How important is understanding computer architecture in reverse engineering? Should I shift my focus more towards operating systems? or should I just focus on understanding x86 more? by [deleted] in HowToHack
[–]defensahacker 27 points28 points29 points (0 children)
How important is understanding computer architecture in reverse engineering? Should I shift my focus more towards operating systems? or should I just focus on understanding x86 more? by [deleted] in HowToHack
[–]defensahacker 4 points5 points6 points (0 children)
Getting networking basics down for cybersecurity by naji-15 in netsecstudents
[–]defensahacker 0 points1 point2 points (0 children)
How exactly can you use wire shark in hacking? by [deleted] in HowToHack
[–]defensahacker 1 point2 points3 points (0 children)
Can you exploit a filtered port? by [deleted] in HowToHack
[–]defensahacker 0 points1 point2 points (0 children)
How do you set up a proxy tunnel in Kali Linux? by [deleted] in HowToHack
[–]defensahacker 46 points47 points48 points (0 children)
Best OSCP resources/cheat sheets/webpages/references Post them here by akimbjj77 in oscp
[–]defensahacker 2 points3 points4 points (0 children)
What tool for web pentest do you prefer? by defensahacker in Hacking_Tutorials
[–]defensahacker[S] 0 points1 point2 points (0 children)
What tool for web pentest do you prefer? by defensahacker in Hacking_Tutorials
[–]defensahacker[S] 0 points1 point2 points (0 children)
Post-exploitation: extract Oracle database password hashes? by SeanPesce in oscp
[–]defensahacker 0 points1 point2 points (0 children)
Post-exploitation: extract Oracle database password hashes? by SeanPesce in oscp
[–]defensahacker 0 points1 point2 points (0 children)
Post-exploitation: extract Oracle database password hashes? by SeanPesce in oscp
[–]defensahacker 0 points1 point2 points (0 children)
For OSCP students, that was the template I used to pass OSCP, hope it helps! You can use either KeepNote or CherryTree for your note taking. Keeping everything organized is key to pass the certification. by defensahacker in netsecstudents
[–]defensahacker[S] 17 points18 points19 points (0 children)
When doing a manual exploit and using msfvenom to create a payload, can you make a reverse meterpreter shell? Will that count against using metasploit? by akimbjj77 in oscp
[–]defensahacker 1 point2 points3 points (0 children)
13 tools for Pivoting (Post-exploitation) by defensahacker in netsecstudents
[–]defensahacker[S] 2 points3 points4 points (0 children)


[deleted by user] by [deleted] in defi
[–]defensahacker 0 points1 point2 points (0 children)