege Escalation for Beginners
Windows Privilege Escalation for Beginners
Open Source Intelligence (OSINT) Fundamentals
External Pentest Playbook
Movement, Pivoting, and Persistence
https://www.youtube.com/@TCMSecurityAcademy/featured
Practical Network Penetration Tester (PNPT) - TCM SecurityTCM Security
Logo