Overall progress
0 / 12 units
Already complete
β Getting Started
β Pen Test Process
β Starting Point Tier 0
β Starting Point Tier 1
β Starting Point Tier 2
β Box β CCTV
β Box β Facts
same
Network Enumeration with Nmap
The module you hit the paywall on β now unlocked. All-port scanning, version detection, script scanning, OS detection.
Lame Linux
nmap reveals Samba version β searchsploit β exploit. Cleanest possible test of that loop with no web complexity.
same
Web Requests + Intro to Web Applications
HTTP methods, headers, cookies. Reading source code and a web app as an attacker.
Nibbles Linux
Web enum β login β file upload foothold β sudo privesc. No pre-built exploit β find the upload vector yourself.
same
Using Web Proxies (Burp Suite)
Intercept, Repeater, Decoder β deliberate Burp use. Re-document your Facts password reset step by step in your own words.
Shocker Linux
ShellShock via CGI. Read HTTP headers carefully and craft a manual payload β forces you to understand what you're sending.
Milestone 1: Can enumerate fully and get a foothold on an Easy box without hints
same
File Inclusion + Command Injections
LFI/RFI and command injection. Vulnerability classes that often have no CVE number.
Beep Linux
Multiple foothold paths β deliberately take the LFI path to reinforce the module.
Jerry Windows
First real Windows box. Default creds β WAR file upload β shell. WAR deployment appears constantly in enterprise Java environments.
same
Password Attacks + Metasploit Framework
Hashcat modes in depth. Metasploit as a deliberate tool, not a crutch.
Milestone 2: Can exploit a web vulnerability manually before reaching for a script. Comfortable on Windows.
same
Linux Privilege Escalation
sudo, SUID, cron, writable PATH, capabilities. Map to your Facts and CCTV notes.
Bashed Linux
Enumerate manually before LinPEAS. The privesc is subtle β sudo scriptmanager abuse.
same
Windows Fundamentals + Windows PrivEsc
Filesystem, registry, services, token impersonation, UAC bypass.
Devel Windows
FTP write β IIS shell β token impersonation. Appears on almost every Windows engagement.
same
Shells and Payloads + Pivoting
msfvenom, bind vs reverse, shell stabilisation, port forwarding properly.
Milestone 3: Can get root/SYSTEM on an Easy box unassisted, Linux or Windows, without automated tools as a crutch
AD early
AD Enumeration and Attacks (start)
Kerberoasting, AS-REP roasting, BloodHound. You already read the conceptual module in Unit 5 so this lands faster.
Forest Easy AD
Best introductory AD box on the platform. Teaches BloodHound β a tool you'll use on every AD engagement for the rest of your career.
same
AD Enumeration and Attacks (finish)
Pass-the-Ticket, ACL abuse, DCSync, lateral movement.
Active Easy AD
GPP creds β Kerberoast Administrator. Still appears in legacy enterprise environments. Two-stage chain.
same
Documentation and Reporting
Enterprise report structure, evidence capture, severity ratings, executive summaries. Formalises what you're already doing well.
Milestone 4: Can enumerate an AD environment, use BloodHound, and chain to Domain Admin β associate level