Niflheim World

Welcome to Niflheim !

  • First 5 messages from new users (pre-moderated user) will be checked for flood/spam before being posted on the forum. Users will also be checked for a multi-account.
    If you want to communicate without delay, get a free Huscarl status (how to get - User Groups), or buy premium status to see all hidden content (how to buy - Premium status)

    The administrator has only one telegram - @ftmadmin and our chat - Link on chat

ECPPT Penetration Testing Professional 2024


ENCRYP73DGH0ST

Under Review
Under Review
Joined
Dec 20, 2024
Messages
2
Reaction score
0
NL COIN
17
Please note, if you want to make a deal with this user, that it is blocked.


INE Security’s Certified Professional Penetration Tester certification is a practical, hands-on certification exam designed for professional Penetration Testers and Ethical Hackers. The certification exam assesses and validates that the individual has the knowledge, skills, and abilities required to fulfill the role of a modern Penetration Tester.
Exam Objectives
The eCPPT evaluates an individual’s skills across various domains and objectives, certifying their mastery and understanding.
Information Gathering & Reconnaissance (10%)
  • Perform Host Discovery and Port Scanning on Target Networks
  • Enumerate Information From Services Running on Open Ports
Initial Access (15%)
  • Perform Username Enumeration to Identify Valid User Accounts on Target Systems
  • Perform Password Spraying Attacks to Identify Valid Credentials for Initial Access
  • Perform Brute-Force Attacks on Remote Access Services for Initial Access
Web Application Penetration Testing (15%)
  • Perform Web Application Enumeration to Identify Potential Vulnerabilities & Misconfigurations
  • Identify and Exploit Common Web Application Vulnerabilities For Initial Access (SQLi, XSS, Command Injection, etc)
  • Perform Brute-Force Attacks Against Login Forms
  • Exploit Vulnerable and Outdated Web Application Components
  • Exfiltrate Data and Credentials From Compromised Web Applications and Databases
Exploitation & Post-Exploitation (25%)
  • Identify and Exploit Vulnerabilities or Misconfigurations in Services
  • Identify and Exploit Privilege Escalation Vulnerabilities
  • Dump and Crack Password Hashes
  • Identify Locally Stored Unsecured Credentials
Exploit Development (5%)
  • Develop/Modify Exploit Code For Initial Access and Post-Exploitation
  • Identify and Exploit Memory Corruption Vulnerabilities (Stack Overflow, Buffer Overflow)
Active Directory Penetration Testing (30%)
  • Perform Active Directory Enumeration
  • Identify Domain Accounts With Weak or Empty Passwords
  • Perform AS-REP Roasting to Steal Kerberos Tickets for Authentication
  • Perform Active Directory Lateral Movement Techniques (Pass-the-Hash, Pass-the-Ticket)
  • Obtain Domain Admin Privileges/Access
 
shape1
shape2
shape3
shape4
shape7
shape8
Top