invictus_123 wrote: » How prevelant in the labs was web based hacking? It's (through my own fault) not my best area, obviously I look to improve on this.
adrenaline19 wrote: » I start in two days. Good luck to both of us!
Liindolade wrote: » I wouldn't worry about it. The course material will teach you most of what you need to know about web app attacks. With your existing knowledge, you'll need less time to get through the exploit development material than the average student, which will leave you with enough time for the web app part. Have a look at the OWASP Top 10 and read up on what you don't understand. Practice a bit with something like WebGoat, Damn Vulnerable Web Application, or a web app focused vulnerable VM.
invictus_123 wrote: » Not sure if anyone is reading this but Im going to keep updating it every evening mainly to clear my head.
TheFORCE wrote: » Can you put the names of the boxes you are rooting or having problems with as you go along? A lot of people posting here do the same. Plus it gives us a sense of progression and sense of difficulty when we read and can associate a machine with its name. Will help you remeber stuff easier too if you track the machines by name instead of just box. Keep updating, everyone reads this.
MrAgent wrote: » I didn't think Ghost was all that difficult. That was one of the first boxes I targeted, after Bob of course. Just pay attention to the material and you should be able to compromise it.
Sch1sm wrote: » I have 5 or so systems rooted. I've used metasploit for all of them. I'm not sure how I feel about it. It feels cheap but at the same time I think it makes sense and the course says using metasploit is fine. Do you think it's beneficial to download PoC code and alter it?
rudegeek wrote: » Good job bro! Keep pushing! Which machines have you pwnd so far?
Sheiko37 wrote: » FREEBSD took me the longest so far, and in the end I'm sure I didn't do it the most elegant way possible.