-
Jumping right into it this week: This module really wasn’t too difficult, although I did run into some trouble with the skills assessment. To quickly summarize, this module covered some surface level web hacking techniques, namely enumeration and digging through hidden directories to establish a viable target list. Below is a rough outline and what I learned from each section: Skills assessment | lessons learned The skills assessment here should have been simple, but just as the previous ones I…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
I clearly misspoke a few posts ago, as two days of study time is not 24 hours of study time, but rather 48 hours of study time, as is evidenced by the time it took me to complete this module. This was an extremely comprehensive section regarding manually footprinting common services and the labs were particularly challenging. I don’t want to get DMCA’d by HTB, so I won’t list any specifics or walkthroughs from the module but rather some things…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
I’m still in the process of working through the footprinting module, which was estimated to take two days of study. This obviously breaks down to 24 hours of study time which can be a lot on top of all the other day to day things that life spawns. It’s also like twenty some lessons that compose near entirely of text walls followed by short labs. So this post is a short one about a side quest that I’ve taken up…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
Diving right into it, I finished the ‘Network Enumeration with Nmap‘ section over the weekend and am dragging my feet on the ‘Footprinting’ module this week so I decided to write a short post about the Nmap module and how it is shaping my enumeration methodology. For those who don’t know, NMAP is a free and open source network mapping utility for network discovery and security auditing. It is capable of many things, primarily host and port enumeration, which is…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶
-
I should mention that this isn’t the first time I’ve been here. I actually started studying for the CPTS over a year ago, before I had jumped back into university. I didn’t get very far, so this last few days I’ve been faced with the content in the beginner sections that I had already completed once. I had (apparently) finished the ‘Penetration Testing Process’ and ‘Getting Started’ modules and gotten about halfway through the introductory ‘Network Enumeration with Nmap’ module…
¶¶¶¶¶
¶¶¶¶¶
¶¶¶¶¶


