# PTSv2 Practice Labs

## INE - PTSv2 Course

* [🔬SMB Enum](https://blog.syselement.com/ine/courses/ejpt/assessment-methodologies/3-enumeration/smb-enum)
* [🔬FTP Enum](https://blog.syselement.com/ine/courses/ejpt/assessment-methodologies/3-enumeration/ftp-enum)
* [🔬SSH Enum](https://blog.syselement.com/ine/courses/ejpt/assessment-methodologies/3-enumeration/ssh-enum)
* [🔬HTTP Enum](https://blog.syselement.com/ine/courses/ejpt/assessment-methodologies/3-enumeration/http-enum)
* [🔬MYSQL Enum](https://blog.syselement.com/ine/courses/ejpt/assessment-methodologies/3-enumeration/mysql-enum)
* [🔬SMTP Enum](https://blog.syselement.com/ine/courses/ejpt/assessment-methodologies/3-enumeration/smtp-enum)

***

* [🔬IIS - WebDAV](https://blog.syselement.com/ine/courses/ejpt/hostnetwork-penetration-testing/1-system-attack/windows-attacks/iis-webdav)
* [🔬SMB - PsExec](https://blog.syselement.com/ine/courses/ejpt/hostnetwork-penetration-testing/1-system-attack/windows-attacks/smb-psexec)
* [🔬RDP](https://blog.syselement.com/ine/courses/ejpt/hostnetwork-penetration-testing/1-system-attack/windows-attacks/rdp)
* [🔬WinRM](https://blog.syselement.com/ine/courses/ejpt/hostnetwork-penetration-testing/1-system-attack/windows-attacks/winrm)
* [🔬Win Kernel Privesc](https://blog.syselement.com/ine/courses/ejpt/hostnetwork-penetration-testing/1-system-attack/windows-attacks/winkernel)
* [🔬UAC Bypass](https://blog.syselement.com/ine/courses/ejpt/hostnetwork-penetration-testing/1-system-attack/windows-attacks/uacme)
* [🔬Access Token](https://blog.syselement.com/ine/courses/ejpt/hostnetwork-penetration-testing/1-system-attack/windows-attacks/accesstoken)
* [🔬Alternate Data Stream](https://blog.syselement.com/ine/courses/ejpt/hostnetwork-penetration-testing/1-system-attack/windows-attacks/alternateds)
* [🔬Credentials Dumping](https://blog.syselement.com/ine/courses/ejpt/hostnetwork-penetration-testing/1-system-attack/windows-attacks/creds-dump)

***

* [🔬Bash](https://blog.syselement.com/ine/courses/ejpt/hostnetwork-penetration-testing/1-system-attack/linux-attacks/bash-shell)
* [🔬FTP](https://blog.syselement.com/ine/courses/ejpt/hostnetwork-penetration-testing/1-system-attack/linux-attacks/ftp-unix)
* [🔬SSH](https://blog.syselement.com/ine/courses/ejpt/hostnetwork-penetration-testing/1-system-attack/linux-attacks/ssh-unix)
* [🔬SAMBA](https://blog.syselement.com/ine/courses/ejpt/hostnetwork-penetration-testing/1-system-attack/linux-attacks/samba-unix)
* [🔬Cron Jobs](https://blog.syselement.com/ine/courses/ejpt/hostnetwork-penetration-testing/1-system-attack/linux-attacks/cron)
* [🔬SUID](https://blog.syselement.com/ine/courses/ejpt/hostnetwork-penetration-testing/1-system-attack/linux-attacks/suid)
* [🔬Hashes Dumping](https://blog.syselement.com/ine/courses/ejpt/hostnetwork-penetration-testing/1-system-attack/linux-attacks/creds-dump-unix)
* [🔬Tshark, ARP, WiFi](https://blog.syselement.com/ine/courses/ejpt/hostnetwork-penetration-testing/2-network-attack/tshark-arp)

***

* [🔬HFS - MSF Exploit](https://blog.syselement.com/ine/courses/ejpt/hostnetwork-penetration-testing/3-metasploit/hfs-msf-exp)
* [🔬Tomcat - MSF Exploit](https://blog.syselement.com/ine/courses/ejpt/hostnetwork-penetration-testing/3-metasploit/tomcat-msf-exp)
* [🔬FTP - MSF Exploit](https://blog.syselement.com/ine/courses/ejpt/hostnetwork-penetration-testing/3-metasploit/ftpd-msf-exp)
* [🔬Samba - MSF Exploit](https://blog.syselement.com/ine/courses/ejpt/hostnetwork-penetration-testing/3-metasploit/samba-msf-exp)
* [🔬SSH - MSF Exploit](https://blog.syselement.com/ine/courses/ejpt/hostnetwork-penetration-testing/3-metasploit/ssh-msf-exp)
* [🔬SMTP - MSF Exploit](https://blog.syselement.com/ine/courses/ejpt/hostnetwork-penetration-testing/3-metasploit/smtp-msf-exp)
* [🔬Meterpreter - MSF](https://blog.syselement.com/ine/courses/ejpt/hostnetwork-penetration-testing/3-metasploit/meterpreter-msf)
* [🔬Win Post Exploitation - MSF](https://blog.syselement.com/ine/courses/ejpt/hostnetwork-penetration-testing/3-metasploit/win-post-msf)
* [🔬Linux Post Exploitation - MSF](https://blog.syselement.com/ine/courses/ejpt/hostnetwork-penetration-testing/3-metasploit/linux-post-msf)

***

* [🔬Fixing Exploits - HFS](https://blog.syselement.com/ine/courses/ejpt/hostnetwork-penetration-testing/4-exploitation/fix-exp)
* [🔬Win Workflow Platform - MSF](https://blog.syselement.com/ine/courses/ejpt/hostnetwork-penetration-testing/4-exploitation/workflow-exp)
* [🔬Win Black Box Pentest](https://blog.syselement.com/ine/courses/ejpt/hostnetwork-penetration-testing/4-exploitation/win-blackbox-exp)
* [🔬Linux Black Box Pentest](https://blog.syselement.com/ine/courses/ejpt/hostnetwork-penetration-testing/4-exploitation/linux-blackbox-exp)

***

* [🔬Windows Post-Exploitation](https://blog.syselement.com/ine/courses/ejpt/hostnetwork-penetration-testing/5-post-exploit/win-post-exp)
* [🔬Windows Privilege Escalation](https://blog.syselement.com/ine/courses/ejpt/hostnetwork-penetration-testing/5-post-exploit/win-privesc)
* [🔬Windows Persistence](https://blog.syselement.com/ine/courses/ejpt/hostnetwork-penetration-testing/5-post-exploit/win-persistence)
* [🔬Linux Post-Exploitation](https://blog.syselement.com/ine/courses/ejpt/hostnetwork-penetration-testing/5-post-exploit/linux-post-exp)
* [🔬Linux Privilege Escalation](https://blog.syselement.com/ine/courses/ejpt/hostnetwork-penetration-testing/5-post-exploit/linux-privesc)
* [🔬Linux Persistence](https://blog.syselement.com/ine/courses/ejpt/hostnetwork-penetration-testing/5-post-exploit/linux-persistence)
* [🔬Cracking Hashes](https://blog.syselement.com/ine/courses/ejpt/hostnetwork-penetration-testing/5-post-exploit/crack-hashes)
* [🔬Pivoting](https://blog.syselement.com/ine/courses/ejpt/hostnetwork-penetration-testing/5-post-exploit/pivoting)

***

* [🔬HTTP Enumeration](https://blog.syselement.com/ine/courses/ejpt/webapp-penetration-testing/1-webapp-http/http-enum)
* [🔬Web App Scanning](https://blog.syselement.com/ine/courses/ejpt/webapp-penetration-testing/1-webapp-http/webapp-scan)
* [🔬Web App Attacks](https://blog.syselement.com/ine/courses/ejpt/webapp-penetration-testing/1-webapp-http/webapp-attacks)

## TryHackMe

* [Blaster](https://tryhackme.com/room/blaster)
* [Blog](https://tryhackme.com/room/blog)
* [Blue](https://tryhackme.com/room/blue)
* [Bolt](https://tryhackme.com/room/bolt)
* [Chill Hack](https://tryhackme.com/room/chillhack)
* [Ice](https://tryhackme.com/room/ice)
* [Ignite](https://tryhackme.com/room/ignite)
* [Retro](https://tryhackme.com/room/retro)
* [Startup](https://tryhackme.com/room/startup)

***
