TRY HACK ME ROOMS TO OSCP Jr PenTester (Step 1) https://tryhackme.com/path-action/jrpenetrationtester/join Enumerating AD (Step 8) https://tryhackme.com/room/adenumeration Offensive PenTesting (Step 2) https://tryhackme.com/path-action/pentesting/join Breaching Active Directory (Step 9) https://tryhackme.com/room/breachingad Web Fundamentals (Step 3) https://tryhackme.com/path-action/web/join Exploitation AD (Step 10) https://tryhackme.com/room/exploitingad Windows Fundamentals (Step 4) https://tryhackme.com/module/windows-fundamentals Lateral Movement and Pivoting (Step 11) https://tryhackme.com/room/lateralmovementandpivoting Windows Exploitation (Step 5) https://tryhackme.com/module/hacking-windows-1 Persistence AD (Step 12) https://tryhackme.com/room/persistingad Shell and Privilege Escalation (Step 6) Post Compromisse (Extra) https://tryhackme.com/module/privilege-escalation-and-shells https://tryhackme.com/module/post-compromise Host Evasion (Step 7) https://tryhackme.com/module/host-evasions https://www.linkedin.com/in/joas-antonio-dos-santos/ HACK THE BOX LABS TO OSCP • • • • • • • • • • • • • • • • • • • Forest Active Reel Multimaster Mantis Blackfield Search Monteverde Intelligence Sizzle Intelligence APT Object Support Acute Timelapse StreamIO Scrambled Search https://www.linkedin.com/in/joas-antonio-dos-santos/