|
You are here |
blog.kuhi.to | ||
| | | | |
siunam321.github.io
|
|
| | | | | Back in November 2024, me and my university CTF team NuttyShell placed champion on PwC's Darklab Hack A Day CTF competition. One of the champion prizes is "Sponsorship of Offensive Security Certified Professional (OSCP) PEN-200 certification (90-day lab access)". Since I already earned OSCP back in 2023, and having a strong interest in web security, I requested the organizer to switch it to OffSec Web Expert (OSWE), which they happily did so! Eventually, I earned OSWE on June 2nd, 2025! | |
| | | | |
x0rb3l.github.io
|
|
| | | | | In my last two posts, I discussed my experience with AWAE/OSWE and ETBD/OSEP and how they are two of the trinity in obtaining the coveted OSCE3 certification. This post is aimed at discussing my experience with the third and final course: Windows User Mode Exploit Development (WUMED) and Offensive Security Exploit Developer (OSED) exam. I will also briefly discuss the motivation behind obtaining all three certs within a six-month period.WUMED focuses on identifying vulnerabilites through reverse engineering Windows applications that run in user mode. It takes it a step beyond regular stack-based overflows and teaches you how to bypass common mitigations such as ASLR and DEP. It also teaches you how to create your own custom 32-bit shellcode.You can find out ... | |
| | | | |
www.jenkins.io
|
|
| | | | | The Jenkins project's response to a critical security vulnerability in the "Spring" framework. | |
| | | | |
hub.dragos.com
|
|
| | | Be the first to navigate the future of OT cybersecurity with the latest industrial threats and strategic recommendations. Register now ? | ||