Navigation X

ECPPT Penetration Testing Professional 2024

Posted by Sauron posted at


ECPPT Penetration Testing Professional 2024  123
Sauron Supreme
201
Posts
200
Threads
Supreme
#1
[Image: giNbKgR.png]
 
INE Security’s Certified Professional Penetration Tester certification is a practical, hands-on certification exam designed for professional Penetration Testers and Ethical Hackers. The certification exam assesses and validates that the individual has the knowledge, skills, and abilities required to fulfill the role of a modern Penetration Tester.​
Exam Objectives​
The eCPPT evaluates an individual’s skills across various domains and objectives, certifying their mastery and understanding.​
Information Gathering & Reconnaissance (10%)​
  • Perform Host Discovery and Port Scanning on Target Networks​
  • Enumerate Information From Services Running on Open Ports​
Initial Access (15%)​
  • Perform Username Enumeration to Identify Valid User Accounts on Target Systems​
  • Perform Password Spraying Attacks to Identify Valid Credentials for Initial Access​
  • Perform Brute-Force Attacks on Remote Access Services for Initial Access​
Web Application Penetration Testing (15%)​
  • Perform Web Application Enumeration to Identify Potential Vulnerabilities & Misconfigurations​
  • Identify and Exploit Common Web Application Vulnerabilities For Initial Access (SQLi, XSS, Command Injection, etc)​
  • Perform Brute-Force Attacks Against Login Forms​
  • Exploit Vulnerable and Outdated Web Application Components​
  • Exfiltrate Data and Credentials From Compromised Web Applications and Databases​
Exploitation & Post-Exploitation (25%)​
  • Identify and Exploit Vulnerabilities or Misconfigurations in Services​
  • Identify and Exploit Privilege Escalation Vulnerabilities​
  • Dump and Crack Password Hashes​
  • Identify Locally Stored Unsecured Credentials​
Exploit Development (5%)​
  • Develop/Modify Exploit Code For Initial Access and Post-Exploitation​
  • Identify and Exploit Memory Corruption Vulnerabilities (Stack Overflow, Buffer Overflow)​
Active Directory Penetration Testing (30%)​
  • Perform Active Directory Enumeration​
  • Identify Domain Accounts With Weak or Empty Passwords​
  • Perform AS-REP Roasting to Steal Kerberos Tickets for Authentication​
  • Perform Active Directory Lateral Movement Techniques (Pass-the-Hash, Pass-the-Ticket)​
  • Obtain Domain Admin Privileges/Access​


Hidden Content
You must register or login to view this content.

Reply
nichacks Junior Member
5
Posts
0
Threads
Junior Member
#2
(12 days ago)Sauron Wrote:
[Image: giNbKgR.png]
 
INE Security’s Certified Professional Penetration Tester certification is a practical, hands-on certification exam designed for professional Penetration Testers and Ethical Hackers. The certification exam assesses and validates that the individual has the knowledge, skills, and abilities required to fulfill the role of a modern Penetration Tester.​
Exam Objectives​
The eCPPT evaluates an individual’s skills across various domains and objectives, certifying their mastery and understanding.​
Information Gathering & Reconnaissance (10%)​
  • Perform Host Discovery and Port Scanning on Target Networks​
  • Enumerate Information From Services Running on Open Ports​
Initial Access (15%)​
  • Perform Username Enumeration to Identify Valid User Accounts on Target Systems​
  • Perform Password Spraying Attacks to Identify Valid Credentials for Initial Access​
  • Perform Brute-Force Attacks on Remote Access Services for Initial Access​
Web Application Penetration Testing (15%)​
  • Perform Web Application Enumeration to Identify Potential Vulnerabilities & Misconfigurations​
  • Identify and Exploit Common Web Application Vulnerabilities For Initial Access (SQLi, XSS, Command Injection, etc)​
  • Perform Brute-Force Attacks Against Login Forms​
  • Exploit Vulnerable and Outdated Web Application Components​
  • Exfiltrate Data and Credentials From Compromised Web Applications and Databases​
Exploitation & Post-Exploitation (25%)​
  • Identify and Exploit Vulnerabilities or Misconfigurations in Services​
  • Identify and Exploit Privilege Escalation Vulnerabilities​
  • Dump and Crack Password Hashes​
  • Identify Locally Stored Unsecured Credentials​
Exploit Development (5%)​
  • Develop/Modify Exploit Code For Initial Access and Post-Exploitation​
  • Identify and Exploit Memory Corruption Vulnerabilities (Stack Overflow, Buffer Overflow)​
Active Directory Penetration Testing (30%)​
  • Perform Active Directory Enumeration​
  • Identify Domain Accounts With Weak or Empty Passwords​
  • Perform AS-REP Roasting to Steal Kerberos Tickets for Authentication​
  • Perform Active Directory Lateral Movement Techniques (Pass-the-Hash, Pass-the-Ticket)​
  • Obtain Domain Admin Privileges/Access​



Reply

Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
or
Sign in
Already have an account? Sign in here.


Users browsing this thread: 1 Guest(s)