Fork me on GitHub

Passing OSCP Exam Attempt #3



Offensive Security OSCP Logo


Disclaimer

I *PASSED* my third OSCP exam attempt. This is more just a post detailing my new experiences the third time around.

OSCP Exam Attempt #2


Disclaimer

I failed my second OSCP exam attempt. This is more just a post detailing my new experiences the second time around. Additionally, I’ll be adding to the take-aways from my first attempt.

OSCP Exam Attempt #1

Disclaimer: 

I failed my first OSCP exam attempt. This is more just a post detailing my experiences and take aways from this OSCP exam attempt.

ch4inrulz: 1.0.1 Vulnhub Walkthrough

ch4inrulz: 1.0.1Vulnhub Walkthrough

WARNING: There will be spoilers to ch4inrulz: 1.0.1 VM from Vulnhub. This is your warning! If you wish to penetration test this machine, do not scroll down much further.

The ch4inrulz: 1.0.1 Vulnhub VM was rather fun to dissect. There were some tricks embedded into the VM to throw one off which certainly got me for quite a bit.

The ch4inrulz: 1.0.1 Vulnhub VM download can be found here: https://www.vulnhub.com/entry/ch4inrulz-101,247/

Wire App: Bot Registration Scripts

Registering a bot with Wire Secure Messaging Services

You may be attempting to register your bot with the backend of Wire's secure messaging service. 

On most of the Wire github repositories for the various bots that have been developed, they all make mention of adding the "Don" bot or the "DevBot" in order to register your bot with their service.

Unfortunately, the "Don" bot as far as I am aware has been moved to Wire's Secure Messaging Teams. The "DevBot" I don't really know all that much about.

So you still might be wondering, how on earth do I register my service? Well during my scouring of the Wire repositories on github I came across a few shell scripts created by Dejan Kovacevic whom has created the Java based bot.

Blacklight Vulnhub Walkthrough

Blacklight Vulnhub VM

Blacklight Vulnhub Walkthrough

WARNING: There will be spoilers to Blacklight VM from Vulnhub. This is your warning! If you wish to penetration test this machine, do not scroll down much further.

The Blacklight Vulnhub VM was a rather short and simple system to pen test but may have a few tricks to it as well as rabbit holes.  There were a few flags but I just wanted to obtain root. As such, the flags will not be listed in this particular walkthrough.

The Blacklight Vulnhub VM download can be found here: https://www.vulnhub.com/entry/blacklight-1,242/

Basic Pentesting 1 Walkthrough

WARNING: There will be spoilers to Basic Pentesting 1 VM from Vulnhub. This is your warning! If you wish to penetration test this machine, do not scroll down much further.

 The Basic Pentesting 1 VM download from Vulnhub can be found here: https://www.vulnhub.com/entry/basic-pentesting-1,216/

Here's the basic description:

This is a small boot2root VM I created for my university’s cyber security group. It contains multiple remote vulnerabilities and multiple privilege escalation vectors. I did all of my testing for this VM on VirtualBox, so that’s the recommended platform. I have been informed that it also works with VMware, but I haven’t tested this personally.

Bob 1.0.1 Walthrough

Bob Vulnhub VM
WARNING: There will be spoilers to Bob 1.0.1 VM from Vulnhub. This is your warning! If you wish to penetration test this machine, do not scroll down much further.

 The Bob 1.0.1 VM download from Vulnhub can be found here: https://www.vulnhub.com/entry/bob-101,226/

The creator of this VM is c0rruptedb1t

Here's the basic description:

Difficulty: Beginner/Intermediate


Bob is my first CTF VM that I have ever made so be easy on me if it's not perfect.