CPTS Preparation
The Hack The Box CPTS Preparation track equips learners with the essential knowledge and practical skills needed to succeed in the Certified Penetration Testing Specialist exam.
EASY
AD/Certificate abuse, WinRM
Fluffy
Initial exploit → credential access → abuse of AD/ADCS and WinRM for lateral/privilege escalation.
certipy, WinRM, RCE PoC
Web: SQLi / LFI / log poisoning
Trick
SQL injection → LFI / log poisoning → escalate through service misconfigurations.
sqlmap, LFI/log-poisoning techniques
Service misconfiguration (Redis / SSH key)
Postman
Unauthenticated Redis / write SSH key to get initial access; follow-up privilege escalation.
redis-cli, ssh-key exploitation, john/hashcat
MEDIUM
AD / Domain-focused (Medium)
Web/Service → Jenkins RCE → PrivEsc (Windows)
Jeeves
Abuse of Jenkins (unauthenticated/script console) for RCE, then Windows privilege escalation techniques.
Jenkins console, post-exploitation priv‑esc tools
ADCS / Certificate / AD enumeration
TombWatcher
AD enumeration + ADCS abuse (certificate-related escalation techniques).
certipy, BloodHound, impacket
Kerberos / relay / credential discovery
VulnCicada
Information leak + Kerberos relay / certificate relay to obtain machine certs or domain access.
petitpotam, certipy, impacket
Kerberoast / DPAPI / secret extraction
Voleur
Kerberoast / targeted ticket cracking + DPAPI / secrets dump to recover creds and escalate.
Rubeus, mimikatz, secretsdump
AD: ACL / GenericAll / password reset abuse
Administrator
AD ACL enumeration and abuse (GenericAll / password resets) to gain domain admin.
BloodHound, impacket, aclpwn-style techniques
Ansible / leaked vault blobs → AD / creds
Authority
Discovery of Ansible vault blobs / secrets → decrypt/crack to obtain creds and pivot in the network.
ansible-vault, john/hashcat, AD tooling
Web / Application / Service (Medium)
ASP.NET insecure deserialization / ViewState
Pov
Information disclosure (web.config), insecure deserialization (ViewState/ysoserial) → RCE and escalation.
ysoserial.net, PowerShell, mimikatz
Web: subdomain enum → SQLi → LFI/RFI
StreamIO
Subdomain enumeration → SQL injection to steal creds → LFI/RFI to achieve RCE.
sqlmap, LFI → RFI chains
Web upload / symlink privesc / file abuse
Media
Malicious upload / file handling to obtain credentials or hashes; symlink/FS abuse for privilege escalation.
Media — walkthrough
file upload exploitation, hash cracking
Web app / Git / Vault interplay → host compromise
Craft
Exploitation of web services (Gogs/Vault or similar) → steal secrets, pivot to host and escalate.
web RCE, Vault access, SSH pivot
HARD
AD / delegation (FTP / KeePass → MSSQL → delegation)
Redelegate
Anonymous FTP → KeePass database recovery → MSSQL credentials → abuse of constrained delegation / force-change to escalate to domain.
keepass2john/john, mssql tools, impacket
Complex LFI → DNS/key leak → interception → priv esc
Snoopy
LFI to read BIND/DNS keys → manipulate DNS / intercept password resets (mail/Mattermost) → SSH MITM/privilege escalation.
socat/mitmproxy, SSH MITM, mail spoofing
INSANE
Multi-step AD / LDAP injection / container escape / AD trust abuse
Ghost
LDAP injection → credential exfiltration (Gitea) → RCE → container pivot → abuse of AD trusts and multi-step domain takeover.
LDAP injection scripts, container escape payloads, impacket, AD tooling
Last updated