// Core Focus Areas
eJPT certification path
HackTheBox labs
Active Directory attacks
Web exploitation basics
Privilege escalation
Professional report writing
// Build These Projects
01
Complete eJPT + document lab methodology
→ write up every machine like a real professional pentest report
02
Build an Active Directory home lab
→ set up AD, attack it, then detect those attacks in the event logs
03
Complete 5 HTB machines + write reports
→ methodology, findings, exploitation steps, remediation advice for each
04
Write a privilege escalation cheatsheet
→ Linux + Windows paths, detection methods, how defenders catch each one
// The One Rule For This Phase
🎯
ALWAYS ASK: HOW WOULD THIS BE DETECTED?
Every offensive technique studied through a defensive lens first.