My OSCP yJourney second time

impelseimpelse Member Posts: 1,237 ■■■■□□□□□□
Guys

Two years and a half ago I tried offensive security training and lack of knowledge and a lot of work I was not able to sit down to the exam and finish the lab (I extended around three times). Sure I learnt a lot and I was able to do some pentest.

Now this is the second time with this journey, now I am making public so I put some pressure on me to keep going.

I am reviewing the videos, some material I am very familiar the part I am not it is the exploit, so this week I will focus to exploit development, also I already bought the Udemy training for Windows exploit for $10

I am not on the live lab yet, I am using my own for the moment, to polish my skills.
Stop RDP Brute Force Attack with our RDP Firewall : http://www.thehost1.com
It is your personal IPS to stop the attack.

Comments

  • MrAgentMrAgent Member Posts: 1,310 ■■■■■■■■□□
    Good luck! I recently failed the exam. I pretty sure I scored a 65, so I was close.
    I don't think there is much in the way of exploit development. As long as you can take an existing exploit and modify it for your needs, you should be okay.

    One thing I did practice on was the buffer overflow module. So if you can practice that and feel comfortable with it, then you should be good to go in that regard.
  • JoJoCal19JoJoCal19 Mod Posts: 2,835 Mod
    Good luck on your quest this time. I've submitted a training request to take it later this year.
    Have: CISSP, CISM, CISA, CRISC, eJPT, GCIA, GSEC, CCSP, CCSK, AWS CSAA, AWS CCP, OCI Foundations Associate, ITIL-F, MS Cyber Security - USF, BSBA - UF, MSISA - WGU
    Currently Working On: Python, OSCP Prep
    Next Up:​ OSCP
    Studying:​ Code Academy (Python), Bash Scripting, Virtual Hacking Lab Coursework
  • impelseimpelse Member Posts: 1,237 ■■■■□□□□□□
    MrAgent wrote: »
    One thing I did practice on was the buffer overflow module. So if you can practice that and feel comfortable with it, then you should be good to go in that regard.

    Yes, that's the part I mean, ESP, EIP,etc, etc, I became lost when they reach the part where our shellcode needs to begin and remove bad characters, etc, etc,

    After to cover all the material with some deep in my weak areas I will purchase two month and see this time.

    The new lab version has a link of the final document example and it is not working, I will email them.
    Stop RDP Brute Force Attack with our RDP Firewall : http://www.thehost1.com
    It is your personal IPS to stop the attack.

  • MrAgentMrAgent Member Posts: 1,310 ■■■■■■■■□□
  • impelseimpelse Member Posts: 1,237 ■■■■□□□□□□
    I think this is the one, I remember to see it long time ago, thanks
    Stop RDP Brute Force Attack with our RDP Firewall : http://www.thehost1.com
    It is your personal IPS to stop the attack.

Sign In or Register to comment.