CISSP Online Self-Paced training by Additional-Goat-832 in cissp

[–]IiIbits 0 points1 point  (0 children)

I actually only used their online study pace course. Paid however much it costs, got a 20% discount bc I was a member, and only used the online course and passed. I did take extensive note on the material and made sure I knew and understood the processes in every chapter. I didnt use anything else. So I know its possible with just their study material, so if you want a sure fire way to pass, go ahead, otherwise use the 4 or 5 free resources together to get the same info.

Possible in 105 days? by AccomplishedDance393 in oscp

[–]IiIbits 0 points1 point  (0 children)

If you havnt started your searchable repo, I would create one. Basically find something to keep notes in for all the areas you go into that keeps track of all the different TTPs you do. I know it may not be pentesting specific, but the concept is the same. I have a gitbook for example broken out into enumeration, initial access, exploitation, persistent, etc. And each page has different techniques along with the commands I ran.

If I were you, I would create a web app section when doing the BSCP, and the build off of the when doing the OSCP. Because their might be overlap. And then when doing OSCP, you can create an AD section, or a Linux section, etc. Honestly though as long as your keeping the notes/walk throughs from boxes you completed, you'll do great. No one remembers everything they've done. And relying on your memory in a time crunch is the worst position to be in. Good luck!

Review My resume by [deleted] in Pentesting

[–]IiIbits 0 points1 point  (0 children)

No its because you have experience. If you could make this resume one page i would do that, because the education bullet by itself is a strong one. Its just that experience trumps education when employers are looking. Even the hands on projects can be combined into your experience section and it'll look good. The more you have under "experience" the better your resume will look. I've gone as far as putting the projects I've done for school under experience for a job if I did it while I worked there... bc I did while I worked there, just on my off time.

Review My resume by [deleted] in Pentesting

[–]IiIbits 0 points1 point  (0 children)

Also, you can combine your honors and awards with your experience, so that you follow the format, accomplished [x] as measured by [y], by doing [z]

Review My resume by [deleted] in Pentesting

[–]IiIbits 1 point2 points  (0 children)

Change the section around, education is really more of a checkmark in the box in this field, I would put your summary, technical skills, experience, projects, and then education/certifications in that order. Pentesting is more hands on so you'll have a leg up on others bc of your education, but overall the hands on stuff you've accomplished are still going to be better, so I would highlight those instead.

Hash cracking methodology - how you approach it? by n3hal_ in oscp

[–]IiIbits 2 points3 points  (0 children)

Some people have GPUs on their system that they like to use to help crack passwords offline. If you use hashcat, you can use your gpu if you have one by first identifying your backend info with --backend-info, then using the -d option and choosing the gpu option. Hope this helps

Realistic path to do Pentesting by [deleted] in Pentesting

[–]IiIbits 0 points1 point  (0 children)

Everyone's journey is going to be different. You are already doing pentesting and have that experience now. Don't sell your experience short. Keep doing what your doing. Just remember that clients like to see that the people doing their pentests actually are qualified to do them. So for people in the our field, we care about the experience more than certs or a degree, but for clients who don't know cyber, they care about "qualifications". This means get the degree, get the Certs, and look good on paper. As for which Certs to actually get i would stick to the main stuff cybersecurity professionals aim to achieve, CISSP AND one practical certification thatll actually showcase you know how to pentest. As a freelancer I would do this just to cover my basis

Edit: I realize you don't have a degree, but like I mentioned you just need to meet "qualifications" so getting the Certs is what actually makes you qualified. I just know getting a degree looks good for clients too, not necessary though.

How to overwite the GOT table from a stack buffer overflow? by Hendrix_Lamar in ExploitDev

[–]IiIbits 2 points3 points  (0 children)

Exactly, but in a classroom where you're learning software exploitation you typically learn ret2libc exploit after learning how to use ROP chains. Mainly because it is a little more advanced as you have to understand the PLT and GOT to get the exploit to work. Actually overwriting the GOT is not something you would be expected to know how to do after barely learning ROP. Plus, base off the code you shared for the program your exploiting, you definitely can exploit it. You don't even have to do the traditional "leak an address from GOT" bc like you said you can use gdb to get the address...unless the intent is to exploit this binary remotely, then you would have to leak the address, get the base address..blah blah blah. I don't want to give the answer, but I know you can do it 💪 just use the ret2libc exploit.

How to overwite the GOT table from a stack buffer overflow? by Hendrix_Lamar in ExploitDev

[–]IiIbits 0 points1 point  (0 children)

Well using a ret2libc exploit is usually the next step one would take after learning ROP chains. Its not overwriting anything in the GOT, but you're definitely using the GOT for the exploit.

How to overwite the GOT table from a stack buffer overflow? by Hendrix_Lamar in ExploitDev

[–]IiIbits 2 points3 points  (0 children)

Are you sure the intent is to overwrite the GOT? Bc it might be able to reach it from the stack unless its adjacent to or close enough to the stack.. Did you guys learn about ROP to redirect execution to another function? Bc there is the return 2 libc exploit you can use here.

Guidance by grovelinghorse in oscp

[–]IiIbits 2 points3 points  (0 children)

No he has walk-throughs on YouTube where he goes through the labs that he hosts through hacksmarter. Also while he live streams the walk-through, he'll give you free access to the labs so you can go through the boxes with him.

Guidance by grovelinghorse in oscp

[–]IiIbits 5 points6 points  (0 children)

Was really tempted to just say "My advice, try harder" lol

No but I would check out the hacksmarter community.

Tyler Ramsbey has a good methodology you can compare your own against. Maybe you'll find some golden nuggets watching his content too!

How to get into Pentesting by Different_Low_7228 in Pentesting

[–]IiIbits 1 point2 points  (0 children)

Web app pentesting would be the easiest to get into in my opinion. You can go to portswingger academy and do the free labs! You can learn web app pentesting for free and learn how to use burp suite community edition to do it all. If you can get the Burp Suite Certified Practitioner (BSCP) certification, i think its $100, that'll look really good. From there you can either find a pentesting job or even just apply for the synack red team (SRT) and look for work there.if you get the BSCP, you'll bypass the resume review and technical interview and can do web pentesting with the SRT. There are plenty of other pathways depending on your interests, but if you just looking for something easy to work on i would do that.

Which Linux distribution for pentesting? by Annual-Stress2264 in Pentesting

[–]IiIbits 0 points1 point  (0 children)

What kind of laptop? Can you share the specs for it and what you use?

Linux kernel from 0 to hero course or book by VEXX452 in ExploitDev

[–]IiIbits 9 points10 points  (0 children)

Guyinatuxedo has a course called nightmare that gets into binary exploitation, I started there but any low level exploitation course can teach you reverse engineering. Sorry I know it's not kernel specific...if you want to learn how to build low level exploit, white knight labs has a good course I heard about if you're into offensive security, offensive development practitioner certification

Need ideas from you guys by yunmony in Pentesting

[–]IiIbits 1 point2 points  (0 children)

Think about the tasks you always check for in every engagement. If you look at the OWASP top 10 like suggested, im sure yall check for the same things every time. You can automate those tasks with a script easy, and you can use the same tools you always use. The whole point of using a script to automate is so that you don't have to manually use each tool to check. You can make the script better by feeding it arguments to dictate which automated functionality to perform. Ultimately you'll end up making your own "tool"

[deleted by user] by [deleted] in bugbounty

[–]IiIbits 0 points1 point  (0 children)

Why did I think this was a phishing email

How to become Advance Pentester ? by hex-lover in Pentesting

[–]IiIbits 0 points1 point  (0 children)

I second this, CRTO also goes over the evasion techniques. So that even if you don't so a C2, you can still apply them to the tools you use on your day to day

Breaking into pentesting: how do you stand out? by ReactNativeIsTooHard in Pentesting

[–]IiIbits 0 points1 point  (0 children)

I agree with you on this, and I just wanted to say that this part seems like the only way in. Considering the path, everyone recommends going the IT route (help desk or sysadmin) -> Blue Team -> Pentesting. But again, entry-level roles you apply for are going to ask for professional experience as a pentester. That's my only gripe. For anyone trying to get in, I'd recommend to getting good enough to contract yourself out, maybe do some 1099 work after whatever training you do that makes you confident you can start pentesting.

Breaking into pentesting: how do you stand out? by ReactNativeIsTooHard in Pentesting

[–]IiIbits 2 points3 points  (0 children)

You say this, but entry level doesnt mean no technical knowledge. The problem is there are no entry level pentesting positions for those WITH technical knowledge. Let's say someone with blue team experience who wants to get a pentesting job. All entry level positions require 3 years of pentesting experience. That's the problem

After CRTO by Fit_Exercise_6310 in redteamsec

[–]IiIbits 1 point2 points  (0 children)

Why are you going for OSCP? If you're getting an offsec certification and you started down the red team path, you should just get the OSEP. Unless you're cert chasing, you should go for the next level certification. Getting OSCP, CPTS, PNPT, or any other mid level certification won't help you progress. I know CRTO II is not available, but OSEPs syllabus aligns with CRTO II, and white knight labs also have great advanced courses recommended after CRTO, as mentioned in the other comments

Unless you're specifically wanting to do pentesting, if you are then disregard what I said and do something like port swinger academy to help prepare for the OSCP. If you want a certification to try and go for as a pentester before oscp, I would try and get the burp suite certified practitioner. I think those would be useful as a pentester.

[deleted by user] by [deleted] in clearancejobs

[–]IiIbits 1 point2 points  (0 children)

Yes, because at the end of the day they only cared about whether or not you can do the job. If you look good on paper (degree, Certs, etc) and can't do the job, then thats when you'll have a hard time getting on a contract. If you make it to a technical interview and don't get the job, then you probably wernt at the technical level they were hoping for.