OSCP Passed!
MrAgent
Member Posts: 1,310 ■■■■■■■■□□
Got the welcome email this morning.
Created a blog entry here:
Blog of Jason Bernier » Blog Archive » Try Harder! A Penetration Testing with Kali Linux (PWK) Course, Lab, and Exam Review (OSCP)
Created a blog entry here:
Blog of Jason Bernier » Blog Archive » Try Harder! A Penetration Testing with Kali Linux (PWK) Course, Lab, and Exam Review (OSCP)
Comments
-
YFZblu Member Posts: 1,462 ■■■■■■■■□□Awesome, congrats! You eyeing CTP at all? I noticed their Advanced webapp course is going online soon as well.
-
MrAgent Member Posts: 1,310 ■■■■■■■■□□Awesome, congrats! You eyeing CTP at all? I noticed their Advanced webapp course is going online soon as well.
Maybe in the future. I have to renew my VCP and I want to get the CISSP this year. -
da_vato Member Posts: 445Congrats!
Do you have any lessons learned or advice that you wish you knew prior to taking on the venture? -
MrAgent Member Posts: 1,310 ■■■■■■■■□□As far as lessons learned. All I can really say is try harder. I couldn't quite grasp the idea before the challenge, but I certainly can after passing.
I guess just be prepared to do a lot of research. Nothing is going to be handed to you, as was my case with "sufference". I am an avid Linux user, so using Kali wasn't a big deal to me. The more of Linux you know, the better off you will be. -
MrAgent Member Posts: 1,310 ■■■■■■■■□□Maybe next year. I did enjoy the buffer overflow section of the course. I was able to understand it and make sense of it all.
-
Killj0y Member Posts: 39 ■■□□□□□□□□Congrats! Never gave up. Very cool!!Certifications: GPEN, SMFE, CISSP, OSCE, OSCP, OSWP, Security+, CEHv6, MCSE+Sec:2003
-
JasminLandry Member Posts: 601 ■■■□□□□□□□What kind of programming skills is required to pass this exam?
-
BlackBeret Member Posts: 683 ■■■■■□□□□□Be able to edit existing exploits, cross compile for different OS's, troubleshoot (google) error codes, repeat until the exploit works. Really the minimum is taught in the course, but I spent a lot of time searching error codes to clean up code and get it to compile.
-
MrAgent Member Posts: 1,310 ■■■■■■■■□□Even that is beyond the scope of the class. I don't come from a programming background, but I can script when needed. You just need to be able to modify code to suit your situation.
Its really not that bad. -
impelse Member Posts: 1,237 ■■■■□□□□□□Good blog, I like the cat walking, LOLStop RDP Brute Force Attack with our RDP Firewall : http://www.thehost1.com
It is your personal IPS to stop the attack. -
SaSkiller Member Posts: 337 ■■■□□□□□□□BlackBeret wrote: »Be able to edit existing exploits, cross compile for different OS's, troubleshoot (google) error codes, repeat until the exploit works. Really the minimum is taught in the course, but I spent a lot of time searching error codes to clean up code and get it to compile.
So Ruby?OSWP, GPEN, GWAPT, GCIH, CPT, CCENT, CompTIA Trio. -
dave0212 Member Posts: 287Congrats
This is next on my personal list of learning to do, just need to find the timeThis week I have achieved unprecedented levels of unverifiable productivity
Working on
Learning Python and OSCP -
MrAgent Member Posts: 1,310 ■■■■■■■■□□Thanks. My boss has already indicated that he will be looking into more security focused projects for the customer I work for.
-
5ekurity Member Posts: 346 ■■■□□□□□□□Congratulations!! Outside of the OSCP material, what precursory material do you feel helped the most?
-
MrAgent Member Posts: 1,310 ■■■■■■■■□□I kept the hackers playbook handy, and I learned from the buffer overflow section of Penetration Testing by Georgia Weidman.
On a side note... someone is trying to brute force my blog. Tsk tsk. -
JoJoCal19 Mod Posts: 2,835 ModOn a side note... someone is trying to brute force my blog. Tsk tsk.
There's an answer for that
Have: CISSP, CISM, CISA, CRISC, eJPT, GCIA, GSEC, CCSP, CCSK, AWS CSAA, AWS CCP, OCI Foundations Associate, ITIL-F, MS Cyber Security - USF, BSBA - UF, MSISA - WGU
Currently Working On: Python, OSCP Prep
Next Up: OSCP
Studying: Code Academy (Python), Bash Scripting, Virtual Hacking Lab Coursework