Host & Network Penetration Testing: Post-Exploitation CTF 2
A detailed walkthrough of INE's Post-Exploitation CTF 2, covering SSH brute-forcing, hash cracking, lateral movement, and bypassing NTFS permissions using SeBackupPrivilege.
A detailed walkthrough of INE's Post-Exploitation CTF 2, covering SSH brute-forcing, hash cracking, lateral movement, and bypassing NTFS permissions using SeBackupPrivilege.

A comprehensive beginner's guide to Nmap - learn what it is, why it's essential, and master the most important scanning commands for network discovery and security auditing.
A comprehensive beginner-friendly walkthrough of the INE Post-Exploitation CTF challenge, covering libSSH exploitation, Linux enumeration, credential discovery, and privilege escalation techniques.
This walkthrough covers the third exploitation CTF challenge from the eJPT learning path, demonstrating service exploitation, local enumeration, SMB misconfiguration attacks, and privilege escalati...
This walkthrough covers a comprehensive penetration testing exercise demonstrating various exploitation techniques commonly encountered in real-world scenarios and eJPT certification preparation. W...
This walkthrough covers a comprehensive penetration testing exercise involving two targets, demonstrating various exploitation techniques commonly encountered in real-world scenarios and EJPT certi...
A comprehensive guide to solving the Metasploit Framework CTF 2 challenge with detailed explanations, hints, and practical examples for EJPT preparation.
A comprehensive guide to solving the Metasploit Framework CTF 1 challenge with detailed explanations, hints, and practical examples for EJPT preparation.
Welcome back to our penetration testing series! 👋 If you’ve been following along, you’ve already learned how to identify live systems and discover open ports through enumeration. Now comes the most...
Welcome back, cybersecurity adventurers! 👋 In Part 1 of our “Scanning & Enumeration” journey, we learned to put on our digital detective hats, understand the different types of scanning, and ma...