Post

The New CompTIA PenTest+ V3 Review: How I Passed My First Hacking Cert

My CompTIA PenTest+ Journey (v2 β†’ v3): What I Learned, What Surprised Me, and a practical Nmap cheatsheet for aspiring pentesters.

The New CompTIA PenTest+ V3 Review: How I Passed My First Hacking Cert

β˜• Before You Start Reading…

This is a long post. Not a β€œ5-minute skim while scrolling” kind of post.

So before we begin, I highly recommend you:

  • β˜• Grab a coffee, tea, or your favorite drink
  • πŸͺ‘ Sit somewhere comfortable

Alright, now we’re ready πŸ˜„


In this post, I’ll share why I took the CompTIA PenTest+ exam, how I navigated the v2 β†’ v3 transition, what actually surprised me during the exam, common mistakes new candidates make, and finally a practical Nmap cheatsheet you can use for your own preparation.


ℹ️ Introduction

CompTIA PenTest+ is a vendor-neutral penetration testing certification designed to validate the theoretical knowledge and professional practices required for real-world penetration testing engagements.

It covers areas such as planning and scoping, legal and compliance requirements, reconnaissance, vulnerability analysis, social engineering, and reporting, making it a strong foundation for anyone looking to start or formalize a career in penetration testing.

Official details such as exam objectives, pricing, recommended experience, and current exam versions are maintained by CompTIA and should always be reviewed before beginning preparation. πŸ”— CompTIA PenTest+ Certification V3 (New Version) CompTIA PenTest+ v3 Certification CompTIA PenTest+ v3 Certification

πŸš€ My CompTIA PenTest+ Journey (v2 β†’ v3)

I took the CompTIA PenTest+ exam after I won a full exam bundle during a recent penetration testing competition.

Winning the voucher felt like a no-brainer opportunity, until I realized something important:

  • The study material I received was for PenTest+ version 2
  • My actual exam was PenTest+ version 3

So yes… I had to bridge the gap myself.

This meant:

  • Comparing v2 and v3 objectives
  • Identifying new and expanded topics
  • Updating my notes with real-world pentesting techniques

It wasn’t just β€œstudy the book and pass.”. It required extra effort, research, and validation.

βš–οΈ Why PenTest+ Matters Before the Career Starts

This is something I want to be very clear about:

CompTIA PenTest+ provides the theoretical foundation every penetration tester should have before diving deep into technical exploitation.

Before you:

  • Spam Metasploit modules
  • Jump into red teaming
  • Or chase advanced exploit development

You need to understand:

  • Scope and authorization
  • Legal boundaries
  • Risk management
  • Pentesting methodologies and frameworks
  • Professional reporting and decision-making

PenTest+ teaches you how to think like a professional penetration tester, not just how to β€œhack things.”

To be honest, that foundation matters a lot.

🧠 Exam Difficulty & The Right Mindset

PenTest+ is not an entry-level exam, regardless of how it’s sometimes marketed.

You need to approach it with the mindset of:

  • A junior-to-mid penetration tester
  • Someone who understands why an action is taken
  • A professional who respects rules of engagement and impact

During the exam, I constantly reminded myself:

  • Think like a consultant
  • Choose the least risky, most professional option
  • Read every scenario as if it’s a real engagement

This mindset helps more than memorizing tools.

😲 What Surprised Me (The PBQ Factor)

What surprised me the most was the difficulty of some Performance-Based Questions (PBQs).

I encountered:

  • Advanced pentesting commands
  • Output that required real interpretation, not guessing
  • Scenarios where multiple tools could work, but only one made sense

These PBQs weren’t testing:

  β€œDo you know this command?”

They were testing:

  β€œDo you understand what this output means, and what to do next?”

If you’ve never:

  • Analyzed Nmap results
  • Used Burp Suite meaningfully
  • Followed scan β†’ exploit β†’ report workflows

…these questions can feel brutal.

❌ Common Mistakes to Avoid

Here are mistakes I see very often:

⚠️ Focusing Only on Tools

    PenTest+ is more about process and reasoning than tool memorization.

⚠️ Ignoring Laws and Scope

    Legal authorization, compliance, and scope violations are exam favorites.

⚠️ Underestimating Social Engineering

    Human attacks are heavily tested and often underestimated.

πŸ“Œ CompTIA PenTest+ Cheatsheet (Quick Review)

Below is a condensed cheat sheet I built because I can’t share all my notes here, but here is an example of how I personally organized my notes: Organized Notes Organized Notes

1. Engagement management (13%)

Contract Types Matrix

Contract TypePurposeKey ContentsExam Focus
MSA (Master Service Agreement)Overall business relationshipHigh-level scope, invoicing, liability limits, insuranceRelationship governance
SOW (Statement of Work)Specific engagement detailsIn/out scope, timelines, deliverables, payment milestonesScope definition
ToS (Terms of Service)Tester behavior rulesPenalties for scope violations, data misuseLegal protection
SLA (Service Level Agreement)Service quality metricsUptime guarantees, response times, termination clausesPerformance standards

Compliance & Privacy Cheat Sheet

Framework / LawKey FocusApplicability / Use CaseNotes / Exam Tips
PCI DSSSecure systems, strong access control, continuous monitoringCompanies handling credit card dataCompliance lifecycle: Assess β†’ Remediate β†’ Report; Merchant levels 1–4; Failing = fines or losing card processing
GDPRExplicit consent, minimal data collectionEU residents’ personal data (applies globally)Users can withdraw consent; 72‑hour breach notification
HIPAAHealthcare data protectionUS healthcare sectorEnsures patient privacy & security of health info
CCPACalifornia privacy lawPersonal data of California residentsGDPR-like rules; consumer rights focus
SOXFinancial reporting accuracyCorporate financial dataEnsures accountability & legal compliance
FISMA / CMMCGovernment & defense system securityUS federal agencies & contractorsSecurity & compliance standards
ISO 27001 / 27002Information security management frameworkOrganizations’ security programsProvides structured security policies & best practices

Authorization Requirements

  • Who: Authorized testers (certifications verified)
  • What: Exact IP ranges, domains, apps, cloud resources
  • When: Validity period, testing windows
  • Data handling: Encryption, disposal, NDAs
  • Stop conditions: Emergency contacts, incident procedures

1.2 Scope Definition Elements

1
2
3
4
5
6
7
8
9
10
11
**INCLUDE in scope:
β”œβ”€β”€ Networks: CIDR ranges, ASNs, wired/wireless
β”œβ”€β”€ Applications: Web (sites/pages/roles), Mobile (platforms/versions), APIs
β”œβ”€β”€ Cloud: SaaS/IaaS/PaaS (provider permissions required)
β”œβ”€β”€ Physical: Onsite locations, server rooms
└── Social: Specific user targets`

**EXCLUDE explicitly:
β”œβ”€β”€ Production systems (prefer sandbox)
β”œβ”€β”€ Third-party dependencies (need separate auth)
β”œβ”€β”€ Fragile legacy/IoT systems

1.3 Assessment Strategies

Testing Methodologies Overview

TypeKnowledgeUse CasePros / Cons
Black BoxZero informationReal attacker simulationRealistic / Time-intensive
Grey BoxLimited credentialsWeb application testingFocused / Less comprehensive
White BoxFull accessCode review, deep testingThorough / Less realistic

1.4 Threat Modeling Frameworks

1
2
3
4
5
6
7
8
9
10
11
12
13
14
**STRIDE** (Web/Application):
- S :   Spoofing (auth bypass)
- T :   Tampering (data integrity)
- R :   Repudiation (no logging)
- I :   Information Disclosure
- D :   Denial of Service
- E :   Elevation of Privilege

**DREAD** (Risk Scoring):
- D :   Damage potential
- R :   Reproducibility
- E :   Exploitability
- A :   Affected users
- D :   Discoverability

Standards & Frameworks:

FrameworkFocusBest For
OWASPWeb appsApplication security
NIST SP 800-115GeneralStructured testing
OSSTMMMetrics-drivenComprehensive audits (Holistic)
PTESFull lifecycleComplete pentests
MITRE ATT&CKTTPsReal-world attacks
ISSAFOpen-sourceEnd-to-end guidance

2.RECONNAISSANCE & ENUMERATION (21%)

2.1 Passive OSINT Collection

1
2
3
4
5
6
7
8
9
**Social Media (LinkedIn/FB/X/IG):
- Employee roles/hierarchy
- PII for social engineering
- Company culture insights

**Job Boards (Indeed/Glassdoor):
- Tech stack (AWS, Python, Splunk)
- Staffing gaps (under-resourced teams)
- Software architecture hints

Google Dorking

Useful operators: site: - filetype: - intitle: - inurl:

Used to find: Exposed documents - Login portals - Backup files

2.2 DNS Enumeration Arsenal

1
2
3
4
5
6
7
8
9
10
11
**Record Types & Commands:
A β†’ nslookup target.com
MX β†’ dig mx target.com
NS β†’ dig ns target.com
TXT β†’ dig txt target.com
SRV β†’ dig srv _service._proto.domain

**Enumeration Techniques:
1. Zone Transfer: `dig @ns1.target.com target.com AXFR`
2. Subdomain Bruteforce: `subfinder -d target.com`
3. Reverse DNS: `nslookup 192.168.1.1`

DNS Tools

ToolCapabilitiesCommands
nslookupInteractive/non-interactivenslookup target 8.8.8.8
set type=MX
digAdvanced queriesdig ns target.com
dig axfr @ns.target.com domain
DNSDumpsterVisual subdomain mapsWeb GUI
AmassAutomated enumamass enum -d target.com
theHarvesterEmails/subdomainstheHarvester -d target -b all

2.3 User Enumeration Methods

1
2
3
4
5
6
7
8
9
**Techniques:
SSH Banner: ssh target.com (misconfig reveals users)
SNMP: snmpwalk -v2c -c public target .1.3.6.1.4.1.77.1.2.25
SMTP: Metasploit auxiliary/scanner/smtp/smtp_enum
**Tools:
β”œβ”€β”€ theHarvester: Email harvesting
β”œβ”€β”€ Hunter.io: Corporate emails  
β”œβ”€β”€ Sherlock: Username across platforms
└── Social-Searcher: Real-time mentions

3. ATTACKS & EXPLOITS (35%)

3.1 Network Scanning Mastery

1
2
3
4
5
6
7
8
9
10
11
**Host Discovery:
nmap -sn 192.168.1.0/24     # Ping sweep      
nmap -Pn 192.168.1.0/24     # Skip discovery      
nmap --script discovery 192.168.1.1

**Stealth Techniques:
-D RND:3            # Random decoys                  
-f                  # Fragment packets (8-byte)                   
--spoof-mac 0       # Random MAC for spoofing          
--source-port 53    # DNS port bypass (spoofing)  
-sF                 # FIN scan (bypass stateless FW)       

Scan Types Comparison:

ScanFlagsStealthFirewall Bypass
SYN-sSHighMost firewalls
FIN-sFVery HighStateless FW
NULL-sNVery HighStateless FW
XMAS-sXVery HighStateless FW

3.2 Vulnerability Scanning

1
2
3
4
5
6
7
8
**Considerations:
βœ… Bandwidth consumption
βœ… Fragile systems (IoT/legacy)
βœ… Query throttling
βœ… Production vs non-prod

**Scanner Pipeline:
nmap -p80,443 10.0.1.0/24 -oG - | nikto.pl -h -

Scanners Tools

ToolTypeStrengthsWeaknesses
OpenVASOpen-sourceComprehensiveResource heavy
NessusCommercialAccurateExpensive
NexposeCommercialRisk scoringComplex
NiktoWebFast web scansLimited scope
BurpWeb proxyManual testingLearning curve

3.3 Web Application Attacks

1
2
3
4
5
6
7
**OWASP Top 10 Coverage:
β”œβ”€β”€ Injection (SQLi, Command): sqlmap, Burp Intruder
β”œβ”€β”€ XSS: Burp Repeater, manual payloads
β”œβ”€β”€ RFI/LFI: ../../etc/passwd
β”œβ”€β”€ Session: Hijacking/Fixation
β”œβ”€β”€ CSRF
└── SSRF

Burp Suite Workflow:

  1. Proxy β†’ Intercept requests
  2. Target β†’ Site map
  3. Repeater β†’ Manual testing
  4. Intruder β†’ Payload attacks
  5. Collaborator β†’ OOB detection

3.4 Specialized Attack Vectors

VectorToolsTargets
WirelessAircrack-ng, WGLEWEP/WPA2
CloudPacu, Prowler, ScoutSuiteAWS/Azure misconfigs
MobileMobSF, Frida, DrozerAPK analysis
PhysicalLockpicks, USB Rubber DuckyTailgating, bypass

Social Engineering Variants:

Phishing ← Spear ← Whaling (C-Level)

Vishing (VoIP) - SPIT (auto VoIP)

SMiShing (SMS) - Spim (IM spam)

4. VULNERABILITY ANALYSIS (17%)

4.1 Attack Surface Mapping

1
2
3
4
**Discovery Tools:
Censys/Shodan β†’ Exposed ports/services
Zenmap β†’ Topology visualization
ARP/SNMP/WMI β†’ Internal mapping

Prioritization Framework:

CVSS β†’ Severity score (0-10)

CVE β†’ Specific vulnerability ID

CWE β†’ Weakness category

DREAD β†’ Business risk

4.2 Validation Process

  1. Automated scan β†’ Identify candidates
  2. Manual verification β†’ Reduce false positives
  3. Metasploit β†’ Exploit validation
  4. Burp/Repeater β†’ Web app confirmation

5. Post-exploitation and lateral movement (14%)

5.1 Post-Exploitation Techniques

Persistence:

1
2
3
4
5
6
β”œβ”€β”€ Backdoors (Meterpreter)
β”œβ”€β”€ Scheduled tasks/cron
β”œβ”€β”€ Registry run keys
β”œβ”€β”€ SSH keys

Lateral Movement:

1
2
3
4
β”œβ”€β”€ Pass-the-Hash
β”œβ”€β”€ Pivot (Meterpreter)
β”œβ”€β”€ RDP/WinRM
└── CrackMapExec

5.2 Covering Tracks

Mandatory Cleanup:

1
2
3
4
5
❌ Remove shells
❌ Delete created credentials
❌ Clear logs (carefully)
❌ Remove tools
βœ… Document everything first

5.3 Reporting Structure

Executive Summary:

1
2
3
β”œβ”€β”€ Risk rating
β”œβ”€β”€ Business impact
β”œβ”€β”€ Top 3 findings

Technical Details:

1
2
3
4
β”œβ”€β”€ Screenshots
β”œβ”€β”€ Commands used
β”œβ”€β”€ CVSS scores
β”œβ”€β”€ Proof-of-concept

Remediation:

1
2
3
β”œβ”€β”€ Technical controls
β”œβ”€β”€ Administrative controls
└── Physical controls

COMMAND CHEATSHEET

1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
# Recon
theHarvester -d target -b all
dig axfr @ns.target.com domain
nmap -sn 192.168.1.0/24

# Stealth Scanning
nmap -sS -sV --randomize-hosts -D RND:3 target
nmap -f --source-port 53 target

# Web Pipeline
nmap -p80,443 10.0.0.0/24 -oG - | nikto.pl -h 

# DNS Enum
nslookup target 8.8.8.8
dig ns target.com

πŸ” The Ultimate Nmap Cheatsheet (Exam Favorite)

Before you start reading, if you want a Github version check this link Github Version

Nmap Enumeration

FAST command :

sudo nmap -A -F -T4 --script=vuln <IP> -F to scan the top 100 ports -p- to scan all the ports

Nmap Documentation

Target Specification

  • nmap 192.168.1.1 β†’ Scan a single IP
  • nmap 192.168.1.1-254 β†’ Scan a range
  • nmap [scanme.nmap.org](http://scanme.nmap.org/) β†’ Scan a domain
  • nmap 192.168.1.0/24 β†’ CIDR scan
  • nmap -iL targets.txt β†’ Scan from file

Host Discovery

  • -sL β†’ List targets only
  • -sn OR -sP (in old version)β†’ Disable port scanning
  • -Pn β†’ Port scan only (disable host discovery)
  • -PR β†’ ARP discovery on local network (ARP ping)
  • -n β†’ No DNS resolution

Scan Techniques

  • -sS β†’ TCP SYN scan (default) it also called as SYN Stealth scan
  • -sT β†’ Full TCP connect scan
  • -sU β†’ UDP port scan
  • -sA β†’ TCP ACK scan
  • -sX β†’ Christmas tree scan (TCP segment with the FIN, PSH, and URG flags raised to bypass a firewall or IDS)
  • -sW β†’ TCP Window scan
  • if a firewall is blocking the default ICMP pings, the team has other options. For example, they can try the following check this page :
    • TCP ACK PingΒ -PA <portlist>Β This will set the acknowledgement (ACK) flag in the TCP header.
    • UDP PingΒ -PU <portlist>Β This scan uses User Datagram Protocol (UDP).
    • SCTP Initiation Ping -sY <portlist>Β This scan uses theΒ Stream Control Transmission Protocol (SCTP)Β , an alternative to using either a TCP or UDP scan to see if a host is alive.
    • TCP SYN PingΒ -PS <target> This sends an empty TCP packet with the SYN flag set to whatever port(s) you specify. If you don’t indicate a port number, Nmap will try all ports and then display the findings.

Port Specification

  • -p 21 β†’ Specific port
  • -p 21-100 β†’ Port range
  • -p- β†’ All ports
  • -F β†’ Fast scan (100 ports)
  • --top-ports 2000 β†’ Top port
Port StateDescription
OPENThe port is open and responding to probes.
CLOSEDThe port is not responding to probes.
FILTEREDThe port is blocked by a firewall.
UNFILTEREDThe port isΒ accessible;Β however, Nmap is unable to determine if the port is open or closed.

image.png

Service & Version Detection

  • -sV β†’ Detect service versions
  • --version-intensity <0-9> β†’ Adjust accuracy/speed
  • --version-light β†’ Faster, less accurate
  • --version-all β†’ Full intensity
  • -A β†’ OS, version, scripts, tracerout

  • Example 1: Using Netcat for Banner Grabbing:
    • nc -v <target.com> <80>
    • HEAD / HTTP/1.1
  • Example 2 : Metasploit Auxiliary Module:
    • use auxiliary/scanner/http/http_version
    • set RHOSTS target.com
    • run

OS Detection

  • -O β†’ OS detection
  • --osscan-limit β†’ Requires open & closed ports
  • --osscan-guess β†’ Aggressive guessing
  • -A β†’ OS + version + scripts + traceroute

Timing & Performance

  • -T0 β†’ Paranoid (IDS evasion)
  • -T3 β†’ Normal (default)
  • -T4 β†’ Aggressive (fast networks)
  • -T5 β†’ Insane (very fast networks)
  • --min-rate <num> β†’ Minimum packet rate
  • --max-rate <num> β†’ Maximum packet rate

Firewall / IDS Evasion

  • -f β†’ Fragment packets
  • -D <decoys> β†’ Decoy scans
  • -S <IP> β†’ Spoof source IP
  • --proxies <proxylist> β†’ Use proxies
  • --data-length <num> β†’ Append random data
Stealth OptionExampleDescription
-sFnmap -sF www.company.tldThis option sends a TCP FIN to bypass a non-stateful firewall.
-fnmap -f 192.168.1.50This will split the packets into 8-byteΒ fragmentsΒ to make it harder for packet filtering firewalls and intrusion detection to identify the true purpose of the packets.
--randomize-hostsnmap --randomize-hosts 192.168.1.1-100This option will randomize the order of the hosts being scanned.

NSE Scripts

  • -sC β†’ Default safe scripts
  • --script <name> β†’ Run specific script
  • --script http*. β†’ Run script category
  • --script-args <args> β†’ Pass arguments
  • Examples: http-sitemap-generator, smb-enum*, dns-brute

Output Options

  • -oN <file> β†’ Normal output
  • -oX <file> β†’ XML output
  • -oG <file> β†’ Grepable output
  • -oS <file> β†’ script output
  • -oA <prefix> β†’ All formats
  • -v/-vv β†’ Verbosity levels

Ports and Services

FeaturePort 111Port 135
OSUnix/LinuxWindows
RPC TypeONC RPC (SunRPC)DCE/RPC (MSRPC)
ServicePortmapper / rpcbindRPC Endpoint Mapper
Main UsesNFS, NIS, mountdDCOM, AD, WMI, Windows services
Assigns Ports ForUnix RPC servicesWindows RPC services
PortServiceDescription
21/20FTPFile transfer (control channel)
23TelnetΒ 
25SMTPEmail sending between mail servers
389LDAPActive Directory is probably running.
1433SQL serverSQL server listen on TCP port.
1434SQL serverSQL server listen on UDP port.
2049NFSThe main communication channel for sharing files and directories over a network, predominantly in Linux and Unix-like environments.
FeatureSMBNetBIOS
What it isFile-sharing protocolCommunication API/protocol
PurposeFile & printer sharingName services, sessions
Port445 (or 139 via NetBIOS)137, 138, 139
DependencyNo longer needs NetBIOSDoes not provide file sharing

route add <destination> mask <netmask> <gateway> The route add command is used to manually add a new entry to a computer’s routing table. A routing table tells the operating system where to send network packets, especially when there are multiple networks, gateways, or interfaces.

πŸ“š Final Advice & Study Resources

My Honest Advice

  • Do hands-on practice (even basic labs help)
  • Understand why you use a tool
  • Treat every question like a real engagement
  • Memorize laws, frameworks, and scope rules
  • Stay calm β€” logic beats speed in PBQs

Helpful Resources

🏁 Final Thoughts

PenTest+ isn’t about being the best hacker in the room.

It’s about becoming a professional penetration tester.

If you’re serious about starting or strengthening a pentesting career, this certification gives you the theoretical backbone you’ll rely on for years.

Thanks for reading, and if you made it this far, your drink is probably empty β˜•πŸ˜

This post is licensed under CC BY 4.0 by the author.