eCPPTv2 Review - eLearnSecurity Certified Professional Penetration Tester 2021
Complete review of INE Security's eCPPTv2 certification: advanced pentesting course, complex labs, pivoting exam, and my experience obtaining the certification.
123 articles
Complete review of INE Security's eCPPTv2 certification: advanced pentesting course, complex labs, pivoting exam, and my experience obtaining the certification.
Learn to escalate privileges on Windows through kernel exploits, vulnerability enumeration, and tools like WESNG and Watson.
Manual exploitation of Buffer Overflow in SLMail 5.5, from fuzzing to obtaining a reverse shell, controlling the EIP and avoiding badchars.
Explanation of Path Hijacking and Library Hijacking privilege escalation techniques on Linux, how to exploit them through PATH manipulation, and practical examples with SUID permissions and sudo.
Practical guide to configure a Linux system as a router using IP Forwarding and static routes with ip route
Learn how to use Plink.exe, the command-line version of PuTTY, to perform Remote Port Forwarding on older Windows systems without a built-in SSH client.
Practical guide on how to use Sshuttle to perform pivoting by simulating a VPN through SSH connections between different networks.
Learn to perform pivoting and port forwarding on Windows using Netsh, a native utility that allows port tunneling and firewall control.
Practical guide on how to use Socat to perform pivoting techniques, creating redirections and bidirectional tunnels between multiple machines across different networks.
If you like the content and want to support the project, you can buy me a coffee. Your support helps keep the site active and create more quality content.
Buy me a coffeeThanks for your support 🙏