eCPPT course : The Honest Review
eLearnSecurity Certified Professional Penetration Tester (eCPPTv2) is a 100% practical certification focused on allowing you to prove your penetration testing skills through real world scenarios
Last updated
eLearnSecurity Certified Professional Penetration Tester (eCPPTv2) is a 100% practical certification focused on allowing you to prove your penetration testing skills through real world scenarios
Last updated
Welcome N1NJ10
in this article i will share with you my journey with eCPPT course and share my resources with you also the platforms that i practice on it and the courses that helped me to pass every section
Let's start
This section talked about the Assembly language , debuggers , Bufferoverflows attacks and concepts , Types of shell code , Malware analycis , .....
In my opinion to understand this module well you should have a programming concepts and the Assembly basics and write some Assembly codes like Hello world and this stuff
I encourage you to read this book
Penetration Testing with Shellcode :
You can practice on this great site
And try to download a vulnerable programs and practice on it
or you can find some attackboxs in Tryhackme and Hackthebox .
This is one of my best sections in the course as it was the longest and biggest section in terms of content. It covered a lot of different types of attacks and techniques that can be used for penetration testing on networks, both internally and externally , It also talked about Privilage escalation , Anonymity , .... .
If you have a network background that will ease the process , If not you can take some network courses like Network+
There is some courses that helped me on this
Practical Ethical Hacking from TCM :
Linux Privilege Escalation from TCM :
Windows Privilege Escalation from TCM :
JR Pentrationtester Path from Tryhackme :
Pre Security Path from Tryhakcme :
And you can also read this great book about practical network attacks
Attacking Network Protocols :
I like the ICMP protocol so i decide to study ICMP attacks well and this pdf helped me alot
Also you can see my post i share many websites that helped me to pass it
Try to practice more and more on this module by playing CTF or manual labs
This section talked about the Powershell but for the pentesting tasks , so you need to understand the basics before you getin , So you can read this book to get the basics
Powershell 101 :
After reading this book the section will learn you most techniques about download and upload , evasion the AV and the Firewalls , execute remote commands , ...
You can practice on this techniques from your pc with another windwos vm machine this helped me to understand how powersehll really works
Also take a look on my post about sites that helped me on this section
This is one of my best sections in the course that talks about Local/Remote enumeration on linux distributions , Remote Exploitation attacks like password attacks , shellshock , Heartbleed , RMI , Lateral Movements , .....
If you have experience with playing CTF this section will be interesting for you cuz it talked about interesting topics especially pivoting
There is some courses that helped me on this :
Movement, Pivoting, and Persistence from TCM :
Wreath from Tryhackme :
Linux 101 from TCM :
Complete Beginner Path from Tryhackme :
Windows Post-Exploitation :
Linux/Unix/BSD Post-Exploitation :
OS X Post-Exploitation :
this section is very informative and have many good techniques about pivoting and persistence
This section talked about the basics web security attakcs like xss , x/csrf , sql injection , file upload , ....
Honestly this not a good one to depend on so you can practice on the hacking platforms especially Portswigger
Also take a look on my post about sites that helped me on this section
This is one of my best sections in the course but you should know some wireless basics so you can read this book to understand basics wireless concepts and attacks like WEP Cracking , KRACK , WPA Capture Attacks , Evil Twin Attacks , .....
Kali Linux Wireless Penetration Testing Beginner's Guide - Third Edition :
This module need you to have a network adapter like Alfa adapters this is the best ones
You can practice on your Home network or from Attack-Defense
Also take a look on my post about sites that helped me on this section
This section is good also cuz it have a good introduction about Ruby lang and help you to make your own modules in metasploit and it gives you a good brief about how to use metasploit
I encourage you to read this book about metasploit and it's modules
Metasploit Penetration Testing Cookbook - Third Edition:
You can practice in your home lab or from the above platforms
Also take a look on my post about sites that helped me on this section
I will try to update this post from time to time with other resources so make sure to save this post and fell free to follow me on linkedin i'm active on it
And you can join To this Telegram channels this will help you especially you're an arabic one