-
I clearly misspoke a few posts ago, as two days of study time is not 24 hours of study time, but rather 48 hours of study time, as is evidenced by the time it took me to complete this module. This was an extremely comprehensive section regarding manually footprinting common services and the labs were particularly challenging. I don’t want to get DMCA’d by HTB, so I won’t list any specifics or walkthroughs from the module but rather some things…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
I’m still in the process of working through the footprinting module, which was estimated to take two days of study. This obviously breaks down to 24 hours of study time which can be a lot on top of all the other day to day things that life spawns. It’s also like twenty some lessons that compose near entirely of text walls followed by short labs. So this post is a short one about a side quest that I’ve taken up…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Diving right into it, I finished the ‘Network Enumeration with Nmap‘ section over the weekend and am dragging my feet on the ‘Footprinting’ module this week so I decided to write a short post about the Nmap module and how it is shaping my enumeration methodology. For those who don’t know, NMAP is a free and open source network mapping utility for network discovery and security auditing. It is capable of many things, primarily host and port enumeration, which is…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
I should mention that this isn’t the first time I’ve been here. I actually started studying for the CPTS over a year ago, before I had jumped back into university. I didn’t get very far, so this last few days I’ve been faced with the content in the beginner sections that I had already completed once. I had (apparently) finished the ‘Penetration Testing Process’ and ‘Getting Started’ modules and gotten about halfway through the introductory ‘Network Enumeration with Nmap’ module…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Welcome to my blog. Today, 5 Jan ’25, is the first day of my mission to obtain both HackTheBox’s Certified Penetration Testing Specialist (CPTS) and OffSec’s ‘Offensive Security Certified Professional’ (OSCP) certifications. I figure I’ll detail things that I’ve learned and general tips here, although user beware my writeups and any opinions or suggestions therein contained are entirely my own, and can be at times erratic, terse, and generally unhelpful. This is something I aim to address as I progress…


