Compare cert salaries and plan your next career move
Slyth wrote: » Invictus_123 i'm starting next month(already paid, but they didn't have a closer date), do you have any advice when it comes to starting in the labs? Should i attempt to go after low hanging fruit based on specific scans or is it better to just go in order(.1, .2, .3, etc)?
renacido wrote: » are you given an actual objective for this other than pwning and dumping?
In a real world pentesting or security assessment engagement, the client is going to want to know if a bad actor can not just penetrate the securty provisions, but do damage, what severity and type of damage, what is the impact to the business, the cost of recovery, etc. Is any attention paid to this or it just "root, ****, repeat"?
Does the student need to do any recon of the target to understand where the crown jewels are? Are you given an objective that may go beyond (or not even require) gaining a privileged shell?
Sheiko37 wrote: » There's no specific objectives, though they do tell you to spend time in post-exploitation, but what you do is up to you. There's some machines with things like a bank-account.zip file, which you could talk about in your report, but these aren't laid out as an objective. If you include it in your lab report with your exam it may count as a fraction of a percentage increase to your score, but there's no public information on how lab reports score in your exam. The lab is set up with different isolated networks, if you hack something on the Public Network you can pivot from that to the IT Network, and from that to the Admin Network, but none of that is ever mentioned as an objective. If you asked an admin they'd likely tell you the goal is to gain root/system privilege on all machines and learn as much about them as you can. If you asked about risk assessment or sensitive information on different machines they'd likely just say that's up to you to investigate. Exploits like DoS or file disclosure that may be of interest in a real life penetration test, score nothing in the OSCP.
Slyth wrote: » invictus why not revert the host prior to starting the host? This way it assures you have a stable copy and everything is intact? We have 8 reverts a day + another 8 if we ping an admin.
Slyth wrote: » Very nice! I officially start this Saturday. What do you personally find most difficult privilege escalation,enumeration or exploitation?
Slyth wrote: » Iv heard from a few people the exam hosts are just copys of the lab hosts, is this true from what you have seen? With this in mind i started on 3/12 and I seem to be in the new subnet with new lab hosts. It could be possible you got copy's of some of the new lab hosts.
Jebjeb wrote: » I wish you well in the grading department, It was exactly 24 hours from there confirmation of receipt of the report to getting the grade. And no the exam machines are not copies! While there may have been a familiar application name or 2, they didn't have the same configs,vulnerabilities or versions, almost all of it was completely new.
Compare salaries for top cybersecurity certifications. Free download for TechExams community.