s          ..                                 
    :8    < .z@8"`        ..                       
   .88     !@88E         @L             u.    u.   
  :888ooo  '888E   u    9888i   .dL   x@88k u@88c. 
-*8888888   888E u@8NL  `Y888k:*888. ^"8888""8888" 
  8888      888E`"88*"    888E  888I   8888  888R  
  8888      888E .dN.     888E  888I   8888  888R  
  8888      888E~8888     888E  888I   8888  888R  
 .8888Lu=   888E '888&    888E  888I   8888  888R  
 ^%888*     888E  9888.  x888N><888'  "*88*" 8888" 
   'Y"    '"888*" 4888"   "88"  888     ""   'Y"   
             ""    ""           88F                
                               98"                 
                             ./"                   
                            ~`                     
Musings from a mediocre hacker

Personal Course Compendium (PCC)

I’m starting this file as a tracking mechanism for courses I have completed and ones I am in the process of completing.


Course Description/Skills Practiced Status Link
Certified Red Team Operator Courseware “Students will first cover the core concepts of adversary simulation, command & control, engagement planning and reporting. They will then go through each stage of the attack lifecycle - from initial compromise to full domain takeover, data hunting and exfiltration. Students will learn how common “OPSEC failures” can lead to detection by defenders, and how to carry out those attacks in a stealthier way. Finally, they will learn how to bypass defences such as Windows Defender, AMSI and AppLocker.” Complete https://training.zeropointsecurity.co.uk/courses/red-team-ops
TCM Practical Ethical Hacking I used this course to brush up before taking the PNPT exam. Topics include: common Active Directory attack and defense, exploiting the OWASP top 10, report writing, and recon Complete https://academy.tcm-sec.com/p/practical-ethical-hacking-the-complete-course - Very, very old notes -> https://tkyn.dev/TCM-PEH-Course-Review+AD-Notes/
TCM Windows Privilege Escalation Addendum to the PNPT prep, revising previous notes. Topics include: Kernel Exploits, Password Hunting, Impersonation Attacks, Registry Attacks, Executable Files, Schedule Tasks, Startup Applications, DLL Hijacking, Service Permissions, Windows Subsystem for Linux Complete https://academy.tcm-sec.com/p/windows-privilege-escalation-for-beginners
TCM Linux Privilege Escalation Additional revision for the PNPT exam. Topics include: Kernel Exploits, Password Hunting, File Permissions, Sudo Attacks, Shell Escaping, LD_PRELOAD, SUID Attacks, Shared Object Injection, Binary Symlinks, Environment Variables, Capabilities Attacks, Scheduled Tasks, NFS, Docker Complete https://academy.tcm-sec.com/p/linux-privilege-escalation
TCM External Pentest Playbook Introduction to external pentests, now completely overshadowed by my real life experience on clients. Topics include: Scope Verification and Client Communication, Vulnerability Scanning, Common OSINT and Information Gathering Techniques, Attacking O365/OWA, Attacking Login Portals, Bypassing MFA and Escalating Access, Report Writing, Identifying Common Pentest Findings, Client Debriefs, Retests, and Attestations Complete https://academy.tcm-sec.com/p/external-pentest-playbook
TCM Web Application Security and Testing Intro to web app testing, more for refining my methodology than first exposure. From the course author “… basics of HTTP, servers, and clients, before moving through the OWASP Top 10 on our way to a full demonstration penetration test. We also cover the reporting process for web application assessments …” Complete https://academy.tcm-sec.com/p/practical-web-application-security-and-testing
x86 Assembly Language and Shellcoding on Linux Haven’t finished this course as of yet, good introduction and exercises for learning assembly. 50% https://www.pentesteracademy.com/course?id=3 - https://tkyn.dev/SLAE-x86-Assembly-and-Shellcoding-on-Linux-Notes/
Sektor7 Malware Development Essentials Haven’t finished this course either, need to get more familiar with C. From the author: It will teach you how to develop your own custom malware for latest Microsoft Windows 10. And by custom malware we mean building a dropper for any payload you want (Metasploit meterpreter, Empire or Cobalt Strike beacons, etc.), injecting your shellcodes into remote processes, creating trojan horses (backdooring existing software) and bypassing Windows Defender AV. 30% https://institute.sektor7.net/red-team-operator-malware-development-essentials - https://tkyn.dev/Sektor7-Malware-Development-Course/