ecppt tips

know double pivoting: https://pentest.blog/explore-hidden-networks-with-double-pivoting/ BoF box to test on: Gatekeeper on THM

server and then pivoting to a few machines bind vs reverse

sqlmap to shell

first 3 modules:

  • network security

  • system security (BOF)

  • metasploit & pivoting

Pivoting practice: https://blog.pentesteracademy.com/network-pivoting-using-metasploit-and-proxychains-c04472f8eed0

Reset is not the key for buffer over flow (be smart what can reset do if your 
target is already up?!), and just try different ports on your listener side and
 try to synthetize your exploit code

For the last target don’t think a lot for the escalation , 
the solution will show up in the first moment you got access to the machine
 (just think about it)
 
DMZ msfvenom
remove user
add user
enable RDP

BoF - Gatekeeper

autoroute and the second proxy to get to DMZ
double pivoting
external webserver (do everything possibly)
pivoting to corporate network (windows machines etc)
bind vs reverse

Wreath - to practice pivoting
// useful sites
https://github.com/calcuda/eCPPT-resources
https://github.com/zer0byte/ecppt-notes-tree/master/ECPPT/network-security
jarrodrizor.com/ecppt-review
alomancy.gitbook.io/guides

https://book.hacktricks.xyz/network-services-pentesting/nfs-service-pentesting
https://book.hacktricks.xyz/network-services-pentesting/pentesting-ssh
https://mokacoding.com/blog/how-to-verify-ssh-key-password/
https://gtfobins.github.io/gtfobins/zip/
https://catonmat.net/traffic-accounting-with-iptables
https://raw.githubusercontent.com/openwall/john/bleeding-jumbo/run/ssh2john.py

Practical Ethical Hacking and Linux Privilege Escalation courses will be most relevant for the exam

run some scans through a proxy

complete the 3 blackboxes of the eJPT track - no longer avail for Free

Last updated

Was this helpful?