|
You are here |
www.schellman.com | ||
| | | | |
siunam321.github.io
|
|
| | | | | Back in November 2024, me and my university CTF team NuttyShell placed champion on PwC's Darklab Hack A Day CTF competition. One of the champion prizes is "Sponsorship of Offensive Security Certified Professional (OSCP) PEN-200 certification (90-day lab access)". Since I already earned OSCP back in 2023, and having a strong interest in web security, I requested the organizer to switch it to OffSec Web Expert (OSWE), which they happily did so! Eventually, I earned OSWE on June 2nd, 2025! | |
| | | | |
johnjhacking.com
|
|
| | | | | OSCP Reborn - 2023 Exam Preparation Guide Prologue Many of you are likely aware that the Offensive Security Certified Professional Exam was revised, with the changes officially published on January 11, 2022. The old version of the exam required the student to perform a buffer overflow attack (it still may end up on your exam, but is not a guarantee). Since then, the model has shifted towards an active directory model which is more aligned with modern day penetration testing.... | |
| | | | |
x0rb3l.github.io
|
|
| | | | | In my last two posts, I discussed my experience with AWAE/OSWE and ETBD/OSEP and how they are two of the trinity in obtaining the coveted OSCE3 certification. This post is aimed at discussing my experience with the third and final course: Windows User Mode Exploit Development (WUMED) and Offensive Security Exploit Developer (OSED) exam. I will also briefly discuss the motivation behind obtaining all three certs within a six-month period.WUMED focuses on identifying vulnerabilites through reverse engineering Windows applications that run in user mode. It takes it a step beyond regular stack-based overflows and teaches you how to bypass common mitigations such as ASLR and DEP. It also teaches you how to create your own custom 32-bit shellcode.You can find out ... | |
| | | | |
blog.val.town
|
|
| | | Missing permissions-checking in our internal save endpoint | ||