Explore >> Select a destination


You are here

johnjhacking.com
| | www.offsec.com
2.0 parsecs away

Travel
| | We are going to change the OSCP exam structure to better reflect the PWK materials and the skills needed to be a more well-rounded Penetration Tester.
| | njmulsqb.github.io
4.7 parsecs away

Travel
| | Explore real-world insights from a successful penetration test on an enterprise Active Directory environment. Learn how the domain controllers were compromised within just a few hours using multiple attack vectors. From initial recon to privilege escalation and lateral movement, this case study offers a comprehensive guide to Active Directory security weaknesses and how to fortify them.
| | taeluralexis.com
4.7 parsecs away

Travel
| | In this writeup, we'll exploit a Linux machine on Hack The Box with CVE-2023-46604, leveraging Java deserialization for remote code execution.
| | x0rb3l.github.io
21.7 parsecs away

Travel
| In my last two posts, I discussed my experience with AWAE/OSWE and ETBD/OSEP and how they are two of the trinity in obtaining the coveted OSCE3 certification. This post is aimed at discussing my experience with the third and final course: Windows User Mode Exploit Development (WUMED) and Offensive Security Exploit Developer (OSED) exam. I will also briefly discuss the motivation behind obtaining all three certs within a six-month period.WUMED focuses on identifying vulnerabilites through reverse engineering Windows applications that run in user mode. It takes it a step beyond regular stack-based overflows and teaches you how to bypass common mitigations such as ASLR and DEP. It also teaches you how to create your own custom 32-bit shellcode.You can find out ...