# ecppt tips

know double pivoting:\
<https://pentest.blog/explore-hidden-networks-with-double-pivoting/>\
\
BoF box to test on:\
Gatekeeper on THM<br>

server and then pivoting to a few machines bind vs reverse

sqlmap to shell

first 3 modules:

* network security
* system security (BOF)
* metasploit & pivoting

Pivoting practice:\
<https://blog.pentesteracademy.com/network-pivoting-using-metasploit-and-proxychains-c04472f8eed0>

```
Reset is not the key for buffer over flow (be smart what can reset do if your 
target is already up?!), and just try different ports on your listener side and
 try to synthetize your exploit code

For the last target don’t think a lot for the escalation , 
the solution will show up in the first moment you got access to the machine
 (just think about it)
 
DMZ msfvenom
remove user
add user
enable RDP

BoF - Gatekeeper

autoroute and the second proxy to get to DMZ
double pivoting
external webserver (do everything possibly)
pivoting to corporate network (windows machines etc)
bind vs reverse

Wreath - to practice pivoting
```

```
// useful sites
https://github.com/calcuda/eCPPT-resources
https://github.com/zer0byte/ecppt-notes-tree/master/ECPPT/network-security
jarrodrizor.com/ecppt-review
alomancy.gitbook.io/guides

https://book.hacktricks.xyz/network-services-pentesting/nfs-service-pentesting
https://book.hacktricks.xyz/network-services-pentesting/pentesting-ssh
https://mokacoding.com/blog/how-to-verify-ssh-key-password/
https://gtfobins.github.io/gtfobins/zip/
https://catonmat.net/traffic-accounting-with-iptables
https://raw.githubusercontent.com/openwall/john/bleeding-jumbo/run/ssh2john.py


```

*Practical Ethical Hacking* and *Linux Privilege Escalation* courses will be most relevant for the exam

run some scans through a proxy

~~complete the 3 blackboxes of the eJPT track - no longer avail for Free~~\
![](https://410895813-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2F-MlKjYaxo0rpR2Jsapi3%2Fuploads%2F2cE0K0TkcN0nIs2XIYof%2Fimage.png?alt=media\&token=5321235a-849e-44fe-b87d-58025eb9e433)
