Information Gathering, Enumeration & Attack Surface Mapping
15%
Service discovery, protocol enumeration, web content discovery, AD reconnaissance, and prioritization of attack paths.
Vulnerability Assessment, Exploitation Planning & Initial Access
20%
Vulnerability validation, exploit adaptation, manual exploitation workflow, and reliable foothold establishment.
Web Application & Common Service Exploitation
15%
Web flaws and service-level weaknesses commonly encountered in enterprise pentest scenarios.
Privilege Escalation (Linux & Windows)
20%
Kernel/service misconfigurations, credentials abuse, and local privilege escalation methodology.
Active Directory Attacks, Lateral Movement & Pivoting
20%
AD enumeration, credential attacks, movement between hosts, pivoting, and objective completion in domain environments.
Post-Exploitation, Documentation & Professional Reporting
10%
Evidence collection, impact explanation, remediation guidance, and exam-style reporting discipline.