Reviewing the Practical Network Penetration Tester (PNPT) Courses Pt. 6
Let’s dive into the Practical Ethical Hacking — The Complete Course: Attacking Active Directory — Initial Attack Vectors, and Attacking Active Directory — Post Compromise Enumeration The Initial Attack Vectors section starts off with Heath’s overview of what LLMNR (formerly NetBIOS Name Service) is, how it’s used to identify hosts when DNS resolution fails, and…
Reviewing the Practical Network Penetration Tester (PNPT) Course Pt. 5
In Part 4 I covered Practical Ethical Hacking — The Complete Course: Scanning and Enumeration and Exploitation Basics sections. In that review we walked through several ways to enumerate and scan for different vulnerabilities on a target computer. We’ve covered several tools that allowed us to identify potentially vulnerable services and ports, as well as…
Reviewing the Practical Network Penetration Tester (PNPT) Course Pt. 1
It’s been a little over two years since I obtained my last certification, the eWPTX from eLearnSecurity. My primary career focus has been on Web Application penetration testing, but I’ve always wanted to expand my skill-set to encompass Mobile and Network testing as well. Once Heath Adams and TCM Security announced the launch of the…
Reviewing the Practical Network Penetration Tester (PNPT) Course Pt. 4
Previously I covered the Ethical Hacker Methodology and Reconnaissance sections of the Practical Ethical Hacking — The Complete Course. That review covered the typical methodology and processed used by ethical hackers when working through a penetration testing engagement as well as how to gather information necessary to establish a starting point for a test. We…
Reviewing the Practical Network Penetration Tester (PNPT) Course Pt. 3
Previously I covered the initial sections of the Practical Ethical Hacking — The Complete Course: Before We Begin, and Introduction sections. And last week I covered three sections: Notekeeping, Network Refresher, and Setting Up Our Lab. That review touched on the importance good note-keeping can have when you’re learning material, documenting findings, compiling post-test reports,…
Reviewing the Practical Network Penetration Tester (PNPT) Course Pt. 2
Last week I covered the initial sections of the Practical Ethical Hacking — The Complete Course: Before We Begin, and Introduction sections. In that review I noted how Heath touches on the necessary technical (“hard”) skills as well as the non-technical (“soft”) skills that are incredibly useful when working as a penetration tester or ethical…