-
It’s been a while since I detailed some progress on the CPTS, so here’s where we’re at: I’ve just finished the module titled: ‘Pivoting, Tunneling, Port Forwarding‘. It was challenging to learn and internalize a lot of the techniques that were taught so this post is basically my notes from experimenting with pivoting and a short tutorial on how to establish a pivot and double pivot with Ligolo-NG. Note: the skills assessment for the HTB module is what I used…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
It’s been a few weeks since I’ve posted, but I’m happy to report that I’ve kept working on the CPTS modules and am a few ahead of this post at time of writing, so I’ll be backfilling for a while here with a ton of content that I’ve learned. There was a section after section 3, information gathering, titled ‘Vulnerability Assessment‘. I’ve decided not to dedicate an entire post to the concept as it’s relatively simple and not as applicable…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
I clearly misspoke a few posts ago, as two days of study time is not 24 hours of study time, but rather 48 hours of study time, as is evidenced by the time it took me to complete this module. This was an extremely comprehensive section regarding manually footprinting common services and the labs were particularly challenging. I don’t want to get DMCA’d by HTB, so I won’t list any specifics or walkthroughs from the module but rather some things…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Welcome to my blog. Today, 5 Jan ’25, is the first day of my mission to obtain both HackTheBox’s Certified Penetration Testing Specialist (CPTS) and OffSec’s ‘Offensive Security Certified Professional’ (OSCP) certifications. I figure I’ll detail things that I’ve learned and general tips here, although user beware my writeups and any opinions or suggestions therein contained are entirely my own, and can be at times erratic, terse, and generally unhelpful. This is something I aim to address as I progress…


