This folder contains comprehensive notes and resources for preparing for the CPTS (Certified Penetration Testing Professional) certification from HTB Academy. The materials are organized to follow the HTB Academy CPTS path structure.
Current Structure
CPTS-PREP/
βββ README.md # This overview file
βββ footprinting.md # Infrastructure Based Enumeration (Domain + Cloud + DNS)
βββ firewall-evasion.md # Firewall and IDS/IPS Evasion techniques
βββ vulnerability-assessment.md # Nessus vulnerability scanning and credentialed assessment
βββ web-enumeration/ # Web application enumeration guides
β βββ web-information-gathering.md # Web application information gathering overview
β βββ subdomain-enumeration.md # DNS enumeration and subdomain discovery
β βββ web-application-enumeration.md # Directory enumeration and virtual hosts
βββ databases/ # Database enumeration guides
β βββ mysql-enumeration.md # MySQL service enumeration
β βββ mssql-enumeration.md # Microsoft SQL Server enumeration
β βββ oracle-enumeration.md # Oracle TNS enumeration
βββ services/ # Network service enumeration
β βββ ftp-enumeration.md # FTP service enumeration
β βββ smb-enumeration.md # SMB share and authentication testing
β βββ nfs-enumeration.md # Network File System enumeration
β βββ smtp-enumeration.md # SMTP enumeration and testing
β βββ email-enumeration.md # IMAP/POP3 enumeration
β βββ snmp-enumeration.md # SNMP network management testing
β βββ ipmi-enumeration.md # Hardware management interface testing
βββ passwords-attacks/ # Password attacks and lateral movement
β βββ pass-the-hash.md # Pass the Hash (PtH) attacks
β βββ pass-the-ticket.md # Pass the Ticket (PtT) attacks
β βββ pass-the-certificate.md # Pass the Certificate (ESC8 & ADCS attacks)
β βββ active-directory-ntds-attacks.md # NTDS.dit extraction and analysis
β βββ [other password attack techniques]
βββ pivoting-tunneling-port-forwarding/ # Network pivoting and tunneling techniques
β βββ pivoting-overview.md # Module overview and network segmentation concepts
β βββ dynamic-port-forwarding.md # SSH SOCKS tunneling
β βββ remote-port-forwarding.md # Reverse shells and Meterpreter pivoting
β βββ ssh-tunneling.md # Complete SSH forwarding guide (Local, Remote, Dynamic)
β βββ chisel-socks5-tunneling.md # Modern HTTP/SOCKS5 tunneling with Chisel
β βββ sshuttle-pivoting.md # VPN-like tunneling over SSH
β βββ meterpreter-tunneling.md # Metasploit autoroute and pivoting modules
β βββ socat-redirection.md # Socat for port forwarding and redirection
β βββ plink-windows-pivoting.md # Windows SSH client for tunneling
β βββ netsh-windows-portforward.md # Native Windows port forwarding
β βββ socksoverrdp-windows-pivoting.md # RDP-based SOCKS tunneling
β βββ rpivot-web-pivoting.md # HTTP/HTTPS tunneling with rpivot
β βββ dnscat2-dns-tunneling.md # DNS tunneling techniques
β βββ ptunnel-ng-icmp-tunneling.md # ICMP tunneling with ptunnel-ng
β βββ skills-assessment-complete-walkthrough.md # Complete HTB Academy skills assessment (All 7 questions)
βββ attacking-common-services/ # Protocol exploitation techniques
β βββ ftp-attacks.md # FTP exploitation and abuse
β βββ smb-attacks.md # SMB protocol attacks and RCE
β βββ sql-attacks.md # MySQL/MSSQL database exploitation
β βββ [other service exploitation]
βββ attacking-common-applications/ # Application-specific exploitation
β βββ README.md # Module overview and methodology
β βββ wordpress-discovery-enumeration.md # WordPress scanning and enumeration
β βββ wordpress-attacks.md # WordPress exploitation techniques
β βββ joomla-discovery-enumeration.md # Joomla scanning and enumeration
β βββ joomla-attacks.md # Joomla exploitation techniques
β βββ drupal-discovery-enumeration.md # Drupal scanning and enumeration
β βββ drupal-attacks.md # Drupal exploitation techniques
β βββ tomcat-discovery-enumeration.md # Tomcat enumeration and analysis
β βββ tomcat-attacks.md # Tomcat exploitation and privilege escalation
β βββ jenkins-discovery-enumeration.md # Jenkins scanning and enumeration
β βββ jenkins-attacks.md # Jenkins exploitation and credential extraction
β βββ splunk-discovery-enumeration.md # Splunk enumeration and analysis
β βββ splunk-attacks.md # Splunk exploitation and privilege escalation
β βββ [other application attacks] # CGI, IIS, ColdFusion, LDAP, etc.
βββ active-directory-enumeration-attacks/ # Active Directory penetration testing
β βββ initial-enumeration-domain.md # Initial domain enumeration
β βββ llmnr-nbt-ns-poisoning-linux.md # LLMNR/NBT-NS poisoning with Responder
β βββ [additional AD attack modules] # More AD techniques to be added
βββ linux-priv-esc/ # Linux privilege escalation techniques
β βββ README.md # Module overview and methodology
β βββ environment-enumeration.md # System reconnaissance and information gathering
β βββ services-internals-enumeration.md # Deep system analysis and service enumeration
β βββ credential-hunting.md # Systematic credential discovery across file system
β βββ path-abuse.md # PATH variable manipulation and command hijacking
β βββ wildcard-abuse.md # Wildcard character exploitation for privilege escalation
β βββ escaping-restricted-shells.md # Techniques for breaking out of restricted shells
β βββ special-permissions.md # SUID/SGID binary exploitation and GTFOBins
β βββ sudo-rights-abuse.md # Sudo privilege misconfigurations and GTFOBins exploitation
β βββ privileged-groups.md # LXD, Docker, Disk, ADM group privilege escalation
β βββ capabilities.md # Linux capabilities privilege escalation exploitation
β βββ vulnerable-services.md # Known service vulnerabilities and exploitation
β βββ cron-job-abuse.md # Cron job misconfiguration exploitation
β βββ lxd-container-escape.md # LXD container privilege escalation exploitation
β βββ docker-container-escape.md # Docker container privilege escalation exploitation
β βββ logrotate-exploitation.md # Logrotate vulnerability exploitation and race conditions
β βββ miscellaneous-techniques.md # Additional techniques (traffic capture, NFS, tmux hijacking)
β βββ shared-libraries.md # LD_PRELOAD shared library hijacking exploitation
β βββ shared-object-hijacking.md # Custom library RUNPATH hijacking exploitation
β βββ python-library-hijacking.md # Python module import hijacking exploitation
β βββ sudo-cve-exploits.md # Sudo CVE exploitation (Baron Samedit, Policy Bypass)
β βββ polkit-pwnkit.md # Polkit CVE-2021-4034 Pwnkit privilege escalation
β βββ dirty-pipe.md # Dirty Pipe CVE-2022-0847 kernel vulnerability exploitation
β βββ netfilter-kernel-exploits.md # Netfilter kernel module CVE exploits (advanced)
β βββ linux-hardening.md # Defensive measures and system hardening practices
β βββ permissions-based-privesc.md # File permissions, SUID/SGID exploitation
β βββ service-based-privesc.md # Running services and process exploitation
β βββ configuration-based-privesc.md # Misconfigurations and weak settings
β βββ kernel-exploitation.md # Operating system vulnerabilities
β βββ application-specific-privesc.md # Vulnerable installed software
β βββ automated-tools.md # LinPEAS, LinEnum, and enumeration scripts
β βββ persistence-techniques.md # Maintaining elevated access
β βββ skills-assessment.md # Practical exercises and challenges
βββ remote-management/ # Remote access protocols
βββ remote-management.md # Overview of remote management protocols
βββ linux-remote-protocols.md # SSH, Rsync, R-Services
βββ windows-remote-protocols.md # RDP, WinRM, WMI
Study Materials
π Phase 1: Information Gathering
π Host-Based Enumeration
Complete service enumeration methodology organized by categories
ποΈ Database Services:
MySQL Enumeration - MySQL service testing, authentication, and exploitation
ACL Abuse Tactics - Practical ACL attack execution, password manipulation, group membership abuse, targeted Kerberoasting, cleanup procedures, and detection evasion
DCSync Attack - Ultimate domain compromise technique using Directory Replication Service, secretsdump.py and Mimikatz execution, reversible encryption exploitation, and complete domain credential extraction
Privileged Access - Lateral movement and privilege expansion using BloodHound enumeration, WinRM/PSRemote exploitation, SQL Server administrative access, and multi-service attack chaining
Kerberos "Double Hop" Problem - Overcoming Kerberos authentication limitations in multi-hop scenarios, PSCredential object workarounds, PSSession configuration methods, and advanced lateral movement techniques
Bleeding Edge Vulnerabilities - Latest critical AD attack vectors including NoPac (SamAccountName Spoofing), PrintNightmare, and PetitPotam (MS-EFSRPC) for rapid domain compromise
Miscellaneous Misconfigurations - Diverse AD vulnerabilities including Exchange attacks, GPP passwords, ASREPRoasting, DNS enumeration, Printer Bug, and various administrative oversights
Domain Trusts Primer - Foundation of AD trust relationships, enumeration techniques (PowerView, netdom, BloodHound), and trust-based attack path identification
Child β Parent Trust Attacks - SID History exploitation, ExtraSids attacks with Mimikatz/Rubeus, Golden Ticket creation for forest privilege escalation
Cross-Forest Trust Abuse - from Windows - Cross-forest Kerberoasting, admin password reuse, foreign group membership enumeration, and SID History abuse across forest boundaries
Cross-Forest Trust Abuse - from Linux - Cross-platform cross-forest attacks using Impacket GetUserSPNs, bloodhound-python multi-domain collection, and foreign group membership discovery
π― Skills Assessment:
Skills Assessment Part I - Complete Walkthrough - Comprehensive 8-question practical assessment covering web shells, Kerberoasting, pivoting, credential dumping, DCSync attacks, and domain takeover with working commands and troubleshooting
Skills Assessment Part II - Advanced Professional Methodology - 12-question advanced assessment demonstrating superior SSH dynamic port forwarding + proxychains methodology, LLMNR poisoning, SQL exploitation, privilege escalation, and complete domain compromise with professional-grade techniques
Windows Built-in Groups - Backup Operators exploitation, SeBackupPrivilege abuse, and Domain Controller NTDS.dit extraction
Event Log Readers - Event log analysis, process creation auditing, and credential extraction from command-line history
DnsAdmins - DNS service manipulation, custom DLL injection, and Domain Controller privilege escalation attacks
Hyper-V Administrators - Virtual machine cloning attacks and hard link exploitation techniques
Print Operators - SeLoadDriverPrivilege exploitation and malicious driver loading attacks
Server Operators - Service control, binary path modification, and Domain Controller compromise techniques
UAC Bypass - User Account Control bypass via DLL hijacking, auto-elevating binaries, and UACME techniques
Weak Permissions - File system ACLs, service permissions, unquoted service paths, registry ACLs, and autorun binary exploitation
Kernel Exploits - Historical and modern Windows kernel vulnerabilities including HiveNightmare, PrintNightmare, and legacy exploits
Vulnerable Services - Third-party application vulnerabilities, service enumeration, and exploitation techniques including Druva inSync command injection
Credential Hunting - File system credential discovery, PowerShell history analysis, browser dictionaries, unattended installation files, and DPAPI credential decryption
Other Files - Advanced credential hunting in StickyNotes databases, system backup files, network shares, and application-specific storage locations
Further Credential Theft - Browser credential extraction, password manager cracking, LaZagne automation, SessionGopher, registry-stored credentials, and WiFi password retrieval
Citrix Breakout - Escaping restricted virtualization environments using dialog boxes, UNC paths, alternate tools, and privilege escalation chains
Interacting with Users - Social engineering attacks including traffic capture, SCF/LNK file hash capture, process monitoring, and credential harvesting
Pillaging - Post-exploitation data extraction from applications, browsers, clipboard, backup systems, and configuration files
Miscellaneous Techniques - LOLBAS exploitation, AlwaysInstallElevated, CVE-2019-1388, scheduled tasks, and virtual disk mounting
Windows Server 2008 - Legacy system exploitation using Sherlock, missing patches, and Metasploit privilege escalation
Windows 7 Exploitation - End-of-life desktop exploitation using Windows-Exploit-Suggester and MS16-032 PowerShell attacks
π Documentation & Reporting:
Notetaking & Organization - Comprehensive notetaking structure, Tmux logging setup, evidence collection, and artifact tracking for professional penetration testing assessments
Types of Reports - Assessment methodologies, report categories, specialized testing types, and professional deliverable standards
Components of a Report - Executive summary best practices, attack chain documentation, findings structure, and appendix organization
How to Write Up a Finding - Professional finding structure, evidence presentation, remediation recommendations, and quality reference selection
Reporting Tips and Tricks - Professional workflow, MS Word techniques, automation strategies, client communication, and quality assurance processes
HTB Academy Example - Practical Obsidian notetaking structure demonstrating professional penetration test documentation for INLANEFREIGHT.LOCAL assessment
π Attacking Enterprise Networks:
External Information Gathering - Systematic reconnaissance, Nmap enumeration, DNS zone transfers, vhost discovery, and attack surface mapping for enterprise network penetration testing
Service Enumeration & Exploitation - FTP, SSH, SMTP, email services testing, user enumeration, anonymous access validation, and vulnerability research
Web Enumeration & Exploitation - EyeWitness automation, HTTP verb tampering, file upload bypasses, WordPress exploitation, SQL injection, XSS, SSRF, XXE, and command injection with 11 comprehensive lab solutions
OWASP Top 10 - Web application security fundamentals
π οΈ Required Tools
Nmap - Network discovery and security auditing
Burp Suite - Web application security testing
Metasploit - Penetration testing framework
Bloodhound - Active Directory environment analysis
Custom Scripts - Automation and efficiency tools
π Certification Path
Study Phase - Review all enumeration guides systematically
Lab Practice - Complete HTB Academy lab exercises
Exam Preparation - Review methodologies and checklists
Certification Exam - Apply knowledge in simulated environment
This CPTS preparation guide is designed to provide comprehensive coverage of penetration testing methodologies while maintaining practical applicability for real-world security assessments.