TCM Security Practical Ethical Hacker (PEH)
TCM Security Practical Ethical Hacker (PEH)

TCM Security Practical Ethical Hacker (PEH)

Publish Date
January 25, 2024

My Experience with TCM Security's Practical Ethical Hacker Course

I recently completed the Practical Ethical Hacker course offered by TCM Security, focusing on Active Directory penetration testing. This hands-on experience provided valuable insights into enterprise security assessment.

The course required setting up a complete Active Directory environment for testing. This involved:

  • Creating a Windows Server as Domain Controller
  • Adding workstations to the domain
  • Configuring user accounts and permissions
  • Setting up network services
  • Throughout the course, I learned and implemented various attack techniques:
  • Initial Enumeration
    • Network scanning
    • Service identification
    • User enumeration
  • Gaining Initial Access
    • Password spraying
    • LLMNR poisoning
    • SMB relay attacks
  • Privilege Escalation
    • Kerberoasting
    • Token impersonation
    • Misconfigured services
  • Domain Dominance
    • Pass-the-hash attacks
    • Golden ticket attacks
    • Domain persistence techniques

The course provided several valuable lessons:

  • The importance of proper Active Directory configuration and hardening
  • Common misconfigurations that lead to compromise
  • Detection and prevention of various attack vectors
  • Real-world application of penetration testing tools

TCM Security's Practical Ethical Hacker course offered an excellent hands-on learning experience. The knowledge gained will be invaluable for conducting security assessments and implementing better defensive measures.