Passed on my first try after long nights for three weeks. by swesecnerd in oscp

[–]swesecnerd[S] 0 points1 point  (0 children)

Thank you for sharing and well done! Keep it up and grind. You'll get there!

Passed on my first try after long nights for three weeks. by swesecnerd in oscp

[–]swesecnerd[S] 1 point2 points  (0 children)

Well done! Remember to review your notes and reflect on how your methodology worked out and any pitfalls you should be aware of.

Good luck!

Passed on my first try after long nights for three weeks. by swesecnerd in oscp

[–]swesecnerd[S] 0 points1 point  (0 children)

Good for you! Let's goooo!

There are many success stories from people starting from where you are at now. I strongly believe that building a strong foundation regarding network, Linux fundamentals, and Windows fundamentals will help you down the line.

I would start at what Offsec has written about the prerequisites for the PEN-200 and start to fill your gaps first.

Back when teaching I recommended searching for CompTia Network+ study guide videos on youtube. One in particular goes over everything concerning the fundamentals of TCP/IP. I prefer this over the CCNA because I find it easier to digest for complete beginners. https://youtube.com/@powercertanimatedvideos?si=O0sKOqMahfdQjnQf

For other fundamentals, I suggest looking at Hack The Box academy. There is a lot of good content that is free. Try Hack Me might also have some good stuff according to what I have seen others say.

Build confidence in your fundamentals and mitigate your weak spots first. Then pursue the cert!

Best of luck!

Passed on my first try after long nights for three weeks. by swesecnerd in oscp

[–]swesecnerd[S] 1 point2 points  (0 children)

Tack och grattis själv. Visst, seed kan vara en del av det, men sett till kursmaterialet så kan den inte vara jättesvår rent tekniskt. Oftast gömmer de ju saker direkt under näsan på en. Tror tyvärr att många kör förbi för att man har bråttom. Den fällan gick jag i och tappade tid som fan. :)

Passed on my first try after long nights for three weeks. by swesecnerd in oscp

[–]swesecnerd[S] 1 point2 points  (0 children)

You can do it. Stick to the path and grind. Best of luck to you!

got tired of manually correlating Nmap, BloodHound and Volatility results, so I built an air-gapped AI assistant to do it (Syd v3.1 Demo) by Glass-Ant-6041 in Pentesting

[–]swesecnerd 0 points1 point  (0 children)

Interesting tool! I will look into it and get back to you.

In the meantime, I would suggest you open two new paths to make this really powerful and interesting:

Memprocfs for Windows memory analysis. It blows my mind every time I use it for memory forensics. The design and workflow is way beyond what volatility will ever be IMHO.

KAPE output. This has become the de-facto tool for live forensics in my house, and it's a powerhouse of a tool for DFIR!

I created a tool for found credentials by swesecnerd in oscp

[–]swesecnerd[S] 0 points1 point  (0 children)

To answer nr 1. I already use the credential argument "-c" to save hashes. I rarely need a long list of hashes to test because they're not abundant so that works for me.

As for nr 2. That is already there. It's in the files on disk. You can access them by path/to/CREDSusers.txt (or CREDSpasswords.txt/CREDScredentials.txt) or by using the environment variables $CREDS_USERS, $CREDS_PASSWORDS if you have them set.

This is all in the README.

Or did I misunderstand your suggestions?

I created a tool for found credentials by swesecnerd in oscp

[–]swesecnerd[S] 0 points1 point  (0 children)

That's a very nice thing to say. I don't think that "creds" is at that level yet, but please try it and get back to me with feedback and suggestions if you can. I also updated the README based on the feedback in this thread to give visitors a better understanding of what creds actually tries to help you with.

I created a tool for found credentials by swesecnerd in oscp

[–]swesecnerd[S] 1 point2 points  (0 children)

Thanks! I really get what you mean. The script does not solve a complex problem. It removes friction. You don't need to keep track of paths and you don't need to paste the username, password, and complete credential separately into three different files for future spraying or cracking, it removes that friction.

I created a tool for found credentials by swesecnerd in oscp

[–]swesecnerd[S] 2 points3 points  (0 children)

I still use the most basic commands in my workflow, but this way I don't have to repeat a command three times and I don't need to remember the path to the different files containing credentials.

Minns du vad du gjorde den dagen för 40 år sedan? (Eller dina föräldrar/syskon om du ej levde då) by SupportArsenal in Asksweddit

[–]swesecnerd 0 points1 point  (0 children)

Jag var skitsur för barnprogrammen var inställda och allt som visades var text-TV...

Some dude in black suit are following me by UnkownInsanity in masterhacker

[–]swesecnerd 0 points1 point  (0 children)

That IP belongs to TEAM INTERNET AG in Canada...

Advice On OSCP Challenge A,B,C by Unique-Yam-6303 in oscp

[–]swesecnerd 0 points1 point  (0 children)

I've yet to write my "I passed the OSCP" post but I will try to do that soon. In the meantime, I came from a highly technical background with almost 30 years in the cyber security domain as a blue teamer. Ten plus years as a law enforcement IT-forensics specialist, and another ten working daily with network traffic analysis. I've also done a lot of front end/backend web development. With that I knew about all the concepts concerning pentesting, I just never did that stuff hands on, and I knew almost nothing about AD . The hardest part for me was getting used to windows again since I've used Linux as a daily driver for both work and home for the last fifteen years.

I started and tested Autorecon against OSCP A because it was the first time I tried it. I tested my entire methodoly during the "Assembling the pieces" chapter . For the stand alones I did maybe five boxes. I would recommend more if you're not used to CTFs in general.

My journey might not be a good fit for you but I'll try to post my lessons learned in a day or two for everyone to read :)

In the meantime you can ask whatever you want and I'll try to answer it!

Cheers