Background

I previously completed the TCM Security PNPT AD pentest exam in 2022, so I brought some AD fundamentals into this challenge. I bought the C-ADPenXv2 in April 2025 during an initial release sale (90% off) after reviewing the syllabus — it looked like a realistic, complex AD pentest lab.

None
Exam Syllabus of C-ADPenXv2

Exam format

The exam is flag-based: 14 tasks, 7 hours total. You get one free retake if you fail.

Passing score is 60%; scoring above 75% earns "with merit."

Test access is provided via a VPN link by email and you launch the exam through the SpeedExam candidate portal.

The SecOps Group does not provide study materials — they only list references on pentestingexam.com.

None
Learning Resources for C-ADPenXv2

1st attempt

I underestimated the exam and underprepared. Endpoint protection prevented the lateral movement techniques I'd used previously, so I failed my first attempt. That was a wake-up call.

What matters: methodology and defense evasion.

This exam requires solid methodology and explicit defense-evasion techniques. If you expect to just run psexec, secretdump, or Mimikatz without evasion, you'll likely be blocked. Strengthen your AD pentest methodology before you book the exam.

Study checklist (recommended)

  • Master AD enumeration methodology (this exam made me appreciate NetExec).
  • Learn to read and analyze BloodHound — it's essential for AD engagements.
  • Build a structured privilege-escalation approach (local admin → Domain Admin).
  • Practice defense evasion — endpoints will often block naive payloads.
  • Review the full range of AD attacks (Pass-the-Hash, Kerberos abuses, Trust Abuse, etc.).

2nd attempt and outcome

I dedicated time to studying these areas and practicing under time pressure. In October 2025 I retook the exam. I was able to compromise almost all endpoints this time, but I ran out of time on the final flag (only 1 minute left). Despite that, my overall score was a pass.

None
Passed the C-ADPenX!

Impressions and score

The exam is realistic and well-designed — you start without credentials, no assumed breach. The lab was stable, though I did encounter two tasks where I couldn't obtain flags even after gaining administrative access — that's an area they could improve.

Overall rating: 8/10.

Thanks for reading — if you're preparing for C-ADPenXv2 and want notes or practice ideas, drop a comment and I'll share what helped me most.

References