Logo
HackTheBox CPTS Machine Track
Overview
HackTheBox CPTS Machine Track

HackTheBox CPTS Machine Track

December 29, 2025
3 min read (36 min read total)
5 subposts

What is HTB CPTS?

The HTB Certified Penetration Testing Specialist (HTB CPTS) is a highly hands-on certification issued by Hack The Box that assesses intermediate-level penetration testing skills. It covers the full pentest lifecycle — from reconnaissance and exploitation through lateral movement, AD attacks, and commercial-grade report writing.

HTB CPTS Logo

Unlike multiple-choice certifications, HTB CPTS requires completing a real-world Active Directory pentest against a live network, then submitting a commercial-grade report. There are no shortcuts.

To even sit the exam, you must complete all 28 modules in the Penetration Tester job-role path on HTB Academy — each with its own hands-on skills assessment.

Knowledge domains

The certification evaluates the following areas:

DomainTopics
Recon & OSINTInformation gathering, footprinting, web recon
Web exploitationSQLi, XSS, LFI, file uploads, command injection
Network attacksService attacks, password cracking, pivoting
Active DirectoryEnumeration, Kerberos abuse, AD CS, lateral movement
Post-exploitationPrivilege escalation (Linux & Windows), persistence
ReportingRisk communication, commercial-grade pentest reports

The exam

The exam is a blackbox engagement against a real-world AD network hosted by HTB. You get:

  • A letter of engagement with scope and objectives
  • Pwnbox or your own VPN connection
  • Access to the target network for the exam window

Passing requires both completing the pentest objectives and submitting a full report. No report, no cert — even if you own every box.

Warning (Report matters as much as the flags)

The HTB CPTS exam is explicitly graded on both technical findings and the quality of your written report. A commercial-grade report is a hard requirement, not optional.

My progress

I completed the full Penetration Tester job-role path — all 28 modules including every skills assessment.

CPTS Module Completion Badge

I am planning to sit the exam sometime between 2026 and 2027, once I feel the machine track writeups below represent a solid enough review of the core techniques.

Tip (Exam prep strategy)

My current approach: finish the machine track writeups to reinforce AD, web, and privesc chains under time pressure, then move to a full mock engagement before booking the exam.

Machine track

CPTS Machine Track overview

The machines below were selected because they map directly to CPTS learning objectives. Each one is documented as a subpost under this parent entry.

MachineOSKey techniques
FluffyWindowsAssumed breach, ACL abuse, shadow credentials, AD CS (ESC16)
JeevesWindowsJenkins RCE, KeePass cracking, Pass-the-Hash
TrickLinuxDNS enumeration, SQL injection, LFI, fail2ban abuse
PostmanLinuxRedis abuse, SSH key injection, Webmin RCE (CVE-2019-12840)
PovWindowsASP.NET ViewState Deserialization
TombWatcherWindows
MediaWindows
VulnCicadaWindowsAD CS abuse, Kerberos relay (ESC8), DCSync, NFS
StreamIOWindows
VoleurWindows
AdministratorWindows
AuthorityWindows
CraftLinux
RedelegateWindows
SnoopyLinux
GhostWindows
Note (Reading this series)

Use the subposts navigation on this page to jump into a machine writeup directly. On desktop it appears in the right sidebar; on mobile it sits in the sticky header area. New machines will be added here as I progress through the track.