Practical Junior Penetration Tester
The Practical Junior Penetration Tester (PJPT) is a course provided by TCM Security. At the end of the course you have to take an exam.
Below are my notes taken throughout the course:
Five stages of ethical hacking
[1] Information Gathering / Reconnaissance
The reconnaissance phase involves gathering data on a target system using passive methods like searching public info, browsing websites, and checking DNS records to find potential entry points.
[2] Scanning / Enumeration
During the scanning and enumeration phase, the ethical hacker actively examines the target system for open ports, services, and vulnerabilities using tools like port scanners, network mappers, and vulnerability scanners. This process reveals potential weaknesses that could be exploited.
[3] Gaining Access / Exploitation
In this phase, the ethical hacker exploits vulnerabilities to gain unauthorized access using methods like password cracking and social engineering.
[4] Maintaining Access
After gaining access, the ethical hacker works to maintain it by bypassing security, setting up backdoors, and ensuring persistent access. The goal is to simulate a real attacker and evaluate the impact of a successful breach.
[5] Covering Tracks
In the final stage, the ethical hacker erases all traces of their actions by deleting logs, altering files, and restoring the system. The aim is to ensure the hacking activity goes unnoticed, leaving no evidence of the test.

Leave a comment