This repository contains comprehensive guides for Practical Junior Penetration Tester (PJPT) preparation. Each document focuses on specific attack techniques commonly encountered in Active Directory penetration testing.
π Available Documents
Core Attack Techniques
Kerberoasting - Service account password extraction and cracking
Token Impersonation - Post-exploitation privilege escalation via token stealing
Mimikatz extracts additional credentials from memory
BloodHound maps privilege escalation paths
Manual techniques fill gaps where automated tools fail
π Final Notes
This checklist represents a systematic approach to Active Directory penetration testing aligned with PJPT examination requirements. Each technique builds upon the previous ones, creating a comprehensive attack methodology.
Remember: The goal is not just to achieve domain admin access, but to demonstrate a thorough understanding of the attack chain, document findings professionally, and provide actionable remediation advice.
Practice Environment: Test all techniques in a lab environment before the exam. Tools and commands may behave differently across various Windows versions and domain configurations.
Time Management: Stick to the time allocations suggested above. It's better to have partial access with good documentation than complete access with poor documentation.