OSCP Journey Part 4

Day 7
PDF: 2/3
Videos: 3/4 
Boxes: 0
Networks:1

One week down and I have been concentrating on getting the exercises completed have made good progress. I’ve skipped over the Buffer Overflow part of the PDF as I know this is all new learning for me and I want to complete as much of the PDF and exercised before I attempt to assimilate that information.

I have been spending some time using The PenTest Workshop pentest.ws and going to try to use this as much as possible to help document my exploration of the Megacorpone network. The developer is actively working on it, adding new features and has been very open to suggestions. Check out the app in action PenTest Workshop YouTube Channel

I have still to pop a box but I’m not letting that get me down as I haven’t poked any at great length yet. My nmap skills are great now. It’s such a powerful tool, now I know why people call it the swiss army knife for admins.

Also a useful tip I picked up through Pentest.ws. When working on a machine type

 export ip=123.123.123.123

obviously change the ip address to whatever machine you’re working on. That way you can do $ip to refer to the ip address.

For example:

 nmap $ip

If you open another tmux windows you need to type this in again.

rowbot

Share

Leave a Reply

Your email address will not be published. Required fields are marked *

Post comment

This site uses Akismet to reduce spam. Learn how your comment data is processed.