Practical Ethical Hacking (Part 1)
Practical Ethical Hacking (Part 2)
The Cyber Mentor has kindly shared 15 hours of the Practical Ethical Hacking (PEH) course for free. A few years ago, this is how I started learning about ethical hacking. I strongly encourage you to start watching this video and start learning. I know 15 hours sounds daunting, but Heath is an excellent instructor, and once you start to understand what is going on, you will really enjoy the course. Go ahead and hit the play button 🙂
As part of the PEH course, you will be challenged to solve capstones. Heath has kindly shared all the resources for free, and in the PEH course video, he also shows how to install the capstones. I will share the resources link here.
I highly recommend trying out the challenges on your own first. If you get stuck, refer to the walkthroughs I posted below. In some cases, there is more than one method to escalate your privileges, so I also recommend checking out walkthroughs that Heath or other students completed.
FYI, I ran into issues with the Butler capstone, so I decided to skip that capstone. However, it is essentially exploiting Jenkins, and this is covered by a walkthrough of TryHackMe’s Alfred that I have posted in the WPE Capstone Walkthrough section.
Happy Hacking! 😎