*FUD also stands for “Fully UnDetectable”, which describes malware that evades the bulk of commercially used antivirus products. PEN-300 naturally continues where PEN-200 leaves off, for more advanced techniques. After all, OSCP skills alone will not beat modern mitigations; we must try harder. What Do I Really Need Before PEN-300? There has been a trend…
Category: Penetration Testing
Legacy OSCE: It’s Not Just an Alphabet Soup
A few weeks after I signed up for Cracking the Perimeter (CTP), CTP was retired. Some infosec friends thought I got the short end of the stick, because the course content had not changed in a long while. That is half-true; newer exploit development techniques are now in the while, and CTP only covers the…
The CRTP Review
I think the Pentester Academy site has covered the syllabus of the Certified Red Team Professional (CRTP) which is somewhat of a misnomer because today’s definition of red-teaming goes far beyond what this course covers: Active Directory penetration testing and defence techniques. Note that the attack methodology and tips given by the instructor, Nikhil Mittal,…
The AWAE/OSWE Journey: A Review
Students who are familiar with the PWK/OSCP understand that the field of penetration testing is broad, and at times, overwhelming because there is a lot to learn. Does the AWAE/OSWE come across as significantly less broad? Well, not exactly, because web applications are extremely diverse. Let us take the white box/black box approach to examine…
Pre-OSWE Jitters
Dear Offsec, I’ve never quite felt such a magnitude of ph33r in any examination so far, but the thought of facing a L100 behemoth for 48 hours in a week’s time is frightening indeed. I was a L10 servant in infosec before the AWAE course, and now I’m barely a L30 archer. Spending countless days…
Building Vulnerable Machines: Part 3 — JOY is More Than One (Machine)
(If you have not read Part 2, please click here.) Let us now extend what we did in Parts 1 and 2 to more than one machine. After all, one machine teaches one set of skills; multiple machines can cover a range of skills. This, in effect, is building a cyber range. Before we jump…
Building Vulnerable Machines: Part 2 — A TORMENT of a Journey
(If you have not read Part 1, you should have a look at it here.) DISCLAIMER: If you would like to try the TORMENT machine and root it (this is currently pending Vulnhub publication), please download a copy of the machine here. Do NOT read beyond this disclaimer because this will be a full post…
Building Vulnerable Machines: Part 1 — An Easy OSCP-like Machine
Apologies for the delay; I have been away on a “pseudo-holiday”, or “service break” — I’ve been wanting to write something security-related this month, but found myself a little out of time. This series will be broken into three parts. Part 1: General Design Principles Part 2: Building a Machine (with an example) Part 3:…
Another Year?
“So, what are your resolutions for the new year?”“I shall think about it tomorrow, on New Year’s Day.” Ok, now that it is New Year’s Day, now what? First, let us perhaps take stock of some of the key resolutions. There were hits and misses. Passing the OSCP. A hit after plenty of sufferance. 🙂…
A Digression: The Offensive Security Certified Professional (OSCP) — Part 3 of 3
#offsec #pentest #training #tryharder Say “try harder”… Here I will deviate from most typical OSCP reviews and discuss a little about creating machines. If we can break machines and obtain administrator privileges, can we create them? One way to get good at a subject is to approach it from different perspectives. For instance, we peer-tutor…