TCM Security
Practical Network Penetration Tester
0%
Complete
Active Directory
0/5AD - Domain Persistence
Advanced
AD - Initial Attack Vectors
Intermediate
AD - Lateral Movement
Intermediate
AD - Post-Compromise Attacks
Intermediate
AD - Post-Compromise Enumeration
Intermediate
Exploitation
0/4Metasploit Fundamentals
Beginner
Credential Attacks
Intermediate
Manual Exploitation Techniques
Intermediate
Web Exploitation Lab
Intermediate
Fundamentals
0/4Bash Scripting Basics
Beginner
Linux Basics Lab
Beginner
Networking Fundamentals Lab
Beginner
Python Scripting Basics
Beginner
Linux PrivEsc
0/6Linux PrivEsc - Initial Enumeration
Beginner
Linux PrivEsc - SUID/SGID
Beginner
Linux PrivEsc - Cron Jobs
Intermediate
Linux PrivEsc - Kernel Exploits
Intermediate
Linux PrivEsc - Sudo Exploits
Intermediate
Linux PrivEsc - Wildcard Injection
Intermediate
Reconnaissance
0/5Email Harvesting
Beginner
Google Dorking
Beginner
Passive Recon with OSINT
Beginner
Social Media OSINT
Beginner
Breach Data Analysis
Intermediate
Reporting
0/3Finding Documentation
Beginner
Pentest Report Template
Beginner
Risk Rating Methodology
Intermediate
Scanning
0/4Network Discovery
Beginner
Port Scanning Techniques
Beginner
Service Enumeration Lab
Beginner
Web Application Scanning
Intermediate
Web Application
0/2OWASP Top 10 Lab
Intermediate
Web App Testing Methodology
Intermediate
Windows PrivEsc
0/6Windows PrivEsc - Automated Tools
Beginner
Windows PrivEsc - Initial Enumeration
Beginner
Windows PrivEsc - Kernel Exploits
Intermediate
Windows PrivEsc - Potato Attacks
Intermediate
Windows PrivEsc - Registry Exploits
Intermediate
Windows PrivEsc - Service Exploits
Intermediate