Target Role: Mid-Level Penetration Tester | Salary Range: $90k - $120k | Timeline: 18-24 months
You've mastered web application security. You can find vulnerabilities. But can you run an entire engagement from start to finish?
This level transforms you from a vulnerability finder into a complete penetration tester who can:
- Conduct scoping calls with clients
- Follow PTES methodology professionally
- Bypass modern security controls
- Study and replicate latest bug bounty techniques
- Provide specific, actionable remediation recommendations
- Master web security AND specialize in a secondary domain
You should NOT be here unless you've mastered:
- ✅ All OWASP Top 10 vulnerabilities (2024)
- ✅ Burp Suite mastery (all modules)
- ✅ Web application reconnaissance
- ✅ Python/BASH scripting proficiency
- ✅ Linux command line mastery
- ✅ Can write professional penetration test reports
- ✅ Completed 50+ PortSwigger labs
- ✅ Solved 10+ HackTheBox machines
Junior pentesters find vulnerabilities. Mid-level pentesters deliver complete engagements.
You need to master:
- Scoping Calls - Define engagement scope, objectives, rules of engagement
- PTES Methodology - Follow professional penetration testing execution standard
- Control Bypass - Bypass WAFs, EDR, modern security controls
- Bug Bounty Research - Study latest techniques from HackerOne, Bugcrowd
- Remediation Expertise - Provide specific, actionable fixes
- Domain Specialization - Master web + choose a secondary domain
- PTES Methodology - Professional Engagement Execution
- Scoping Calls & Client Communication
- Control Bypass Techniques
- Bug Bounty Research & Latest Techniques
- Remediation & Security Recommendations
- Domain Specialization - Choose Your Path
- Mobile Application Security - Deep Dive
- Network Security - Deep Dive
- Cloud Security - Deep Dive
- DevOps Security - Deep Dive
- AI Security - Deep Dive
- IoT Security - Deep Dive
- Binary Reverse Engineering - Deep Dive
- Advanced Web Application Security
- Practice Labs & Real-World Scenarios
- Certifications
Critical: PTES (Penetration Testing Execution Standard) is the industry standard. You MUST follow this methodology for professional engagements.
| Phase | Description | Your Responsibilities | Best Resources |
|---|---|---|---|
| 1. Pre-engagement Interactions | Scoping, contracts, rules of engagement | Conduct scoping calls, define scope, set expectations | PTES Pre-engagement |
| 2. Intelligence Gathering | OSINT, reconnaissance, information gathering | Gather target information, identify attack surface | PTES Intelligence Gathering |
| 3. Threat Modeling | Identify threats, attack vectors, business impact | Model threats, prioritize attack vectors | PTES Threat Modeling |
| 4. Vulnerability Analysis | Identify and validate vulnerabilities | Find vulnerabilities, validate findings | PTES Vulnerability Analysis |
| 5. Exploitation | Exploit vulnerabilities, gain access | Exploit vulnerabilities, demonstrate impact | PTES Exploitation |
| 6. Post-Exploitation | Maintain access, pivot, data exfiltration | Maintain access, demonstrate business impact | PTES Post-Exploitation |
| 7. Reporting | Document findings, remediation recommendations | Write professional reports, provide remediation | PTES Reporting |
- Can conduct pre-engagement scoping calls
- Understand all 7 PTES phases
- Can gather intelligence systematically
- Can perform threat modeling
- Can document methodology in reports
- Can execute full engagement following PTES
Resources:
Critical: Scoping calls determine engagement success. You must be able to conduct professional scoping calls.
| Topic | Questions to Ask | Why It Matters |
|---|---|---|
| Scope Definition | What systems/applications are in scope? | Prevents scope creep, sets boundaries |
| Objectives | What are the business objectives? | Aligns testing with business goals |
| Rules of Engagement | What techniques are allowed? | Defines testing boundaries |
| Timeline | What's the deadline? | Sets expectations |
| Access | What credentials/access will be provided? | Determines testing approach |
| Critical Assets | What are the most critical assets? | Focuses testing efforts |
| Out of Scope | What's explicitly out of scope? | Prevents misunderstandings |
| Communication | How should findings be communicated? | Sets communication protocol |
Pre-Call Preparation:
- Research client company (industry, size, public information)
- Review previous engagement reports (if available)
- Prepare questions based on engagement type
During Call:
- Introduce yourself and your role
- Explain PTES methodology
- Ask scope-defining questions
- Document everything
- Set clear expectations
Post-Call:
- Send follow-up email summarizing scope
- Create statement of work (SOW)
- Get written approval before starting
| Skill | Description | Best Practice |
|---|---|---|
| Technical Translation | Explain technical findings to non-technical stakeholders | Use analogies, avoid jargon |
| Risk Communication | Explain business impact of vulnerabilities | Focus on business risk, not just technical |
| Status Updates | Regular communication during engagement | Daily/weekly updates |
| Finding Presentation | Present critical findings immediately | Don't wait for final report |
Resources:
Critical: Modern applications have security controls. You MUST know how to bypass them.
| Technique | Description | Best Tutorial | Practice |
|---|---|---|---|
| Encoding Bypass | URL encoding, Unicode, hex encoding | PortSwigger: WAF Bypass | PentesterLab: WAF Bypass |
| Comment Injection | SQL comments, HTTP comments | PortSwigger: SQL Injection | PortSwigger SQLi Labs |
| Case Variation | Mixed case, case-insensitive bypasses | PortSwigger: XSS | PortSwigger XSS Labs |
| Whitespace Manipulation | Tabs, newlines, spaces | PortSwigger: WAF Bypass | Test various WAFs |
| Alternative HTTP Methods | PUT, PATCH, OPTIONS instead of POST | PortSwigger: HTTP Methods | Test different methods |
| Parameter Pollution | HPP (HTTP Parameter Pollution) | PortSwigger: Parameter Pollution | PortSwigger Labs |
| JSON Bypass | JSON-specific bypasses | PortSwigger: API Security | PortSwigger API Labs |
| GraphQL Bypass | GraphQL-specific bypasses | PortSwigger: GraphQL | PentesterLab: GraphQL |
| Technique | Description | Best Tutorial | Practice |
|---|---|---|---|
| Process Injection | DLL injection, process hollowing | TryHackMe: Windows Fundamentals | TryHackMe Windows Rooms |
| Living Off The Land | Using legitimate tools (LOLBAS) | LOLBAS Project | TryHackMe: Windows Fundamentals |
| Unhooking | Bypassing API hooks | TryHackMe: Windows Fundamentals | Practice in lab |
| Shellcode Obfuscation | Encoding, encryption, packing | TryHackMe: Windows Fundamentals | TryHackMe Windows Rooms |
| Control | Bypass Technique | Best Tutorial | Practice |
|---|---|---|---|
| CSP (Content Security Policy) | CSP bypass techniques | PortSwigger: CSP | PortSwigger CSP Labs |
| CORS | CORS misconfiguration exploitation | PortSwigger: CORS | PortSwigger CORS Labs |
| Rate Limiting | Rate limit bypass techniques | PortSwigger: Rate Limiting | PortSwigger API Labs |
| 2FA/MFA | 2FA bypass techniques | PortSwigger: 2FA | PortSwigger Auth Labs |
Resources:
Critical: Bug bounty reports reveal latest attack techniques. Study them religiously.
| Platform | Description | Best For | Link |
|---|---|---|---|
| HackerOne | Largest bug bounty platform | Latest web vulnerabilities | HackerOne Hacktivity |
| Bugcrowd | Bug bounty platform | Mobile, web, API vulnerabilities | Bugcrowd Bug Bounty List |
| Intigriti | European bug bounty platform | European companies | Intigriti Programs |
| YesWeHack | Bug bounty platform | European focus | YesWeHack Programs |
1. Read Reports Daily
- Check HackerOne Hacktivity daily
- Read Bugcrowd blog posts
- Follow top hackers on Twitter/X
2. Replicate Techniques
- Set up vulnerable environments
- Replicate reported vulnerabilities
- Understand the root cause
3. Document Learnings
- Create personal knowledge base
- Document bypass techniques
- Build payload library
| Technique | Description | Example Reports | Learn More |
|---|---|---|---|
| GraphQL Vulnerabilities | GraphQL-specific attacks | HackerOne GraphQL Reports | PortSwigger: GraphQL |
| API Security Issues | REST/GraphQL API vulnerabilities | HackerOne API Reports | PortSwigger: API Security |
| SSRF Chain Attacks | Multi-step SSRF exploitation | HackerOne SSRF Reports | PortSwigger: SSRF |
| Business Logic Flaws | Application logic vulnerabilities | HackerOne Logic Flaw Reports | PortSwigger: Logic Flaws |
| Race Conditions | TOCTOU vulnerabilities | HackerOne Race Condition Reports | PortSwigger: Race Conditions |
- @stok - Bug bounty methodology
- @jhaddix - Reconnaissance techniques
- @nahamsec - Bug bounty education
- @zseano - Bug bounty methodology
Resources:
- HackerOne Hacktivity - Latest disclosed reports
- Bugcrowd Blog - Bug bounty insights
- NahamSec YouTube - Bug bounty education
Critical: Finding vulnerabilities is only half the job. You MUST provide specific, actionable remediation.
| Principle | Description | Example |
|---|---|---|
| Specific | Provide exact code/config changes | "Use parameterized queries: PreparedStatement stmt = conn.prepareStatement("SELECT * FROM users WHERE id = ?");" |
| Actionable | Clear steps to implement | Step 1: Update code, Step 2: Test, Step 3: Deploy |
| Prioritized | Risk-based prioritization | Critical → High → Medium → Low |
| Business-Focused | Explain business impact | "This vulnerability could lead to data breach affecting 10,000 users" |
| Testable | How to verify fix | "Verify fix by attempting SQL injection - should return error" |
SQL Injection Remediation:
Vulnerability: SQL Injection in login form
Risk: Critical
Impact: Complete database compromise
Remediation:
1. Use parameterized queries/prepared statements
2. Implement input validation
3. Use least privilege database accounts
4. Enable WAF rules for SQL injection
Code Example:
Before: "SELECT * FROM users WHERE username = '" + username + "'"
After: PreparedStatement stmt = conn.prepareStatement("SELECT * FROM users WHERE username = ?");
stmt.setString(1, username);
XSS Remediation:
Vulnerability: Reflected XSS in search parameter
Risk: High
Impact: Session hijacking, credential theft
Remediation:
1. Implement output encoding (HTML entity encoding)
2. Use Content Security Policy (CSP)
3. Validate and sanitize input
4. Use framework's built-in XSS protection
Code Example:
Before: <%= request.getParameter("search") %>
After: <%= ESAPI.encoder().encodeForHTML(request.getParameter("search")) %>
| Resource | Description | Link |
|---|---|---|
| OWASP Cheat Sheets | Remediation guidance | OWASP Cheat Sheets |
| PortSwigger Remediation | Vulnerability-specific fixes | PortSwigger Web Security |
| CWE Mitigations | Common Weakness Enumeration mitigations | CWE Mitigations |
Critical: Web security is mastered. Now choose a secondary domain to specialize in.
| Domain | Description | Why Specialize | Difficulty | Market Demand |
|---|---|---|---|---|
| 🌐 Web Application Security | Already mastered | Maintain expertise | ⭐ | ⭐⭐⭐⭐⭐ |
| 📱 Mobile Application Security | Android/iOS security | High demand, growing field | ⭐⭐⭐ | ⭐⭐⭐ |
| 🔌 Network Security (External) | External network pentesting | Foundational, always relevant | ⭐⭐ | ⭐⭐⭐ |
| 🏢 Network Security (Internal) | Internal network, Active Directory | High-value, complex | ⭐⭐⭐ | ⭐⭐⭐⭐ |
| ☁️ Cloud Security | AWS, Azure, GCP security | Explosive growth, high demand | ⭐⭐⭐ | ⭐⭐⭐⭐ |
| 🤖 AI Security | AI/ML system security | Emerging field, cutting-edge | ⭐⭐⭐⭐⭐ | ⭐⭐⭐⭐⭐ |
| 🔌 IoT Security | Internet of Things security | Growing field, diverse | ⭐⭐⭐⭐ | ⭐⭐⭐ |
| ⚙️ DevOps Security | Kubernetes, CI/CD security | Modern infrastructure, high demand | ⭐⭐⭐⭐ | ⭐⭐⭐⭐⭐ |
| ⚫ Binary Reverse Engineering | Exploit development, RE | Advanced, high-value | ⭐⭐⭐⭐⭐ | ⭐⭐ |
Choose based on:
- Interest - What excites you?
- Market Demand - What's hiring?
- Difficulty - Can you master it?
- Career Goals - Where do you want to be?
Recommended Paths:
- Cloud Security - Highest demand, good salary
- Internal Network Security - High-value, complex, always needed
- DevOps Security - Modern, growing, high demand
- Mobile Security - Growing field, good opportunities
Critical: Mobile apps are everywhere. Android and iOS security assessment is a high-demand skill.
#1 Resource: HexTree Android Security Course - Free course developed in collaboration with Google. 12 micro-courses, 135+ videos, 70+ hands-on challenges. This is THE resource for Android pentesting.
| Topic | Description | Best Tutorial | Practice |
|---|---|---|---|
| Android Architecture | Components, activities, services, broadcast receivers | HexTree Android Course | HTB Academy Android Path |
| APK Structure | Android package format, DEX files, manifest | HexTree Android Course | Decompile APKs with APKTool |
| Static Analysis | Code review, manifest analysis, permission review | HexTree Android Course | MobSF Static Analysis |
| Dynamic Analysis | Runtime analysis, API monitoring, hooking | HexTree Android Course | Frida Dynamic Analysis |
| Root Detection Bypass | Bypassing root detection mechanisms | HexTree Android Course | Objection Root Bypass |
| SSL Pinning Bypass | Certificate pinning bypass techniques | HexTree Android Course | Frida SSL Pinning Bypass |
| Insecure Data Storage | SharedPreferences, SQLite, file storage | HexTree Android Course | Analyze app data storage |
| Intent Vulnerabilities | Intent injection, deep link attacks | HexTree Android Course | Test intent handling |
| Tool | Purpose | Best Tutorial | Download |
|---|---|---|---|
| MobSF | Mobile Security Framework - static & dynamic analysis | MobSF GitHub | MobSF Install |
| Frida | Dynamic instrumentation toolkit | Frida Documentation | Frida Install |
| APKTool | APK reverse engineering | APKTool Documentation | APKTool GitHub |
| jadx | DEX to Java decompiler | jadx GitHub | jadx Releases |
| Objection | Runtime mobile exploration | Objection Documentation | Objection Install |
| Drozer | Android security assessment framework | Drozer Documentation | Drozer GitHub |
| Genymotion | Android emulator for testing | Genymotion | Genymotion Download |
| Burp Suite | Proxy for mobile app traffic | PortSwigger Mobile Testing | Burp Suite |
| Platform | Description | Link |
|---|---|---|
| InsecureBankv2 | Vulnerable Android banking app | InsecureBankv2 GitHub |
| Damn Vulnerable Android App (DVAA) | Vulnerable Android app | DVAA GitHub |
| OWASP MSTG Crackmes | Mobile security testing challenges | OWASP MSTG Crackmes |
| HTB Academy Android Path | Comprehensive Android pentesting path | HTB Academy Android |
| Topic | Description | Best Tutorial | Practice |
|---|---|---|---|
| iOS Architecture | iOS security model, sandboxing, entitlements | OWASP Mobile Security Testing Guide | DVIA iOS App |
| IPA Structure | iOS app package format | Apple Developer Documentation | Analyze IPA files |
| Mach-O Format | macOS/iOS binary format | Apple Mach-O Format | Analyze Mach-O binaries |
| Static Analysis | Code review, plist analysis, entitlements | OWASP Mobile Security Testing Guide | class-dump |
| Dynamic Analysis | Runtime analysis, method swizzling | Frida iOS | Frida iOS Scripts |
| Jailbreak Detection Bypass | Bypassing jailbreak checks | OWASP Mobile Security Testing Guide | Objection iOS |
| Keychain Analysis | iOS secure storage analysis | OWASP Mobile Security Testing Guide | Keychain-Dumper |
| SSL Pinning Bypass | iOS certificate pinning bypass | Frida iOS SSL | SSL Kill Switch 2 |
| Tool | Purpose | Best Tutorial | Download |
|---|---|---|---|
| Frida | Dynamic instrumentation for iOS | Frida iOS Docs | Frida Install |
| Objection | Runtime mobile exploration (iOS) | Objection iOS | Objection Install |
| class-dump | Objective-C class information extractor | class-dump | class-dump Download |
| Hopper Disassembler | macOS/iOS disassembler | Hopper | Hopper Download |
| PassionFruit | iOS app analysis framework | PassionFruit GitHub | PassionFruit Install |
| iLEAPP | iOS log analysis | iLEAPP GitHub | iLEAPP Install |
| Platform | Description | Link |
|---|---|---|
| DVIA | Damn Vulnerable iOS App | DVIA GitHub |
| iGoat | OWASP vulnerable iOS app | iGoat GitHub |
| OWASP Mobile Security Testing Guide | iOS pentesting methodology | OWASP MSTG |
| Rank | Vulnerability | Description | Best Tutorial | Practice |
|---|---|---|---|---|
| M1 | Improper Platform Usage | Misuse of platform features | HexTree Android, HTB Academy Android Path | Analyze platform usage |
| M2 | Insecure Data Storage | Weak data protection | HexTree Android | Find insecure storage |
| M3 | Insecure Communication | Weak network security | HexTree Android | Analyze network traffic |
| M4 | Insecure Authentication | Weak auth mechanisms | HexTree Android | Bypass authentication |
| M5 | Insufficient Cryptography | Weak encryption | HexTree Android | Analyze crypto |
| M6 | Insecure Authorization | Authorization flaws | HexTree Android | Find auth bypasses |
| M7 | Client Code Quality | Code vulnerabilities | HexTree Android, CodeReviewLab | Code review |
| M8 | Code Tampering | App modification | HexTree Android | Tamper with apps |
| M9 | Reverse Engineering | Code analysis | HexTree Android | Reverse engineer apps |
| M10 | Extraneous Functionality | Hidden features | HexTree Android | Find hidden features |
Mobile Security Resources:
- HexTree Android Security Course - #1 RESOURCE - Free Google collaboration course (12 micro-courses, 135+ videos, 70+ challenges)
- HTB Academy Android Path - Comprehensive Android pentesting path
- OWASP Mobile Security Testing Guide - Complete mobile testing methodology
- OWASP Mobile Top 10 - Mobile vulnerabilities list
- HackerOne Mobile Pentesting Blog - Real-world mobile pentesting methodologies
- Bugcrowd Mobile Hacking Resource Kit - Mobile hacking resources and videos
- PenTest Playbook Android - Android pentesting playbook
- Android Pentesting Handbook - Comprehensive Android pentesting guide
- Redfox Security Android Course - Paid Android pentesting course
- Infosec Android Pentesting Course - Android tools and techniques
Critical: Network security is foundational. You need both external and internal network pentesting skills.
| Topic | Description | Best Tutorial | Practice |
|---|---|---|---|
| External Reconnaissance | OSINT, subdomain enumeration, port scanning | HTB Academy External Pentesting | TryHackMe: OSINT |
| Port Scanning | Nmap, masscan, rustscan techniques | NetworkChuck: Nmap | Nmap Interactive Guide |
| Service Enumeration | Banner grabbing, service version detection | HTB Academy Network Enumeration | TryHackMe: Network Services |
| Vulnerability Scanning | Nessus, OpenVAS, Nuclei | Nessus Documentation | TryHackMe: Vulnerability Assessment |
| Exploitation | Public exploits, Metasploit | Metasploit Unleashed | TryHackMe Metasploit |
Critical: Internal network pentesting is high-value. Active Directory is everywhere in enterprise environments.
| Topic | Description | Best Tutorial | Practice |
|---|---|---|---|
| Active Directory Basics | Domain, forest, trust relationships | TryHackMe Active Directory | TryHackMe AD Rooms |
| AD Enumeration | Users, groups, computers, GPOs | TryHackMe: Active Directory Basics | TryHackMe AD Rooms |
| Kerberos Attacks | Kerberoasting, AS-REP roasting, Golden/Silver tickets | TryHackMe: Active Directory Basics | TryHackMe AD Rooms |
| Lateral Movement | Pass-the-Hash, Pass-the-Ticket, RDP, SMB | TryHackMe: Active Directory Basics | TryHackMe AD Rooms |
| BloodHound | AD attack path mapping | TryHackMe: BloodHound | BloodHound GitHub |
| Mimikatz | Credential extraction | TryHackMe: Active Directory Basics | TryHackMe AD Rooms |
| DCSync | Domain controller sync attack | TryHackMe: Active Directory Basics | TryHackMe AD Rooms |
Network Security Resources:
- TryHackMe Active Directory Module - Comprehensive AD pentesting
- HTB Academy External Pentesting Path - External network pentesting
- BloodHound GitHub - AD attack path mapping
- Impacket Tools - Network protocol tools
Critical: Cloud security is exploding. AWS, Azure, and GCP are everywhere. This is HIGH demand.
| Cloud Provider | Key Services | Pentesting Focus | Best Tutorial | Practice |
|---|---|---|---|---|
| AWS | EC2, S3, IAM, Lambda, CloudFormation | IAM misconfigurations, exposed S3 buckets, Lambda security | TryHackMe AWS | TryHackMe AWS Rooms |
| Azure | Azure AD, Storage Accounts, Functions | Azure AD misconfigurations, storage account access | TryHackMe: Cloud Security | TryHackMe: Cloud Security Module |
| GCP | Compute Engine, Cloud Storage, IAM | IAM misconfigurations, bucket permissions | TryHackMe: Cloud Security | TryHackMe: Cloud Security Module |
| Topic | Description | Best Tutorial | Practice |
|---|---|---|---|
| Cloud Enumeration | Enumerating cloud resources | CloudBrute GitHub | TryHackMe: Cloud Security |
| IAM Misconfigurations | Overly permissive IAM policies | TryHackMe: Cloud Security | CloudGoat GitHub |
| S3 Bucket Security | Exposed S3 buckets, bucket policies | TryHackMe: AWS Security | CloudBrute GitHub |
| Cloud Metadata Attacks | Instance metadata service exploitation | TryHackMe: Cloud Security | CloudGoat GitHub |
| Container Security | Docker, Kubernetes security | TryHackMe: Docker | TryHackMe: Docker Module |
Cloud Security Resources:
- TryHackMe AWS Security Module - AWS security fundamentals
- TryHackMe Cloud Security Module - Cloud security fundamentals
- CloudGoat GitHub - Vulnerable AWS environment
- Flaws.cloud - AWS security challenges
- CloudBrute GitHub - Cloud enumeration tool
Critical: DevOps security is modern infrastructure. Kubernetes, CI/CD pipelines are everywhere.
| Topic | Description | Best Tutorial | Practice |
|---|---|---|---|
| Kubernetes Security | Pod security, RBAC, network policies | KodeKloud Kubernetes | TryHackMe: Docker Module |
| Docker Security | Container security, image scanning | TryHackMe: Docker | TryHackMe: Docker Module |
| CI/CD Security | Jenkins, GitLab CI, GitHub Actions security | HTB Academy DevOps | TryHackMe: CI/CD |
| Infrastructure as Code | Terraform, CloudFormation security | HTB Academy DevOps | CloudGoat GitHub |
DevOps Security Resources:
- KodeKloud Kubernetes Course - Kubernetes fundamentals
- KodeKloud DevOps Pre-Requisites - DevOps fundamentals
- TryHackMe: Docker Room - Docker security practice
- HTB Academy DevOps Path - DevOps security path
- OWASP DevSecOps Guide - DevSecOps methodology
Critical: AI security is emerging. Understanding AI/ML vulnerabilities is cutting-edge.
| Topic | Description | Best Tutorial | Practice |
|---|---|---|---|
| Prompt Injection | Injecting malicious prompts into AI systems | OWASP LLM Top 10 | Garak LLM Scanner |
| Model Poisoning | Training data poisoning attacks | OWASP LLM Top 10 | Research papers on arxiv.org |
| Adversarial Examples | Crafting inputs to fool ML models | OWASP LLM Top 10 | Research papers on arxiv.org |
| AI-Augmented Pentesting | Using AI tools (RapidPen, VulnBot) | RapidPen Research Paper | Garak LLM Scanner |
AI Security Resources:
- OWASP LLM Top 10 - LLM vulnerabilities
- Garak GitHub - LLM vulnerability scanner
- RapidPen Research Paper - AI-automated pentesting research
- ArXiv AI Security - Latest AI security research papers
Critical: IoT devices are everywhere. Smart devices, embedded systems need security testing.
| Topic | Description | Best Tutorial | Practice |
|---|---|---|---|
| Firmware Analysis | Extracting and analyzing firmware | Firmware Analysis Toolkit | Firmware Samples |
| Hardware Hacking | UART, JTAG, SPI interfaces | OWASP IoT Top 10 | Hardware labs |
| IoT Protocols | MQTT, CoAP, Zigbee security | OWASP IoT Top 10 | IoTGoat GitHub |
| Embedded Device Security | Microcontroller security | OWASP IoT Top 10 | Hardware labs |
IoT Security Resources:
- OWASP IoT Top 10 - IoT vulnerabilities
- Firmware Analysis Toolkit - Firmware analysis tools
- IoTGoat GitHub - Vulnerable IoT firmware
- Firmadyne GitHub - Firmware emulation framework
Critical: Binary RE is advanced. Exploit development and reverse engineering are high-value skills.
| Topic | Description | Best Tutorial | Practice |
|---|---|---|---|
| ELF Analysis | Linux binary analysis | Ghidra Tutorial | pwnable.kr |
| PE Analysis | Windows binary analysis | IDA Pro Tutorial | Flare VM |
| Assembly Language | x86-64, ARM assembly | x86-64 Guide | Exploit Education |
| Exploit Development | Buffer overflows, ROP, heap exploitation | ROP Emporium | pwnable.kr |
Binary RE Resources:
- Ghidra - Free reverse engineering framework
- ROP Emporium - ROP challenges
- pwnable.kr - Binary exploitation challenges
- Exploit Education - Exploit development practice
Critical: Web security is mastered, but you need to maintain and deepen expertise.
| Topic | Description | Best Tutorial | Practice |
|---|---|---|---|
| HTTP/2 & HTTP/3 Attacks | Request smuggling, cache poisoning | PortSwigger: HTTP/2 | PortSwigger Labs |
| Advanced SSRF | SSRF chain attacks, cloud metadata | PortSwigger: SSRF | PortSwigger SSRF Labs |
| Race Conditions | TOCTOU, time-based attacks | PortSwigger: Race Conditions | PortSwigger Race Condition Labs |
| Deserialization | Insecure deserialization | PortSwigger: Deserialization | PortSwigger Deserialization Labs |
| Template Injection | SSTI, template attacks | PortSwigger: SSTI | PortSwigger SSTI Labs |
- Read latest OWASP updates
- Complete new PortSwigger labs monthly
- Study latest bug bounty reports
- Practice advanced bypass techniques
- Maintain Burp Suite proficiency
| Platform | Description | Best For | Link |
|---|---|---|---|
| HackTheBox | Realistic penetration testing | Full engagement practice | HackTheBox |
| TryHackMe | Guided learning paths | PTES methodology practice | TryHackMe Complete Beginner Path |
| PentesterLab | Web security exercises | Web application practice | PentesterLab |
| PortSwigger Labs | Web security labs | Advanced web exploitation | PortSwigger Labs |
| OWASP Juice Shop | Modern vulnerable app | OWASP Top 10 practice | Juice Shop |
1. Scoping Phase
- Define scope and objectives
- Set rules of engagement
- Create engagement plan
2. Intelligence Gathering
- Perform OSINT
- Enumerate attack surface
- Identify technologies
3. Vulnerability Analysis
- Find vulnerabilities
- Validate findings
- Prioritize by risk
4. Exploitation
- Exploit vulnerabilities
- Demonstrate impact
- Document techniques
5. Post-Exploitation
- Maintain access
- Pivot through network
- Exfiltrate data (in lab)
6. Reporting
- Write professional report
- Provide remediation
- Present findings
| Certification | Provider | Focus | Best Study Resource | Cost | Value |
|---|---|---|---|---|---|
| OSCP | Offensive Security | Hands-on exploitation | OffSec PWK Course | ~$1,499 | ⭐⭐⭐⭐⭐ |
| OSWE | Offensive Security | Web exploitation | OffSec AWAE Course | ~$1,499 | ⭐⭐⭐⭐⭐ |
| GPEN | GIAC | Penetration testing | SANS GPEN | ~$7,000+ | ⭐⭐⭐⭐ |
| GXPN | GIAC | Exploit development | SANS GXPN | ~$7,000+ | ⭐⭐⭐⭐ |
Recommended: OSCP first (most respected), then OSWE for web specialization.
- Can conduct professional scoping calls
- Understand and follow PTES methodology
- Can execute full engagement end-to-end
- Can communicate with clients professionally
- Can write professional penetration test reports
- Can bypass WAFs (Cloudflare, AWS WAF, etc.)
- Can bypass EDR/AV controls
- Understand modern security controls
- Can bypass CSP, CORS, rate limiting
- Can bypass 2FA/MFA
- Study HackerOne reports daily
- Can replicate bug bounty techniques
- Understand latest attack vectors
- Document learnings systematically
- Can provide specific remediation recommendations
- Understand business impact
- Can prioritize vulnerabilities by risk
- Can provide code examples for fixes
- Web security mastered (maintained)
- Chosen secondary domain
- Deep expertise in secondary domain
- Can assess secondary domain professionally
Master this level and you're ready for x03_Mid-Level where you'll become a true security consultant, specialize deeply, and lead engagements!
Remember:
- Master end-to-end engagement execution
- Follow PTES methodology religiously
- Study bug bounty reports daily
- Provide specific, actionable remediation
- Choose and master a secondary domain
Last Updated: January 2025
Author: Kenneth Kasuba
Feedback: GitHub Issues