The Ultimate PenTest+ Cheat Sheet for Fast Review

The Ultimate PenTest+ Cheat Sheet for Fast Review

If your goal is to advance in ethical hacking or offensive security, you’ve reached the right place. The CompTIA PenTest+ is one of the few industry-recognized credentials that blends technical skill, methodology, and reporting, but preparing for it can be challenging given its wide scope.

This CompTIA PenTest+ Cheat Sheet (PT0-003) gives you a focused overview of the key domains and tools covered in the exam, from engagement management and reconnaissance to exploitation and post-exploitation, helping you review faster and study smarter.

CompTIA PenTest+ Study Guide Search

Search our CompTIA PenTest+ cheat sheet to find the right cheat for the term you're looking for. Simply enter the term in the search bar and you'll receive the matching cheats available.

What Is the CompTIA PenTest+ Certification?

CompTIA PenTest+ is an intermediate-level certification aimed at professionals performing penetration testing and vulnerability management. It covers planning and scoping engagements, vulnerability discovery, exploitation, post-exploitation, and reporting. It’s DoD 8570/8140 approved and maps to ANSI/IEC/ISO 17024.

Certification attempters must pass one 165-minute exam with a score of at least 750 on a scale of 100-900. The certification exam consists of a maximum of 85 questions, including both multiple-choice and performance-based questions

The latest CompTIA PenTest+ exam code is PT0-003. It was released in April 2022 and, based on CompTIA’s typical 3-4-year update cycle, it’s expected to remain active until around 2026, when a new version (PT0-004) will likely be introduced.    

PenTest+ Cheat Sheet Exam Domains (PT0-003)

As cyber security continues to advance, the PenTest+ exam evolves to match modern attack methods, tools, and professional practices. CompTIA regularly updates the certification to reflect the latest penetration testing methodologies, tools, and real-world attacker techniques.

The most recent version, PT0-003, introduced an updated set of domains designed to validate both technical and operational skills needed in professional penetration testing engagements.

The current PenTest+ (PT0-003) Domains are as follows:

PenTest+ PT0-003 DomainExam Weighting (%)
Engagement management13%
Reconnaissance and enumeration21%
Vulnerability discovery and analysis17%
Attacks and exploits35%
Post-exploitation and lateral movement14%

Without further ado, let’s explore each domain and subdomain and unpack the essential concepts you will encounter in the exam.

Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image
Slider Image

Engagement Management

This domain focuses on defining penetration test scope, agreements, and legal boundaries, while ensuring compliance and clear communication with stakeholders. It covers the full engagement lifecycle, from planning and authorization to reporting findings and recommending remediation.

Pre-engagement Activities

ConceptDescription
Scope DefinitionDefines test scope including privacy, security, rules of engagement, exclusions, test cases, escalation process, and testing window.
Agreement TypesLegal agreements that define engagement terms and liabilities:
β€’ NDA
β€’ MSA
β€’ SoW
β€’ ToS
Target SelectionSpecifies the systems and assets to test:
β€’ CIDR ranges,
β€’ Domains
β€’ IP addresses
β€’ URLs
Assessment TypesDescribes the kind of tests conducted:
β€’ Web
β€’ Network
β€’ Mobile
β€’ Cloud
β€’ API
β€’ Application
β€’ Wireless
Shared Responsibility ModelClarifies responsibilities among hosting provider, customer, tester, and third parties.
Legal and Ethical ConsiderationsEnsures authorization, compliance with reporting laws, and awareness of tester liability.

Collaboration and Communication Activities

ConceptDescription
Peer ReviewInternal review process to validate findings and ensure quality of penetration test results.
Stakeholder AlignmentEnsures all relevant parties understand the test goals, risks, and reporting expectations.
Root Cause AnalysisInvestigates and identifies underlying issues contributing to discovered vulnerabilities.
Escalation PathProcess for communicating critical findings to appropriate personnel.
Secure DistributionEnsures sensitive test results and data are transmitted securely to authorized recipients only.
Articulation of Risk, Severity, and ImpactClearly explains how vulnerabilities affect confidentiality, integrity, and availability.
Goal ReprioritizationAdjusts test objectives based on emerging risks or client input during engagement.
Business Impact AnalysisEvaluates the potential consequences of security weaknesses on business operations.
Client AcceptanceFormal confirmation from the client that the engagement results meet agreed-upon objectives.

Testing frameworks and methodologies

Framework / MethodologyDescription
OSSTMMOpen Source Security Testing Methodology Manual
CRESTCouncil of Registered Ethical Security Testers
PTES Penetration Testing Execution Standard
MITRE ATT&CKA knowledge base of adversary tactics, techniques, and procedures (TTPs) used in real-world attacks.
OWASP Top 10The ten most critical web application security risks and common vulnerabilities.
OWASP MASVS (Mobile Application Security Verification Standard)Assessing the security of mobile applications across multiple layers.
Purdue ModelSecuring industrial control systems (ICS) by segmenting layers of control.
Threat Modeling Frameworksβ€’ DREAD
β€’ STRIDE
β€’ OCTAVE

Penetration Test Report Components

ComponentDescription
Format AlignmentEnsures the report adheres to client or industry-specific formatting and presentation standards.
Documentation SpecificationsDefines structure, organization, and level of technical detail included in the report.
Risk ScoringQuantifies the severity of findings using standardized scoring systems like CVSS.
DefinitionsClarifies terminology, acronyms, and classification levels used throughout the report.
Executive SummaryHigh-level overview of the assessment, key findings, and business impact for non-technical stakeholders.
MethodologyOutlines the testing approach, scope, and frameworks used during the engagement.
Detailed FindingsIn-depth analysis of vulnerabilities, including affected assets, evidence, and exploit details.
Attack NarrativeChronological account of exploitation steps.
Recommendations and Remediation GuidanceActionable guidance for mitigating vulnerabilities and improving security posture.
Test Limitations and AssumptionsSpecifies any constraints, exclusions, or assumptions made during testing that may affect results.
Reporting ConsiderationsAddresses legal and ethical requirements, quality control (QC) measures, and AI-assisted reporting considerations.

Remediation Recommendations

Control TypeDescription and Examples
Technical Controlsβ€’ System hardening
β€’ Sanitizing user input / parameterizing queries
β€’ Multifactor authentication
β€’ Encryption
β€’ Process-level remediation
β€’ Patch management
β€’ Key rotation
β€’ Certificate management
β€’ Secrets management solutions
β€’ Network segmentation
β€’ Infrastructure security controls
Administrative Controlsβ€’ RBAC
β€’ SDLC
β€’ Minimum password requirements
β€’ Organizational policies and procedures
Operational Controlsβ€’ Job rotation
β€’ Time-of-day restrictions
β€’ Mandatory vacations
β€’ User security training
Physical Controlsβ€’ Access control vestibules
β€’ Biometric access systems
β€’ Video surveillance and monitoring

Reconnaissance and Enumeration

This PenTest+ domain emphasizes gathering and analyzing intelligence about targets before exploitation. 

Information Gathering Techniques

TechniqueDescription and Examples
Open-source Intelligence (OSINT)Collecting publicly available information from:
β€’ Social media and job boards
β€’ Code repositories (GitHub)
β€’ DNS
β€’ Cached pages, password dumps, or cryptographic flaw databases
Network ReconnaissanceIdentify live hosts, open ports, and services to map the target network.
Protocol ScanningScan TCP/UDP ports to discover active services and communication patterns.
Certificate Transparency LogsReview public certificate logs to find related domains and subdomains.
Information DisclosureLocate unintentionally exposed data via errors, metadata, or public files.
Search Engine Analysis and EnumerationUse search engines to find exposed directories and sensitive assets.
Network SniffingCapture and analyze network traffic, including IoT/OT protocols, for intelligence.
Banner GrabbingRetrieve service banners to identify software versions and configurations.
HTML ScrapingExtract metadata, comments, and hidden information from web pages.

Enumeration Techniques

ConceptDescription
OS fingerprintingIdentifying the operating system based on responses.
Service discoveryFinding running services on a host.
Protocol enumerationGathering details about supported protocols.
DNS enumerationExtracting DNS records and domain info.
Directory enumerationIdentifying hidden folders/paths.
Host discoveryDetecting active systems on a network.
Share enumerationListing shared folders/resources.
Local user enumerationIdentifying local system users.
Email account enumerationDiscovering valid email addresses.
Wireless enumerationScanning wireless networks and details.
Permission enumerationIdentifying access rights and privileges.
Secrets enumerationFinding sensitive items like keys/tokens.
Cloud access keysLocating exposed cloud authentication keys.
PasswordsIdentifying leaked or stored passwords.
API keysFinding accessible API credentials.
Session tokensLocating session identifiers.
Attack path mappingVisualizing possible paths to compromise.
WAF enumerationDetecting and profiling web application firewalls.
Origin addressRevealing backend server locations.
Web crawlingAutomated discovery of site content.
Manual enumerationHand-checking files and components.
Robots.txtIdentifying disallowed indexed paths.
SitemapMapping site structure and URLs.
Platform pluginsDetecting CMS/plugins in use.

Reconnaissance and Enumeration Script Modification

ConceptDescription
Information gatheringUsing scripts to collect data from targets or sources.
Data manipulationParsing, filtering, and transforming collected information.
Bash/Python/PowerShellCommon scripting languages used for automation in recon.
Loops & ConditionalsControl flow logic for repeated tasks and decision-making.
Boolean/String/Arithmetic operatorsOperators used to compare, modify, or calculate values.
Libraries, functions, classesReusable components to enhance script functionality.

Reconnaissance and Enumeration Tools

ToolDescription
Wayback MachineRetrieve archived web pages to identify outdated or exposed content.
MaltegoPerform link analysis to map relationships between entities.
Recon-ngFramework for automated OSINT collection.
ShodanSearch engine for identifying Internet-connected devices and exposed services.
SpiderFootAutomated OSINT collection across multiple public sources.
WHOIS / nslookup / digRetrieve domain and DNS information for target profiling.
Censys.io / DNSdumpsterDiscover network infrastructure and related assets.
AmassPerform DNS enumeration and subdomain discovery.
Nmap / NSEScan networks, discover hosts, and execute custom vulnerability scripts.
theHarvesterGather emails, subdomains, and hosts from open sources.
WiGLE.net / InSSIDerMap wireless networks and identify nearby SSIDs and BSSIDs.
Wireshark / tcpdumpCapture and analyze network packets to detect vulnerabilities.
Aircrack-ngWireless packet capture and WPA/WEP password cracking toolset.
OSINTframework.comDirectory of OSINT tools categorized by data source and purpose.

Vulnerability Discovery and Analysis

This domain focuses on uncovering and validating system weaknesses through scanning, analysis, and reporting.

Vulnerability Discovery Techniques

TechniqueDescription
Container ScansScan container images/configs for vulnerabilities.
Sidecar ScansCheck sidecar containers for security gaps.
Application ScansTest applications for flaws and misconfigurations.
DASTDynamic Application Security Testing. 
IASTInteractive Application Security Testing.
SCASoftware Composition Analysis.
SASTStatic Application Security Testing.
Infrastructure as Code (IaC) AnalysisReview IaC files for configuration risks.
Source Code AnalysisInspect code manually or with scanners for bugs.
Mobile ScansTest mobile apps for insecure storage and behavior.
Network ScansIdentify hosts, services, and open ports.
Host-Based ScansAssess local system configs and software.
Secrets ScanningFind exposed keys, passwords, and tokens.
Wireless ScanningAnalyze Wi-Fi signals, channels, and SSIDs.
ICS Vulnerability AssessmentEvaluate industrial systems for weaknesses.
Manual AssessmentVerify findings by hands-on testing.
Port MirroringCopy network traffic for passive review.

Reconnaissance, Scanning, and Enumeration Phases

PhaseDescription
Analysis of Reconnaissance and Scanning ResultsValidate and interpret data gathered from prior phases to confirm vulnerabilities.
Validate ResultsDistinguish between false positives, false negatives, and true positives while ensuring scan completeness.
Troubleshooting Scan ConfigurationsReview scanning parameters and network accessibility issues to improve accuracy.
Public Exploit SelectionMatch identified vulnerabilities with known public exploits for validation and testing.
Scripting for ValidationAutomate result verification and exploit proofing using Bash, Python, or PowerShell.

Physical Security Concepts

ConceptDescription
TailgatingGaining unauthorized access by following an authorized person into a restricted area.
Site SurveysInspect premises to identify potential physical vulnerabilities or entry points.
USB DropsPlanting infected USB devices to trick users into compromising the network.
Badge CloningDuplicating access cards or RFID credentials for unauthorized access.
Lock PickingPhysically bypassing locks to gain entry to restricted areas or systems.

Attacks and Exploits

The Attacks and Exploits domain focuses on executing and analyzing real-world cyberattacks across multiple environments.

Network Attacks

AttackDescription
VLAN hoppingAn attacker can move from one VLAN to another.
On-path (MITM)Intercept a two-party conversation for one’s advantage.
Service exploitation Buffer overflow, RCE, service-specific vulnerabilities.
Network SniffingPacket capture, protocol analysis, credential interception.
Denial-of-ServiceSYN flood, UDP flood, application layer DoS.

Authentication Attacks

AttackDescription
Brute-Force AttacksTrying all possible passwords until one succeeds.
Pass-the-HashUsing stolen password hashes to authenticate without cracking them.
Credential StuffingUsing leaked username/password pairs across multiple services.
KeberoastingExtracting and cracking Kerberos service tickets to gain elevated access.
Password SprayingAttempting a few common passwords across many accounts to avoid lockouts.

Host-Based Attacks

AttackDescription
Privilege EscalationExploiting weaknesses to gain higher privileges, like admin or root access.
Process InjectionRunning malicious code inside a legitimate process.
Credential DumpingExtracting stored usernames and passwords from memory or files.
Living off the LandAbusing built-in system tools to evade detection.
Persistence MechanismsTechniques that maintain long-term access to compromised systems.

Web Application Attacks

AttackDescription
SQL InjectionInjecting malicious input to run unauthorized SQL queries.
XSSCross-Site Scripting.
Directory TraversalAccessing files or directories outside the intended folder using path manipulation.
CSRFCross-Site Request Forgery.
Authentication BypassSkipping or defeating login mechanisms through flaws or misconfigurations.

Cloud-Based Attacks

AttackDescription
Container EscapesBreaking out of a container (like Docker) to access the host system.
Metadata Service AttacksExploiting cloud metadata endpoints to steal credentials or tokens.
IAM MisconfigurationWeak or overly permissive identity and access settings enabling unauthorized access.
S3 Bucket EnumerationDiscovering misconfigured or public cloud storage buckets.
Serverless Function AbuseTriggering or manipulating serverless functions for unauthorized execution.

AI Attacks

AttackDescription
Prompt InjectionTricking AI models with malicious input to alter outputs or reveal data.
Model ManipulationTampering with AI models to change or corrupt their behavior.
Data ExtractionStealing sensitive files, records, or secrets from a target system.

Wireless Attacks

AttackDescription
WEP CrackingBreaking outdated WEP encryption through packet capture and key recovery.
WPA/WPA2 AttacksCapturing handshakes and cracking Wi-Fi passwords or exploiting protocol flaws.
Evil TwinFake Wi-Fi access point to trick people into choosing it over the genuine one
WPS PIN brute forceBrute-forcing the 8-digit WPS PIN to gain unauthorized access to a wireless network.

Tools & Techniques

ToolDescription
MetasploitModular exploitation and post-exploitation framework.
NetcatNetworking utility for reading/writing data across connections.
NmapPort scanning and network discovery tool.
NSENmap Scripting Engine for automation and vulnerability scripts.
ImpacketPython toolkit for network protocols and exploit scripts.
CrackMapExec (CME)Recon and lateral movement automation tool.
Wireshark/tcpdumpOpen-source packet capture analysis
msfvenomPayload generator for custom shellcode.
ResponderLLMNR/NBT-NS poisoning tool.
HydraFast password brute-force tool.
hashcatGPU-powered password cracker.
John the RipperPassword cracking utility.
BloodHoundAD attack path mapping tool.
MedusaParallel login brute-force tool.
Burp SuiteWeb application security testing platform.
RubeusKerberos abuse toolset.
CertifyAD CS abuse and certificate enumeration.
SeatbeltWindows security assessment tool.
PowerShell/ISEAutomation, enumeration, and offensive scripting.
PsExecRemote command execution utility.
Evil-WinRMWinRM exploitation and lateral movement.
LOLbinsNative OS binaries used for stealthy attacks.
TruffleHogSearch for secrets in code repos.
ZAPOWASP Zed Attack Proxy for web app testing.
PostmanAPI testing and enumeration.
sqlmapAutomated SQL injection exploitation tool.
Gobuster/DirBusterDirectory and file brute-forcing.
WfuzzWeb fuzzer for parameters and injection tests.
WPScanWordPress vulnerability scanner.
PacuAWS exploitation framework.
Docker BenchDocker security configuration scanner.
Kube-hunterKubernetes cluster security tester.
ProwlerCloud security auditing for AWS.
ScoutSuiteMulti-cloud security auditing tool.
WPADProxy auto-discovery attack tool.
WiFi-PumpkinWireless rogue AP and phishing tool.
Aircrack-ngWi-Fi cracking and monitoring suite.
WiGLE.netWireless network discovery database.
InSSIDerWi-Fi scanning and analysis tool.
KismetWireless IDS and packet sniffer.
SETSocial Engineering Toolkit for phishing attacks.
GophishPhishing campaign framework.
EvilginxPhishing proxy for token theft.
theHarvesterEmail, domain, and OSINT harvesting.
MaltegoGraph-based OSINT investigation tool.
Recon-ngOSINT reconnaissance automation.
BeEFBrowser exploitation framework.
ScapyPacket crafting and manipulation toolkit.
tcprelayiOS debugging and relay utility.
MobSFMobile application security testing.
FridaDynamic instrumentation toolkit.
DrozerAndroid security testing framework.
ADBAndroid Debug Bridge for device control.
BluestrikeBluetooth attack and scanning tool.

Post-exploitation and Lateral Movement

This PenTest+ domain emphasizes post-exploitation activities like maintaining access, performing lateral movement, and delivering comprehensive documentation with remediation recommendations.

Persistence Techniques

TechniqueDescription
Scheduled tasks / cron jobsCreate recurring tasks to maintain unauthorized access.
Service creationInstall malicious services that restart automatically.
Reverse / bind shellsMaintain remote access through shell connections.
Account creationAdd hidden or unauthorized user accounts.
Credential harvestingSteal valid credentials for re-entry.
Registry key manipulationModify autostart registry keys for persistence.
C2 frameworksUse tools like Cobalt Strike, Empire, Covenant for long‑term access.
BackdoorsInstall web shells, Trojans, and rootkits to regain entry.
Browser extensionsInject malicious extensions for session hijacking or persistence.
Tampering with security controlsDisable logs, EDR, antivirus, or monitoring tools.

Lateral Movement Techniques

TechniqueDescription
Pivoting & RelaysRerouting traffic through compromised hosts to access internal systems.
Credential Dumping & ReuseExtracting and reusing credentials for lateral authentication.
Host & Service EnumerationIdentifying services, traffic, shares, and accessible systems.
Protocol DiscoveryEnumerating SMB, RDP/VNC, SSH, LDAP, RPC, FTP, HTTP/HTTPS, and more.
Remote Execution MethodsUsing WMI, WinRM, and RPC/DCOM to run commands remotely.
LOLBinsBuilt‑in OS binaries used for stealthy movement:
β€’ Netstat
β€’ Ftp.exe
β€’ rundll32
Offensive Toolsβ€’ Metasploit
β€’ PsExec
β€’ Mimikatz
β€’ CME
β€’ Impacket
β€’ Covenant
β€’ Sshuttle
β€’ Proxychains
Automation ToolsPowerShell ISE, batch scripts, and tunneling utilities for movement.

Staging and Exfiltration Techniques

TechniqueDescription
File encryption & compressionPacking data with zip/7z/AES to evade detection during exfiltration.
Covert channelsHiding exfiltration via steganography, DNS tunneling, ICMP, or HTTPS.
Email or cloud uploadsSending stolen data via email, shared drives, or cloud buckets.
Cross‑account resource abuseUsing misconfigured shared cloud resources to extract data.
Virtual drive mounting / ADSStaging data in mounted drives or NTFS alternate data streams.
Public paste/text sitesUploading stolen data to anonymous pastebin-type services.

Cleanup and Restoration Techniques

TechniqueDescription
Remove persistence mechanismsDelete scheduled tasks, services, registry keys, shells, and other footholds.
Revert configuration changesRestore system settings to pre-engagement state.
Delete tester-created credentialsRemove accounts, tokens, and passwords generated for testing.
Remove tools and temp filesDelete payloads, scripts, logs, and utilities used during the assessment.
Spin down test infrastructureShut down cloud resources, VMs, and C2 servers used in testing.
Preserve legal artifactsRetain screenshots, logs, and necessary evidence for the final report.
Secure data destructionWipe sensitive data following DoD 5220.22-M or NIST SP 800-88 guidelines.

CompTIA PenTest+ Cheat Sheet Conclusion

Ideal for quick review and last-minute prep, this CompTIA PenTest+ Cheat Sheet provides a focused overview of the exam domains.

To boost your chances of success, make sure you check out our CompTIA PenTest+ Courses Bundle, available as a one-time purchase. This grants lifetime access to two full video courses, 884 practice questions, over 500 flashcards, and more.

Plus, you can save up to 30% on your official PenTest+ exam voucher when you purchase through us, making certification prep both effective and affordable.

For a complete career roadmap, mentorship, and access to 30,000+ cybersecurity courses and labs, explore the StationX Master’s Program.

Whichever path you take, we wish you good luck on your way to becoming a certified penetration tester!

The CompTIA PenTest+ Courses Bundle PT0-003 includes:

Guarantee Your Cyber Security Career with the StationX Master’s Program!

Get real work experience and a job guarantee in the StationX Master’s Program. Dive into tailored training, mentorship, and community support that accelerates your career.

  • Job Guarantee & Real Work Experience: Launch your cybersecurity career with guaranteed placement and hands-on experience within our Master’s Program.
  • 30,000+ Courses and Labs: Hands-on, comprehensive training covering all the skills you need to excel in any role in the field.
  • Pass Certification Exams: Resources and exam simulations that help you succeed with confidence.
  • Mentorship and Career Coaching: Personalized advice, resume help, and interview coaching to boost your career.
  • Community Access: Engage with a thriving community of peers and professionals for ongoing support.
  • Advanced Training for Real-World Skills: Courses and simulations designed for real job scenarios.
  • Exclusive Events and Networking: Join events and exclusive networking opportunities to expand your connections.

TAKE THE NEXT STEP IN YOUR CAREER TODAY!

  • Cezarina is a Content Writer at StationX with a robust background in cyber security. Dedicated to making complex online security topics accessible and clear, Cezarina helps readers understand and respond to the dynamic world of cyber threats. She shares helpful advice through clear-cut blog posts that offer practical support for everyone. You can always reach her on LinkedIn for further insights and discussions.

>

StationX Accelerator Pro

Enter your name and email below, and we’ll swiftly get you all the exciting details about our exclusive StationX Accelerator Pro Program. Stay tuned for more!

StationX Accelerator Premium

Enter your name and email below, and we’ll swiftly get you all the exciting details about our exclusive StationX Accelerator Premium Program. Stay tuned for more!

StationX Master's Program

Enter your name and email below, and we’ll swiftly get you all the exciting details about our exclusive StationX Master’s Program. Stay tuned for more!