OSCP prep - Machine walkthrough & avoiding rabbit holes and report taking techniques

  Рет қаралды 2,834

redfire359

redfire359

Күн бұрын

Bit of a longer video today, but I am going through the seppuku machine on PGP and walking through note taking techniques for an OSCP exam report. Thanks for watching!

Пікірлер: 20
@pwolbrycht
@pwolbrycht 6 күн бұрын
Fantastic walkthrough, thank you.
@Dadstin
@Dadstin 3 ай бұрын
🔥 nice, i just did this box. Loved the commentary, i take my oscp this Friday
@redfire-359
@redfire-359 3 ай бұрын
Good luck!
@jdgdd2ad
@jdgdd2ad 2 ай бұрын
Did you pass?
@ellerionsnow3340
@ellerionsnow3340 12 күн бұрын
The minute you put vim in I screamed. Great video though.
@sandeepd145
@sandeepd145 3 ай бұрын
Please make video on report writing
@AUBCodeII
@AUBCodeII 3 ай бұрын
Thank you very much for making this video, bro. I'm currently doing retired HTB boxes to train for the OSCP exam. So far I've completed almost 50. How many PWK lab machines have you completed before taking the OSCP exam?
@iSgapetti
@iSgapetti 3 күн бұрын
26:13 what is the proof-of-concept section of the report for? Is it the PoC for exploit code? So in this case, that would be N/A?
@redfire-359
@redfire-359 3 күн бұрын
Yes its for the code you use, and yeah if its not a program (i.e. manual exploitation) there's no code so you can put N/A. For code you get from github you can just include the link and maybe a code snippet if you had to modify something.
@mafiadaniel94
@mafiadaniel94 3 ай бұрын
Does the OSCP exam has this many rabbit holes as well? The challenge machines OSCP A B and C weren't that full of rabbit holes.
@redfire-359
@redfire-359 3 ай бұрын
Depending on the exam you get, yes there could be a couple, I don't know exact numbers. And Offsec doesn't always put them in there intentionally but sometimes its just easy to get tunnel visioned on a port or service if its out of date, looks like it has an exploit available, etc.
@kodeish
@kodeish 2 ай бұрын
Could you please share your notes? I liked how they were organized. It's okay to remove any OSCP copyright stuff
@cedrOcs
@cedrOcs Ай бұрын
Isn't enum4linux prohibited on oscp?
@spoon2k
@spoon2k 3 ай бұрын
Is this machine retired on PG? I can't find it. Subbed!
@redfire-359
@redfire-359 3 ай бұрын
Yeup its still in the providing grounds play VM list, you could also get it here www.vulnhub.com/entry/seppuku-1,484/ Thanks for the sub!
@Siik94Skillz
@Siik94Skillz 2 ай бұрын
Budddy... It's proving grounds! Good video, tho ​@redfire-359
@ver4576
@ver4576 Ай бұрын
If this is supposed to be "easy" and a actual OSCP machine would be "hard" then I'm giga F*d, this did not look easy at all and the rabbit holes would ruin me
@phillydee3592
@phillydee3592 Ай бұрын
Go for the low hanging fruit first..
@fatewalker6463
@fatewalker6463 3 ай бұрын
I have a question, I've made a lot of command alias and custom scripts to automate recon tasks, do I have to provide all my command alias and scripts code in the report? Would appreciate to get a reply
@ArvindJuneja
@ArvindJuneja Ай бұрын
I mean the report require that someone else using it should be able to „root the box” doing all steps included. If you skip some parts that is not filling up the requirements and goal of the reporting part
Everyone Is Confused About the OSCP+
7:47
Tib3rius
Рет қаралды 4,9 М.
PGP walk through - Ha-natraj (auth.log poisoning)
27:20
redfire359
Рет қаралды 129
Офицер, я всё объясню
01:00
История одного вокалиста
Рет қаралды 5 МЛН
إخفاء الطعام سرًا تحت الطاولة للتناول لاحقًا 😏🍽️
00:28
حرف إبداعية للمنزل في 5 دقائق
Рет қаралды 48 МЛН
My Hacking Methodology for OSCP
51:25
ByteSized Security
Рет қаралды 9 М.
Pivoting through multiple subnets with Ligolo
13:55
redfire359
Рет қаралды 1,4 М.
Conquering The OSCP
11:41
0x3_Security
Рет қаралды 660
This Active Directory Method Helped Me Pass OSCP
21:25
Elevate Cyber
Рет қаралды 21 М.
OSCP: From FAIL to FULL points - My Top 20 Tips
25:47
Mike Gropp
Рет қаралды 16 М.
The Value of Source Code
17:46
Philomatics
Рет қаралды 63 М.
My most informative video yet! Let's build ourselves a Linux!
30:40
When you Accidentally Compromise every CPU on Earth
15:59
Daniel Boctor
Рет қаралды 834 М.
This Zsh config is perhaps my favorite one yet.
17:24
Dreams of Autonomy
Рет қаралды 227 М.
Signals. I spent 2 years to understand this part.
21:24
kimylamp
Рет қаралды 237 М.
Офицер, я всё объясню
01:00
История одного вокалиста
Рет қаралды 5 МЛН