Crest CRT Syllabus v2.0
Crest CRT Syllabus v2.0
This document and any information therein are the confidential property of CREST, and without
infringement, neither the whole nor any extract may be disclosed, loaned, copied or used for
manufacturing, provision of services or other purposes whatsoever without the prior written consent of
CREST, and no liability is accepted for loss or damage from any cause whatsoever from the use of the
document. CREST retain the right to alter the document at any time unless a written statement to the
contrary has been appended.
Table of Contents
Version History 3
1 Introduction 4
3 Syllabus Structure 6
CREST
2.0 July 7, 2023 Assessors Public Release
Panel
The examination covers a common set of core skills and knowledge; the candidate must
demonstrate that they can perform an infrastructure and web application vulnerability scan using
commonly available tools; and interpret the results. Success combined with valid CPSA certification
will confer CREST Registered Penetration Tester (CRT) status to the individual.
The Notes for Candidates (CRT) document for the Certification Examinations provides further
information regarding the Certification Examinations in general and the skill areas that will be
assessed within the practical assault course.
For each skill area, CREST has indicated where and how the area will be assessed: for the
CREST Registered Penetration Tester (CRT), all skills will be assessed by a practical
assault course.
SOA
NS
MX
A
AAAA
CNAME
PTR
TXT (including use in DMARC
policies)
HINFO
SVR
Yes
C2 PT004.04 VLAN Tagging Understands VLAN tagging (IEEE 802.1Q).
Yes
C3 PT004.05 IPv4 Basic understanding of how the IPv4 protocol
works.
Yes
C5 PT004.12 Network Devices Analysing the configuration of the following types
of network equipment:
Routers
Switches
Firewalls
Yes
C6 PT004.13 Network Filtering Understands network traffic filtering and where
this may occur in a network.
Yes
C7 PT004.14 Traffic Analysis Can intercept and monitor network traffic,
capturing it to disk in a format required by
analysis tools (e.g. PCAP).
Yes
C9 PT004.17 UDP Understands how UDP works and its relationship
with IP protocols and higher level protocols.
Yes
C10 PT004.22 Service Identification Can identify the network services offered by a
host by banner inspection.
Yes
C11 PT004.23 Host Discovery Can identify targets on common networks using
active and passive fingerprinting techniques and
can demonstrate their use.
Telnet
FTP
SNMP
HTTP
Yes
D2 PT005.03 TLS / SSL Understands the use of TLS and SSL in
protecting data in transit.
DNS
NetBIOS / WINS
WINS
LLMNR
mDNS
SOA
NS
MX
A
AAAA
CNAME
PTR
TXT (including use in DMARC policies)
HINFO
SVR
Yes
D4 PT005.08 Management Understands and can demonstrate the use of
Services the following network management services:
Telnet
Cisco Reverse Telnet
SSH
HTTP
Remote Powershell
WMI
WinRM
RDP
VNC
X
Yes
D5 PT005.09 Desktop Access Is aware of common protocols used to provide
remote access to desktop services including:
RDP
VNC
XDMCP
X
Yes
D6 PT005.10 IPsec Enumeration and fingerprinting of devices
running IPsec services.
Yes
D7 PT005.11 FTP Understands FTP and can demonstrate how a
poorly configured FTP server can be exploited,
e.g. the downloading of arbitrary files, the
uploading and over-writing of files, and the
modification of file system permissions.
Yes
D8 PT005.12 TFTP Understands TFTP and can demonstrate
how a poorly configured TFTP server can be
exploited, e.g. the downloading of arbitrary files.
the uploading over-writing of files.
Yes
D9 PT005.13 SNMP Understands the difference between versions
1, 2c, and 3.
users
processes
network configuration
Yes
D10 PT005.14 SSH Understands SSH and its associated security
attributes, including the different versions of the
protocol, version fingerprinting and how the
service can be used to provide a
number of remote access services.
Yes
D11 PT005.15 NFS Understands NFS and its associated security
attributes and can demonstrate how exports can
be identified.
Yes
D12 PT005.16 SMB Is aware of common SMB implementations
including:
Yes
D13 PT005.17 LDAP Is aware of common LDAP implementations
including:
Yes
D14 PT005.18 Berkeley R* Services Understands the Berkeley r-services and their
associated security attributes and can
demonstrate how trust relationships can:
Yes
D15 PT005.19 X Understands X and its associated security
attributes, and can demonstrate how insecure
sessions can be exploited, e.g.. by obtaining
screen shots, capturing
keystrokes and injecting commands into open
terminals.
Yes
D16 PT005.20 Finger Understands how finger daemon derives the
information that it returns, and hence how it can
be abused.
Enumeration of usernames.
Yes
D17 PT005.21 RPC Services Can perform RPC service enumeration.
Yes
D18 PT005.22 NTP Understands the function of NTP and the
importance of it for logging and
authentication.
Yes
D19 PT005.25 SMTP and Mail Understands and can demonstrate valid
Servers username discovery via EXPN and VRFY.
Yes
E2 PT007.02 Windows Network Can perform user and group enumeration on
Enumeration target systems and domains, using various
protocols and methods including:
NetBIOS
LDAP
SNMP
RID Cycling
Yes
E3 PT007.04 Active Directory Can enumerate information from Active
Enumeration Directory including:
Users
Groups
Computers
Trusts
Service Principle Names
Yes
E4 PT006.05 Windows Passwords Understands password policies, including
complexity requirements and lock-out.
Yes
E5 PT007.06 Windows Processes Can identify running processes and exploit
vulnerabilities to escalate privileges.
Yes
E6 PT006.07 Windows File Understands and can demonstrate the
Permissions manipulation of file system permissions on
Windows operating systems.
Yes
E7 PT006.08 Registry Understands and can demonstrate the detection
and manipulation of weak registry ACLs.
Yes
E8 PT006.09 Windows Remote Understands and can demonstrate the remote
Exploitation exploitation of Windows operating system and
third-party software application vulnerabilities.
Yes
E9 PT006.11 Windows Local Understands and can demonstrate the local
Exploitation exploitation of Windows operating system and
third-party software application vulnerabilities.
Yes
E10 PT006.13 Windows Post Understands and can perform common post
Exploitation exploitation activities, including:
Yes
E11 PT006.14 Windows Patch Understands common windows patch
Management management strategies, including:
SMS
SUS
WSU S
Yes
E12 PT006.15 Windows Desktop Understands and can demonstrate
Lockdown techniques to break out of a locked down
Windows desktop or Citrix environment.
Yes
E13 PT006.17 Common Windows Knowledge of significant vulnerabilities in
Applications common windows applications for which there
is public exploit code available.
Yes
F1 PT007.01 Linux / UNIX Can identify Linux / UNIX hosts on a
Reconnaissance network.
Yes
F2 PT007.02 Linux / UNIX Can demonstrate and explain the
Network enumeration of data from a variety of
Enumeration common network services on various
platforms including:
Yes
F3 PT007.03 Linux / UNIX Understands users, groups and password
Passwords policies, including complexity requirements and
lock out.
Yes
F4 PT007.04 Linux / UNIX File Understands and can demonstrate the
Permissions manipulation of file system permission on Linux
and UNIX operating systems.
Yes
F5 PT007.05 Linux / UNIX Can identify running processes on Linux / UNIX
Processes hosts and exploit vulnerabilities to escalate
privileges.
Yes
F6 PT007.06 Linux / UNIX Remote Understands and can demonstrate the
Exploitation remote exploitation of Linux and UNIX
systems including:
Solaris
Linux
FreeBSD
OpenBSD
Yes
F7 PT007.07 Linux / UNIX Local Understands and can demonstrate the local
Exploitation exploitation of Solaris, Linux and *BSD operating
system vulnerabilities.
Yes
F8 PT007.08 Linux / UNIX Post Understands and can demonstrate common
Exploitation post-exploitation activities, including:
Yes
G1 PT008.01 Web Servers Can identify web servers on a target network
and can remotely determine their type and
version.
virtual hosts
multiple ports
application specific URLs
Understands and can demonstrate the remote
exploitation of web servers.
Yes
G2 PT008.02 Web Application Can identify common application frameworks
Frameworks and technologies, including:
.NET
J2EE
Coldfusion
Ruby on Rails
NodeJS
Django
Flask
Yes
G3 PT008.03 Common Web Can identify common web applications and
Applications exploit well-known vulnerabilities.
Yes
G4 PT008.04 Web Protocols Understands and can demonstrate the use of
web protocols, including:
HTTP
HTTPS
– WebSockets
Understands all HTTP methods and response
codes.
Yes
G5 PT008.05 Mark Up Languages Understands common web mark up
languages, including:
HTML
XHTML
XML
Yes
G6 PT008.09 Web Application Can use spidering tools and understands their
Reconnaissance relevance in a web application test for
discovering linked content.
Yes
G7 PT008.11 Information Can gather information from a web site and
Gathering application mark up or application code,
including:
Yes
G8 PT008.12 Web Authentication Understands common authentication
mechanisms and their security issues,
including:
Yes
G9 PT008.13 Web Authorisation Understands common pitfalls associated with
the design and implementation of application
authorisation mechanisms.
Yes
G10 PT008.14 Input Validation The importance of input validation as part of a
defensive coding strategy.
Yes
G11 PT008.16 Cross Site Scripting Understands cross site scripting (XSS) and can
demonstrate the launching of a successful XSS
attack.
Yes
G12 PT008.17 SQL Injection Determine the existence of an SQL injection
condition in a web application.
Yes
G13 PT008.22 Mail Injection Can demonstrate the ability to identify, explain
and prove the existence of the following types of
mail related injection in a web application:
SMTP injection
IMAP injection
Yes
G14 PT008.24 OS Command Injection Can demonstrate the ability to identify,
explain and prove the existence of OS
command injection in a web application.
Yes
G15 PT008.25 Sessions Can identify the session control mechanism
used within a web application.
Yes
G16 PT008.26 Cookies Understands how cookies work in a web
application.
Yes
G17 PT008.28 Session Hijacking Understands and can exploit session
hijacking vulnerabilities.
Yes
G18 PT008.29 Cross Site Request Understands and can exploit CSRF
Forgery vulnerabilities.
Yes
G19 PT008.31 Web Cryptography Understands how cryptography can be used to
protect data in transit and data at rest, both on
the server and client side.
Yes
G20 PT008.35 Parameter Understands parameter manipulation
Manipulation techniques, particularly the use of client- side
proxies.
Yes
G21 PT008.36 Directory Traversal Understands and can identify directory traversal
vulnerabilities within applications.
Yes
G22 PT008.37 File Uploads Understands and can identify common
vulnerabilities with file upload capabilities
within applications.
Yes
G23 PT008.39 Web Application Can assess and exploit vulnerabilities within the
Logic Flaws functional logic, function access control and
business logic of an application.
Yes
H1 PT009.01 SQL Relational Can use SQL to interact with relational databases
Databases and extract information, e.g. SQLite, PostgreSQL.
Yes
H2 PT009.02 Microsoft SQL Server Understands and can demonstrate the remote
exploitation of Microsoft SQL Server.
Yes
H3 PT009.03 Oracle RDBMS Understands and can demonstrate the remote
exploitation of an Oracle RDBMS instance.
Yes
H4 PT009.04 MySQL Understands and can demonstrate the remote
exploitation of an MySQL database.
Yes
H5 PT009.05 PostgreSQL Understands and can demonstrate the remote
exploitation of a PostgreSQL database.