ecppt tips
know double pivoting: https://pentest.blog/explore-hidden-networks-with-double-pivoting/ BoF box to test on: Gatekeeper on THM
server and then pivoting to a few machines bind vs reverse
sqlmap to shell
first 3 modules:
network security
system security (BOF)
metasploit & pivoting
Pivoting practice: https://blog.pentesteracademy.com/network-pivoting-using-metasploit-and-proxychains-c04472f8eed0
Reset is not the key for buffer over flow (be smart what can reset do if your
target is already up?!), and just try different ports on your listener side and
try to synthetize your exploit code
For the last target don’t think a lot for the escalation ,
the solution will show up in the first moment you got access to the machine
(just think about it)
DMZ msfvenom
remove user
add user
enable RDP
BoF - Gatekeeper
autoroute and the second proxy to get to DMZ
double pivoting
external webserver (do everything possibly)
pivoting to corporate network (windows machines etc)
bind vs reverse
Wreath - to practice pivoting
// useful sites
https://github.com/calcuda/eCPPT-resources
https://github.com/zer0byte/ecppt-notes-tree/master/ECPPT/network-security
jarrodrizor.com/ecppt-review
alomancy.gitbook.io/guides
https://book.hacktricks.xyz/network-services-pentesting/nfs-service-pentesting
https://book.hacktricks.xyz/network-services-pentesting/pentesting-ssh
https://mokacoding.com/blog/how-to-verify-ssh-key-password/
https://gtfobins.github.io/gtfobins/zip/
https://catonmat.net/traffic-accounting-with-iptables
https://raw.githubusercontent.com/openwall/john/bleeding-jumbo/run/ssh2john.py
Practical Ethical Hacking and Linux Privilege Escalation courses will be most relevant for the exam
run some scans through a proxy
complete the 3 blackboxes of the eJPT track - no longer avail for Free
Last updated
Was this helpful?