|
You are here |
johnjhacking.com | ||
| | | | |
siunam321.github.io
|
|
| | | | | Back in November 2024, me and my university CTF team NuttyShell placed champion on PwC's Darklab Hack A Day CTF competition. One of the champion prizes is "Sponsorship of Offensive Security Certified Professional (OSCP) PEN-200 certification (90-day lab access)". Since I already earned OSCP back in 2023, and having a strong interest in web security, I requested the organizer to switch it to OffSec Web Expert (OSWE), which they happily did so! Eventually, I earned OSWE on June 2nd, 2025! | |
| | | | |
www.offsec.com
|
|
| | | | | We are going to change the OSCP exam structure to better reflect the PWK materials and the skills needed to be a more well-rounded Penetration Tester. | |
| | | | |
grahamhelton.com
|
|
| | | | | Introduction I recently passed the eLearnSecurity Junior Penetration Tester (eJPT) exam on December 12th 2020 with an 85% in around 5 hours. The exam is unlike any exam I had taken before as you are placed inside a network you need to exploit instead of just simply answering multiple choice questions. My Background This course was my first foray into the world of penetration testing certifications, however, it is not my first certification. | |
| | | | |
blog.redcrowlab.com
|
|
| | | Much of the time people engage in short term security testing such as penetration tests, vulnerability assessments, code reviews, etc. Often these are 1-2 weeks with some period for reporting. The approach to conducting these sorts of projects typically includes the following types of steps: * Heavy reliance on automated tools | ||