1lrocks1l.rocks·Oct 18, 2024Getting started or finishing the OSCP (PEN-200) courseIntroduction First of all, I’d like to share that I have submitted my exam and the report. From now on, it's just waiting for the results and praying that the results are good. The paranoia is getting there. NOTE: I did receive the certificate :) The...pen200
b1d0wsb1d0ws.hashnode.dev·Oct 1, 2024OSWE: A Detailed ReviewIntroduction Hello! In this article, I'm going to share my journey towards OSWE certification, in the hope that it can help you in some way. As I'm going to be long-winded, if you prefer a quick answer, I recommend using the table of contents to go d...186 readsPosts#cybersecurity
Joao Paulo Guedesth3g3ntl3m4n.hashnode.dev·Jul 14, 2024Baby - VulnlabEnumeration We started executing a full port scan on the host. ╭─[us-free-3]-[10.8.2.220]-[th3g3ntl3m4n@kali]-[~/vulnlab/baby] ╰─ $ sudo nmap -v -sS -Pn -p- 10.10.98.130 --min-rate=300 --max-rate=500 Now, we execute a port scan only on the open por...jpfdevs cybersec
Ghassan Amaimiaghassanamaimia.hashnode.dev·Jul 9, 2024OSCP Journey - TJ_Null Escape :I - Introduction : In this blog post, we will explore a comprehensive penetration test conducted on the target machine (Escape from HachTheBox) . The objective of this assessment is to identify potential vulnerabilities, exploit them, and ultimately ...cyber security
Joao Paulo Guedesth3g3ntl3m4n.hashnode.dev·Jan 25, 2024Seal - Hack The BoxReconnaissance First, we start with a full port scan to verify all possible open ports. ─[us-dedivip-1]─[10.10.16.200]─[jpfguedes@htb]─[~/htb/Seal] └──╼ [★]$ sudo nmap -v -sS -Pn -p- 10.10.10.250 PORT STATE SERVICE 22/tcp open ssh 443/tcp op...60 readsoffensivesecurity
Luc Dacharyluch.hashnode.dev·Jan 24, 20242024 AD — He Learnt to Hack with OffSecMy name is Luc. I am a 33 years old French software engineer, living in France. A couple months ago I started studying OffSec's PEN-200 course (Penetration Testing with Kali Linux) and here I'm telling you a bit about it, along with my 2024 goals. I ...89 readshacking
Taditadisec.com·Nov 20, 2023How I Studied For The OSWEToday, I'm bringing you a mostly unscripted, chill review of my journey through the OSWE (Offensive Security Web Expert) certification. No need to strap in, because this will not be a long one - I'm just rolling off the dome, sharing my experiences a...1.1K readsBlogOSWE
Pradip Deyp3ntesterinstanc3.hashnode.dev·Oct 2, 2023Clicker HTB Writeup / WalkthroughThe “Clicker” machine is created by Nooneye. This is a medium HTB machine with a strong emphasis on NFS and PHP Reverse Shell. This machine was very challenging for me & finally, I owned the system. So, let's get started...... Enumeration Using Nmap ...672 readshackthebox machine
Christian Spirosudopls.hashnode.dev·Aug 18, 2023Proving Grounds Walkthrough: AstronautOffsec Rating: Easy - Community Rating: Intermediate I'd agree with the Offsec rating on this one. I decided to complete this box as part of my ongoing quest to hack one machine a day. It's a new habit but I am hoping that completing writeups will ke...100 reads#walkthrough
Nee4pfsec.com·May 21, 2023OSWP - Foundational Wireless Network Attacks - Review (2023)Introduction Greetings, fellow cyber peoplez! Just wanted to give you guys some insight into my journey towards earning the Offensive Security Wireless Professional (OSWP) certification. In this blog post, I will take you through some of my experienc...1 like·2.6K readswireless network