It's offical, I passed the OSCP exam!!

Well I finally did it! I passed my OSCP exam! I completed my exam and submitted my report yesterday and this afternoon I got the official email notifying me that I passed the exam. It took me 12 hours this time.
Thanks to everyone for your support and words of encouragement.
Thanks to everyone for your support and words of encouragement.
Comments
Thanks! It's an awesome course. I learned more from the course and certification challenge than any course I have taken to date. I highly recommend this course. If you want to learn pentesting/ethical hacking, this is the course.
I am a consultant/pentester. I started as a pentester March 2012. I had application and network vulnerability assessment experience, but was lacking the hacking skills for pentesting, so I signed up for the OSCP course.
GetCertified4Less - discounted vouchers for certs
I'm on the vulnerability assessment/compliance and audit side of the house and would like to move over to the PenTesting side some day. I'm just biding my time, learning everything there is to learn before I attempt to make that transition.
PHP
Kotlin
Intro to Discrete Math
Programming Languages
Work stuff
With your experience, the OSCP course would be what you need to make the transition. I had network and web app vulnerability experience, but just didn't have the penetrating/hacking knowledge or skills.
Thanks, Grinch! I agree, you should get back at it.
WGU MS:ISA Completed October 30th 2013.
Thanks guys...hopefully I can live up to the high expectations. Guess we'll find out in 4 days :-/
Thanks! I had someone else inquire about a write up. I will post it up when I complete the write up.
Congrats! What resources did you use outside the course material for buffer overflows/ASM/editing exploits?
Thanks, YuckTheFankees! I used the first 2 corelan tutorials, the grey corner tutorials and the SecurityTube buffer overflow and ASM primers. For me it helped to see this stuff several times, I also think it helps because people explain things differently and you may understand their style better or by that time you have been over it enough it finally clicks. One of the biggest thing that helped me was working in the lab.
The Grey Corner: Stack Based Windows Buffer Overflow Tutorial
https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/
https://www.corelan.be/index.php/2009/07/23/writing-buffer-overflow-exploits-a-quick-and-basic-tutorial-part-2/
http://www.securitytube.net/groups?operation=view&groupId=4
http://www.securitytube.net/groups?operation=view&groupId=5
http://www.securitytube.net/groups?operation=view&groupId=6
You're welcome! There are more tutorials than that on corelan and grey corner, quite a lot actually. All of the SecurityTube megaprimers are good.
I was a complete newb to buffer overflows and that was my first experience with them. I still need some work with buffer overflows. I want to take the OSCE in the next year or so.
Thanks, da_vato! It's a great course and you will learn a lot. You should take it.
Thanks, spicy ahi! Once you get the chance take it. The course is very reasonably priced and especially for what all you learn. If you do the CEH the right way and not just memorize test simulators, you can take that knowledge and use it on the OSCP course. I took a CEH course back in 2010, but I made the mistake of not taking the exam. I learned how to use a lot of the same tools during the CEH course and with the OSCP, you learn how to penetrate systems with the tools. Use your time wisely in the CEH and it should help you with the OSCP.
You should be OK with buffer overflows and modifying exploit code. I have some links listed below for buffer overflow tutorials a couple of the SecurityTube tutorials are for assembly, which are helpful with buffer overflows. There are a lot of great tutorials on all three of those sites, but the links I listed should probably be enough for the course. It should take much for you to catch on to buffer overflows with your skillset and knowledge. Python is good to know, but you can get by with only knowing how to modify the code. That's one of the things on my to do list, is to learn Python. I am taking the SecurityTube Python Scripting Experts course and there is a free version on the SecurityTube website.
The Grey Corner: Stack Based Windows Buffer Overflow Tutorial
https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/
https://www.corelan.be/index.php/2009/07/23/writing-buffer-overflow-exploits-a-quick-and-basic-tutorial-part-2/
http://www.securitytube.net/groups?operation=view&groupId=4
http://www.securitytube.net/groups?operation=view&groupId=5
http://www.securitytube.net/groups?operation=view&groupId=6