Well, it's Sunday and I promised a report on how the OSCP stuff is going -
So far so good.
I am sticking to the plan I outlined in my last report, mostly; I fell a little behind yesterday because of some family stuff but I will catch up today and tomorrow. Working through the buffer overflow chapters at the moment.
I am already starting to see a way to tie some of this stuff in with work too (I mean even before I walk in and say hey I am an OSCP give me a raise). I mentioned a couple weeks ago I am building a VM lab at work for training / testing configurations. One of the questions has been what vulnerable VMs to put on the "corporate" segment (not real corporate but the segment we are going to attack), well this site has a list of machines, on Vulnhub, that have similar vulnerabilities to the machines in the OSCP labs. (found via this site). I knew about vulnhub already of course, and plnned to use some of their images already, this just ties stuff together a little.
Apparently Mitre is cross referencing attack data , collected on the ATT&CK platform , with open source intel (OSINT) to create playbo...
Next week will be 25% of the planned 52 week run. I'll let you guys decide, stop or keep going?
So again today I am seeing all sorts of tweets about how great Mad Max - Fury Road is. Most revolving around the fact that Furiousa was a k...
Signed up for the Pentesting with Kali Linux course from Offensive Security. Going to try for my OSCP. If anyone has any hints, not chea...