HTB Certified Active Directory Pentesting Expert
(HTB CAPE)

Instructor-led training
(16 sessions)
€ 2.400

Are you a penetration tester looking to master the intricacies of Windows and Active Directory security? Ready to elevate your skills and become an expert in the field? Your next challenge awaits!

Instructor-led training will offer you hands-on guidance, foster real-time interaction, immediate feedback, and personalized support.

I want to become a HTB Certified Active Directory Pentesting Expert

Fill in the following form and we'll notify you when registration opens.

You want to train your team?

Ready to differentiate yourself?

Deep dive into the world of Active Directory and Windows pentesting and become an expert tester.

HTB Certified Active Directory Pentesting Expert (HTB CAPE) is a highly hands-on certification assessing candidates’ skills in identifying and exploiting advanced Active Directory (AD) vulnerabilities. HTB CAPE certification holders will possess technical competency in AD and Windows penetration testing, understanding complex attack paths, and employing advanced techniques to exploit them. HTB CAPE certification holders will demonstrate proficiency in executing sophisticated attacks abusing different authentication protocols such as Kerberos and NTLM and abusing misconfigurations within AD components and standard applications in AD environments such as Active Directory Certificate Services (ADCS), Windows Update Server Services (WSUS), Exchange, and Domain Trusts. Furthermore, they will be adept at leveraging specialized tools to exploit AD from Linux and Windows and utilizing Command and Control (C2) frameworks for post-exploitation operations. They will also be able to conduct internal penetration tests professionally against modern AD environments.

What You’ll Learn:
✅ Advanced Active Directory (AD) Enumeration
✅ Advanced AD Attacks
✅ Abusing AD Protocols
✅ Abusing AD Trusts
✅ Abusing Common AD Components
✅ Command & Control (C2) Operations
✅ Windows Evasion Techniques
✅ Pivoting & Lateral Movement
✅ Advanced Post-Exploitation Tactics

Become a HTB Certified Active Directory Penetration Tester, showcase your skills to potential employers, boost your career and earn more money!

Level:
Entry to
Intermediate

Class schedule:
TBA

Duration:
8 weeks
(8h/week)

Start date:
TBA

Level:
Entry to intermediate

Class schedule:
TBA

Duration:
8 weeks (8h/week)

Start date:
November 18th

Ideal for:

Senior Penetration Testers

Cyber Security Consultants

Red Team Operators

Student Pack Includes:

> 1 year access to HTB Academy’s labs and content.

> Instructor available for technical support during the office hours (1h/week).

> Exam voucher includes two (2) exam attempts.

> Course materials such as slides, links to further reading, code snippets, lab exercises, etc.

> HTB Certified Active Directory Pentesting Expert after successfully passing the exam.

HTB Academy Access Includes:

Access to HTB Academy’s content and labs is vital for your participation in this course. A discount voucher will be provided to you upon registration via e-mail, which you can use to activate your subscription to HTB Academy.

Access includes:
> Direct Access to all modules up to (including) TIER II

> Direct Access to the entire Active Directory Penetration Tester role path

> Step-by-step module solutions

> Unlimited Pwn Box usage

Note: In case you already have a HTB Academy subscription please contact us

Register Now

and boost your career with a world-class certification.

I want to become a HTB Certfied Bug Bounty Hunter

CBBH course includes:
+ Access to HTB Academy

+ 12 instructor-led sessions
+ Exam Voucher

Final Price
€ 1.910

I want to become a HTB Certified Active Directory Pentesting Expert

Fill in the following form and we'll notify you when registration opens.

FAQs:

Accordion Content

  • The HTB Certified Active Directory Pentesting Expert (HTB CAPE) certification is not designed for beginners in cybersecurity. It assumes prior knowledge and experience in network penetration testing and foundational principles of Active Directory (AD) environments. To succeed, candidates should already possess a solid pentesting foundation.
  • Obtaining the HTB Certified Penetration Testing Specialist (HTB CPTS) certification is highly recommended before pursuing HTB CAPE. The HTB CPTS ensures that individuals have a robust understanding of key penetration testing concepts, which are critical for navigating the advanced topics assessed in HTB CAPE.

A certification is not a mandatory prerequisite to become an Active Directory Penetration Tester or practice any other cybersecurity role, but a great asset if you are looking to learn new skills in a structured way and prove your knowledge to potential employers.

Hack The Box is a trusted, highly respected, and community-backed IT security training vendor, with a long history in the domain. The training standards of the company are set quite high and this applies to all offerings, machines, challenges, Pro Labs, and now, the certifications.

Through the years, Hack The Box has been a training partner of major organisations, government/military agencies, and academic institutions worldwide. We plan to continue being a trusted training partner, and also provide certification services from now on, while retaining the same level of content-excellence, quality, and integrity.

To prepare effectively for the HTB CAPE program, consider the following recommendations:

Access to HTB Academy’s content is vital for your participation in this course. A discount voucher will be provided to you upon registration via e-mail, which you can use to activate your subscription to HTB Academy.

The following modules are specifically chosen to provide a strong foundational understanding and skill set, which are critical for your success in the seminar and future endeavors in penetration testing:
1. Introduction to Academy: This module provides an overview of the Academy platform and guides on how to effectively utilize it for self-training, setting the foundation for your learning journey.
2. Linux Fundamentals: Essential for cybersecurity, this module offers in-depth training in Linux, covering its structure, shell usage, and system administration, complete with practical exercises and an assessment to solidify your understanding.
3. Learning Process: Focusing on the learning journey, this module covers aspects such as mindset, efficiency, organization, and coping with frustration, crucial for excelling in the information security field.

Unfortunately we don’t record our sessions therefore you’ll need to catch up with the rest of the group. The support team can help you to catch up with the previous sessions and guide you on the materials that you need to read.

To obtain the HTB Certified Active Directory Exploitation (HTB CAPE) certification, all individuals must complete the entire Active Directory Penetration Tester job-role path, which consists of 15 comprehensive modules. Each module includes hands-on exercises and a skills assessment at the end, designed to validate your understanding of the covered topics. Completing these modules is a mandatory step before being eligible to take the certification exam.

For those subscribed to the Gold Annual certification, solutions for the modules are provided. This ensures the learning process is more guided and efficient, reducing unnecessary frustration while allowing candidates to focus on mastering the content. This subscription makes completing the modules a manageable and rewarding experience.

Find below the facts that differentiate HTB Certified Active Directory Pentesting Expert (HTB CAPE) from standard certifications::

  • Continuous Evaluation – To be eligible to start the examination process, one must have completed all modules of the “Active Directory Penetration Tester” job-role path 100% first. Each module in the path comes with its own hands-on skills assessment at the end that students must complete to prove their understanding of the presented topics. The answers to the skills assessment exercises are not provided. Evaluation takes place throughout the journey, not only during the examination!

  • Hands-on & Real-world Exam Environment – HTB Certified Active Directory Pentesting Expert (HTB CAPE) candidates must perform advanced Active Directory penetration tests in realistic Active Directory environments, encompassing real-world Active Directory environments, demanding a full understanding of how Windows and the Active Directory environments work and assessing the candidate’s ability to execute complex attacks without relying on multiple-choice questions!

  • Focus on Advanced & Applicable Skills – The “Active Directory Penetration Tester” job-role path advances the competencies acquired in the “Penetration Tester” job-role path. It emphasizes the development of sophisticated skills crucial for Active Directory exploitation. The curriculum emphasizes practical, high-stakes scenarios involving Active Directory enumeration, exploiting trust relationships, misconfigured DACLs, and leveraging specialized tools. This path is enriched with practical demonstrations encompassing a wide range of contemporary Windows and Active Directory implementations, allowing them to understand Active Directory authentication protocols deeply.

  • Outside-the-box Thinking – HTB Certified Active Directory Pentesting Expert (HTB CAPE) candidates will be required to think outside the box and utilize the various skills and techniques they learned throughout the path to achieving the exam’s objectives. Like in real-world engagements, creativity and in-depth knowledge will be necessary for a successful outcome.

  • Commercial-grade Report Requirement – Successfully attacking and exploiting a complex Active Directory environment is not enough to obtain the HTB Certified Active Directory Pentesting Expert (HTB CAPE) certification. As part of their assessment, candidates must explain the process of identifying and exploiting vulnerabilities. Additionally, candidates are expected to propose remediation for identified vulnerabilities. HTB Certified Active Directory Pentesting Expert (HTB CAPE) candidates must prove they are market-ready and client-centric professionals.

  • Seamless Experience Powered By Pwnbox – The entire exam and certification process can be conducted through the candidates’ browser from start to finish. All penetration test attacks can be performed via the provided and in-browser Pwnbox. There are no infrastructural or tool requirements.

HTB certifications are on Credly!

By the time you successfully complete the HTB CAPE exam and claim your certificate, HTB CAPE’s digital badge will arrive on your email. Accept it and share it on your social media, so that third parties can verify your obtained skills!

Fundamentals and Setup

  1. Overview of Android’s architecture and ecosystem dynamics.
  2. Exploration of security features native to Android using Java, Kotlin, C++, and Rust.
  3. Mobile Application Threat Model
    a) Differences between mobile and web application threat models.
    b) Applying threat modeling techniques specifically to mobile applications.
    c) Case studies highlighting potential threats and vulnerabilities.
    d) How do we secure and test cross platform apps (e.g. ReactNative, Xamarin, etc).
  4. Introduction to industry mobile security standards
    a) OWASP Mobile Application Security (MAS) project
    b) Effective usage of the Mobile Application Security Verification Standard (MASVS).
    c) Effective usage of the Mobile Security Testing Guide (MSTG).
    d) Overview of the OWASP top 10 for mobile.
  5. Setting up and preparing a mobile security testing lab
    a) Configuration of industry-standard tools and guidance on their appropriate use.
    b) Setup of virtual mobile devices using Corellium, including its advantages.
    c) Introductory exercises to familiarize with the tools.
  6. Secure Coding Overview
    a) Exercises to identify vulnerabilities in code examples
    b) Discussion of the appropriate mechanisms for remediation
    c) Practical session on remediation and re-testing the app
  7. Secure storage
    a) Overview of application storage mechanisms.
    b) Introduction to cryptographic storage solutions on Android.

Advanced Techniques and Practical Application

  • Mobile penetration testing methodology
    a) Methodologies used in real-world scenarios with practical tips and tricks.
  • Identifying issues with backend APIs
    a) Examination of client-side trust issues.
    b) Analysis of insecure communications including certificate validation and pinning.
  • Cryptography in Android apps
    a) Utilization of Android’s Crypto APIs.
    b) Implementation of native cryptography using libraries like libnacl and OpenSSL.
    c) Management of cryptographic keys.
  • Authentication and Authorization
    a) Testing client-side authentication mechanisms, including secure usage of biometrics.
    b) Strategies to detect and bypass authentication flaws.
    c) Security measures for API authentication.
  • Android IPC
    a) Detailed exploration of Intents, deep links, Binders/services, and broadcast receivers.
  • Webviews
    a) Identifying and resolving common security issues in Android Webview configurations.
  • Software Composition Analysis (SBOM)
    a) Techniques to determine the components of an Android app.
    b) Identifying known vulnerabilities within these components.
  • Mobile Device Management (MDM)
    a) Introduction to Mobile Device Management: definition, core features, and its role in enhancing organizational security.
    b) Discussion on the benefits and practical applications of MDM in controlling and securing mobile devices across an enterprise.
  • Mobile Application Management (MAM)
    a) Overview of Mobile Application Management: what it entails and its significance in enterprise environments.
    b) Exploration of how MAM contributes to managing and securing applications specifically, detailing its utility for enterprise security strategies.

Advanced Techniques and Practical Application

  • Mobile penetration testing methodology
    a) Methodologies used in real-world scenarios with practical tips and tricks.
  • Identifying issues with backend APIs
    a) Examination of client-side trust issues.
    b) Analysis of insecure communications including App Transport Security issues & certificate pinning.
  • Cryptography in IOS apps
    a) Utilization of iOS’s CryptoKit & CommonCrypto APIs.
    b) Implementation of native cryptography using libraries like libnacl and OpenSSL.
    c) Management of cryptographic keys and leveraging the secure enclave.
  • Authentication and Authorization
    a) Testing client-side authentication mechanisms, including secure usage of Local Authentication (biometrics).
    b) Strategies to detect and bypass authentication flaws.
    c) Security measures for API authentication.
    d) Using Device Check and App Attest
  • iOS IPC
    a) Detailed exploration of URL schemes, deep (universal) links, and extensions.
  • Webviews
    a) Identifying and resolving common security issues in iOS Webview configurations.
  • Software Composition Analysis (SBOM)
    a) Techniques to determine the components of an iOS app.
    b) Identifying known vulnerabilities within these components.
  • Implementing App Integrity
    a) What to look for
    b) How to implement
  • Mobile Device Management (MDM)
    a) Introduction to Mobile Device Management: definition, core features, and its role in enhancing organizational security.
    b) Discussion on the benefits and practical applications of MDM in controlling and securing mobile devices across an enterprise.
  • Mobile Application Management (MAM)
    a) Overview of Mobile Application Management: what it entails and its significance in enterprise environments.
    b) Exploration of how MAM contributes to managing and securing applications specifically, detailing its utility for enterprise security strategies.

Fundamentals & Setup

  1. Overview of iOS’s architecture and ecosystem dynamics.
  2. Exploration of security features native to to iOS using Objective-C, Swift, and C(++).
  3. Mobile Application Threat Model
    a) Differences between mobile and web application threat models.
    b) Applying threat modeling techniques specifically to mobile applications.
    c) Case studies highlighting potential threats and vulnerabilities.
    d) How do we secure and test cross platform apps (e.g. ReactNative, Xamarin, etc).
  4. Introduction to industry mobile security standards
    a) OWASP Mobile Application Security (MAS) project
    b) Effective usage of the Mobile Application Security Verification Standard (MASVS).
    c) Effective usage of the Mobile Security Testing Guide (MSTG).
    d) Overview of the OWASP top 10 for mobile.
  5. Setting up and preparing a mobile security testing lab
    a) Configuration of industry-standard tools and guidance on their appropriate use.
    b) Setup of virtual mobile devices using Corellium, including its advantages.
    c) Introductory exercises to familiarize with the tools.
  6. Secure Coding Overview
    a) Exercises to identify vulnerabilities in iOS code examples
    b) Discussion of the appropriate mechanisms for remediation
    c) Practical session on remediation and re-testing the app
  7. Secure storage
    a) Overview of application storage mechanisms.
    b) Introduction to cryptographic storage solutions on iOS.