Penetration Testing Process
10%
Methodology, scoping, rules of engagement, reporting structure and PTES/OWASP alignment
Footprinting & Reconnaissance
15%
DNS, WHOIS, Shodan, service enumeration, OSINT, network scanning fundamentals
Vulnerability Assessment
10%
Nessus, OpenVAS, manual vulnerability identification and CVE research
Exploitation
15%
Metasploit, manual exploits, web exploitation, service-specific attacks
Post-Exploitation
15%
Situational awareness, credential hunting, pivoting, lateral movement techniques
Active Directory Attacks
20%
Full AD attack chain: enumeration, Kerberoasting, lateral movement, DCSync
Privilege Escalation
10%
Linux and Windows privilege escalation techniques, automated and manual
Reporting & Documentation
5%
Professional pentest report writing, CVSS scoring, executive summary and findings