Compare cert salaries and plan your next career move
ottucsak wrote: » There are two labs in Module 1. One about getting a shell through Office macro malware and another about getting a shell through BeEF. There are two more labs, one about WSUS and another about escalating from SQL injection to getting domain admin access. I guess instead of several small labs, they went for a few big ones where you have to chain your exploits compromise multiple hosts/applications. Remember this is supposed to be an advanced course with less hand holding, but you are free to experiment with different payloads and exploitation techniques. SleepCZ: Please don't be a wiseguy. I read through Module 1, took notes, tried a few of the potential Office macros, but haven't watched the videos or completed the labs. Also I have read Chris Hadnagy's book before and it has nothing to do with the content of PTX. Module 1 contains a bucketload of information about spearphishing, Excel/Word/Powerpoint macros, obfuscation, client browser based exploitation, blue team and AV evasion etc but it doesn't deal with the basic piggybacking, lockpicking or shouldersurfing. Yes, most of the material is available online, but you have to hunt down dozens of blogposts from various authors, assemble your own labs, buy/steal licenses and configure everything. If somebody has the time to do that, that's great, I'm pretty sure most of the people who work 9-5 in security don't.
ottucsak wrote: » Module 1 PTX.
ottucsak wrote: » That's what I plan to do. PTP, PTX and try again OSCP after these. During my time in the OSCP labs, I know that I encountered an MSSQL->Admin vulnerability and my friend told me that he also used BeEF during his lab time, so this could be potentially useful. (Although it's a bit expensive if you just want to do that)
ottucsak wrote: » I think you can easily pick up a few tips and tricks for the Windows exploit/post-exploit part of the lab, but it's not worth it/overkill if you only want to use it for that. Only buy it if you want to learn more about this specific aspect of red teaming, otherwise you can pick up the basic necessary skills during the OSCP lab time. By the way, I just finished the slides from module 6 and those who say that it sucks are totally right. No hands-on tips or tricks of any kind, just slides about what tool can be used for a specific task and reference links.
vynx wrote: » so you finish PTX in less than 3 days ? can i know how long in hours estimate ?
chopsticks wrote: » I would say this is a very difficult course for non programmers. I need to learn VB.net, VBA first in order to better understand the first module. Work in progress.
monkykap wrote: » I would say PTP: hit, PWD: hit, PTS: miss, WPTX: miss, MASPT: miss, and now PTXP: miss
ZzBloopzZ wrote: » Why do you feel that the PTS was a miss? I felt it was a good amount of web app and network pen testing. For only $300 I thought it was a huge hit for people that don't know much about pen testing and want some hands on. Fantastic intro course IMHO. In fact I landed my current pen testing job thanks to what I learned in eJPT. CISSP got me the money I wanted but the eJPT got me the job or in other words pass technical interview. I do agree from reading around the other classes appear to be miss including PTX. I plan to do PTP next if they end up having a thanksgiving sale otherwise will just jump to OSCP.
vynx wrote: » someone already take PTX can give review here ?
UnixGuy wrote: » Mate it's really early the course has just been released Take the course if you want to learn the topics in the course, don't compare it to OSCP/OSCE it's a different course /Thread.
vynx wrote: » can you explain why need to learn VB.net / VBA?
vynx wrote: » the exam seems likely ready to take. someone have take the exam can share the review ?
Compare salaries for top cybersecurity certifications. Free download for TechExams community.