βœ…PJPT - Completed

🎯 Quick Reference Index

This repository contains comprehensive guides for Practical Junior Penetration Tester (PJPT) preparation. Each document focuses on specific attack techniques commonly encountered in Active Directory penetration testing.

πŸ“š Available Documents

Core Attack Techniques

  • Kerberoasting - Service account password extraction and cracking

  • Token Impersonation - Post-exploitation privilege escalation via token stealing

  • LNK File Attacks - Malicious shortcut file creation for credential theft

  • GPP/cPassword Attacks - Group Policy Preferences credential extraction

  • Mimikatz Overview - Comprehensive credential dumping and Kerberos attacks

  • NTDS.dit Extraction - Active Directory database dumping and hash analysis

  • Golden Ticket Attacks - Ultimate domain persistence via krbtgt compromise

  • Recent AD Vulnerabilities - ZeroLogon, PrintNightmare, Sam the Admin

Strategic Approaches

  • Post-Compromise Attack Strategy - Systematic methodology for post-exploitation activities

  • Post-Domain Compromise Strategy - What to do after achieving Domain Admin access

  • Initial Internal Attack Strategy - First steps after gaining internal network access

  • Domain Enumeration - Active Directory reconnaissance techniques

Network-Level Attacks

  • SMB Relay Attacks - NTLM relay attack techniques

  • LLMNR Poisoning - Link-Local Multicast Name Resolution attacks

  • IPv6 Attacks - IPv6-based attack vectors

  • Passback Attacks - Printer and device credential extraction

Credential Attacks

  • Pass Attacks - Pass-the-Hash, Pass-the-Ticket, and related techniques

πŸš€ PJPT Exam Checklist

Phase 1: Initial Access & Enumeration (30 minutes)

LLMNR/NBT-NS Poisoning

Initial Credential Gathering

Phase 2: Post-Compromise Quick Wins (30 minutes)

Immediate Post-Compromise Actions

Credential Dumping & Analysis

Phase 3: Deep Enumeration & Privilege Escalation (60 minutes)

Domain Environment Mapping

Advanced Attack Techniques

Phase 4: Lateral Movement & Persistence (30 minutes)

Lateral Movement Techniques

Persistence & Impact

Phase 5: Post-Domain Compromise - "Welcome to My Domain!" 🦝 (60 minutes)

Post-Domain Compromise Strategy - Complete Value Demonstration

⚑ Quick Command Reference

Essential One-Liners

Hash Cracking Quick Reference

🎯 PJPT Success Strategy

Time Management (4-6 hours total)

  1. Hour 1: Network discovery and initial access attempts

  2. Hour 2: Post-compromise quick wins and immediate credential gathering

  3. Hour 3-4: Deep enumeration and privilege escalation

  4. Hour 5-6: Lateral movement, persistence, and documentation

Documentation Priorities

  1. Clear Attack Chain - Document step-by-step progression from initial access to domain admin

  2. Command Evidence - Include exact commands used and their outputs

  3. Impact Assessment - Demonstrate business impact of compromise

  4. Remediation Recommendations - Provide specific mitigation strategies

  5. Timeline - Show progression and persistence of access

Common Pitfalls to Avoid

πŸ”— Integration Points

Attack Chain Combinations

  • LLMNR Poisoning β†’ Pass-the-Hash β†’ Token Impersonation β†’ Domain Admin

  • Password Spraying β†’ Kerberoasting β†’ Lateral Movement β†’ Mimikatz β†’ Golden Ticket

  • LNK File Attack β†’ Credential Capture β†’ GPP Enumeration β†’ Service Account Compromise

Tool Integration Workflow

  1. Responder captures initial credentials

  2. CrackMapExec tests credential validity and finds admin access

  3. Impacket tools perform targeted attacks (secretsdump, GetUserSPNs)

  4. Metasploit provides automated enumeration (GPP, SMB enumeration)

  5. Mimikatz extracts additional credentials from memory

  6. BloodHound maps privilege escalation paths

  7. Manual techniques fill gaps where automated tools fail


πŸ“ Final Notes

This checklist represents a systematic approach to Active Directory penetration testing aligned with PJPT examination requirements. Each technique builds upon the previous ones, creating a comprehensive attack methodology.

Remember: The goal is not just to achieve domain admin access, but to demonstrate a thorough understanding of the attack chain, document findings professionally, and provide actionable remediation advice.

Practice Environment: Test all techniques in a lab environment before the exam. Tools and commands may behave differently across various Windows versions and domain configurations.

Time Management: Stick to the time allocations suggested above. It's better to have partial access with good documentation than complete access with poor documentation.

Good luck with your PJPT examination! πŸš€

Last updated