Practical Junior Penetration Tester

The Practical Junior Penetration Tester (PJPT) is a course provided by TCM Security. At the end of the course you have to take an exam.

Below are my notes taken throughout the course:

Five stages of ethical hacking

[1] Information Gathering / Reconnaissance

The reconnaissance phase involves gathering data on a target system using passive methods like searching public info, browsing websites, and checking DNS records to find potential entry points.

[2] Scanning / Enumeration

During the scanning and enumeration phase, the ethical hacker actively examines the target system for open ports, services, and vulnerabilities using tools like port scanners, network mappers, and vulnerability scanners. This process reveals potential weaknesses that could be exploited.

[3] Gaining Access / Exploitation

In this phase, the ethical hacker exploits vulnerabilities to gain unauthorized access using methods like password cracking and social engineering.

[4] Maintaining Access

After gaining access, the ethical hacker works to maintain it by bypassing security, setting up backdoors, and ensuring persistent access. The goal is to simulate a real attacker and evaluate the impact of a successful breach.

[5] Covering Tracks

In the final stage, the ethical hacker erases all traces of their actions by deleting logs, altering files, and restoring the system. The aim is to ensure the hacking activity goes unnoticed, leaving no evidence of the test.

Leave a comment