Table of contents 🍕 eJPT Study Notes Author eCPPTv2 Study Notes INE eJPT Exam Description eJPT Certification RFS Tips Before the Exam Prepare your Setup Questions? Start Hacking Methodology 1️⃣ To Scan a Network 2️⃣ To Attack a Linux Machine 3️⃣ To Attack a Windows Machine 4️⃣ Pivoting Methodology 5️⃣ Linux Post Exploitation 6️⃣ Windows Post Exploitation Community LinkedIn Discord Networking 🟢 OSI Layers 🟢 Protocols 🟢 Subnetting 🟢 Routing Pivoting Network Protocols 🟢 FTP 21 🟢 SSH 22 ✅ HTTP 80 🟢 NetBIOS 139 🟠 SMB 445 MySQL 3306 🟢 RDP 3389 Web Attacks XSS SQLi Path Traversal Command Injection LFI - Local File Inclusion LFI cheatsheet - HTB Web CMS Attacks Wordpress Joomla TomCat Exploits Search Exploits Linux Windows Tools dirb 🟢 Gobuster Nmap Netcat Burpsuite 🟢 SQLMap 🟢 Metasploit Hydra 🟢 John the Ripper Hashcat Web Tools 😍 RevShells MD5 Crack CyberChef SecLists TryHackMe Rooms DogCat Archangel OWASP Juice Shop Hack The Box Rooms Page 2 Create Your Own Lab Page 3 Other Resources Page 1 TCM Security Courses Page 4