This is meant to be a personal log of study progress toward OSCP certification.
8/31/2017
PWK Videos: 106-110
PWK Readings: pp276-288
Online PW Attacks, PW Hash Attacks, Port Redirection + Tunneling Intro
Additional Studying:
8/30/2017
PWK Videos: –
PWK Readings: –
Additional Studying: SickOs 1.2 – Finished!
8/29/2017
PWK Videos: – 101-105
PWK Readings: pp271-276
Pass the Hash, Password Profiling, Online Password Attacks, Medusa, Ncrack
Additional Studying:
8/27/2017
PWK Videos: 96-100
PWK Readings: pp257-270
SQL Inj Tools, Passwords, Preparing Brute Force
Additional Studying: SickOs 1.1 – Finished!
8/26/2017
PWK Videos: 91-95
PWK Readings: pp245-256
SQL Inj, Auth Bypass, DB Enum, Blind SQL Inj, Interface Restriction Bypass
Additional Studying: SickOs 1.1
8/22/2017
PWK Videos: 86-90
PWK Readings: pp214-243
MS12-037 Client Side Attack, Replacing Shellcode, Java Applets, Local File Inclusion
Additional Studying: Fristileaks 1.3 – Finished!
8/21/2017
PWK Videos: 81-85
PWK Readings: pp206-213
Privilege Escalation Exploits and abusing weak service permissions in Windows/Linux
Additional Studying: The Necromancer (Vulnhub) – 11 of 11 flags – Finished
8/19/2017
PWK Videos: –
PWK Readings: –
Additional Studying: The Necromancer (Vulnhub) – 6 of 11 flags
8/18/2017
PWK Videos: 76-80
PWK Readings: pp195-205
Post-Exploitation File Transfer Methods
Additional Studying:
8/15/2017
PWK Videos: –
PWK Readings: –
Additional Studying: The Necromancer (Vulnhub) – 3 of 11 flags
8/14/2017
PWK Videos: 71-75
PWK Readings: pp185-194
Searching for Exploits, Customizing and Fixing Exploits
Additional Studying: Mr. Robot (Vulnhub) – Finished
8/09/2017
PWK Videos: 66-70
PWK Readings: pp185-187
Working with Exploits, Searching for Exploits
Additional Studying: Mr. Robot (Vulnhub)
8/08/2017
PWK Videos: 61-65
PWK Readings: pp146-184
Buffer Overflows, Win32 Buffer Overflow Exploitation, Linux Buffer Overflow Exploitation
Additional Studying: PowerShell Empire 2.0 Tutorial, VulnOS 2 (Vulnhub)
8/07/2017
PWK Videos: 56-60
PWK Readings: pp146-184
Buffer Overflows, Win32 Buffer Overflow Exploitation, Linux Buffer Overflow Exploitation
Additional Studying: