mastodon.gamedev.place is one of the many independent Mastodon servers you can use to participate in the fediverse.
Mastodon server focused on game development and related topics.

Server stats:

5.1K
active users

#oscp

0 posts0 participants0 posts today
Kayla Eilhart (en)<p>I'm studying for <a href="https://gts.eilhart.cz/tags/cissp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CISSP</span></a> after 9 years of being <a href="https://gts.eilhart.cz/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> practitioner and 24 years of working in IT as a whole.<br><br>Some questions/theory in there is so old that it hurts (and I can totally imagine how the course may be hard for youngsters who for example never have seen nor erased an EPROM with UV light).<br><br>Some parts are hard for me as an European, because I didn't deal much with US laws and standards and have to memorize them now.<br><br>Some parts are just tiring as I am constantly re-learning them and forgetting again over the years, like the subtle differences between various roles in data management or the many abbreviations which are variations on the same in different contexts - many key indicators, formulas etc.<br><br>TL;DR: I hope I'll pass and then don't need to repeat it for a few years... I don't like certifications, but in this world, they're a handy proof of "knowledge" or at least of ability to memorize a lot of stuff.<br><br>Also, a friend of mine is trying to persuade me to go for <a href="https://gts.eilhart.cz/tags/oscp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OSCP</span></a> - and that one is something I'm both intrigued with and afraid of it 😄</p>
Christopher Bauer :debian: :i3wm: :blobcatthinkingglare:<p>Hello kind people of Mastodon! Mastodon is a big part of my life, so I'm going to give finding work here a go as well.</p><p>I'm looking for a junior penetration tester or cyber security analyst role. Should you have any leads, or simply be able to provide info, please reach out.</p><p>To give you a thumbnail background sketch: I'm a former Lecturer in Anthropology pivoting to Cyber Security. I recently passed the <a href="https://infosec.exchange/tags/OSCP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OSCP</span></a> and loved it. I have interests in writing and advising to make pentesting more accessible, IoT pentesting, and purple team work.</p><p>While I am looking for a first role, I'm open to freelance, contract, and part-time roles. I'm located in Seattle, though remote is welcome.</p><p>Boosts will be noted and the favor returned in due course!</p><p>Thanks everyone.</p><p><a href="https://infosec.exchange/tags/fedihireme" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fedihireme</span></a> <a href="https://infosec.exchange/tags/fedihire" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fedihire</span></a> <a href="https://infosec.exchange/tags/fedijobs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fedijobs</span></a> <a href="https://infosec.exchange/tags/getfedhired" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>getfedhired</span></a> <a href="https://infosec.exchange/tags/jobhunt" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>jobhunt</span></a> <a href="https://infosec.exchange/tags/gethired" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>gethired</span></a></p>
Josh M | Wham<p>Something quite wonderful occurred at <a href="https://infosec.exchange/tags/bluehat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bluehat</span></a> 2024. </p><p>Caught up with a former mentee I worked with on getting their <a href="https://infosec.exchange/tags/OSCP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OSCP</span></a>. They shared they are now in a masters program and doing amazing things at work, and loving it. This lit up my heart and sparkles. </p><p>Helping others achieve their goals and reach for things they might not have, is an honor and a privilege to be a part of. </p><p>Needless to say.. an excellent time at <a href="https://infosec.exchange/tags/bluehat" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bluehat</span></a>. Great to reconnect with good humans, some good content, and a whole heap of recharging my hacker heart.</p><p><a href="https://infosec.exchange/tags/mentoring" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mentoring</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
A feral Natalie<p>Unintended lesson of working towards my <a href="https://infosec.exchange/tags/oscp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>oscp</span></a> - I’ve done more <a href="https://infosec.exchange/tags/python" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>python</span></a> 2 coding than I have in like five years. Corporate realism, very much yes. Joyful programming, not so much.</p>
Christopher Bauer :debian: :i3wm: :blobcatthinkingglare:<p>I PASSED! <a href="https://infosec.exchange/tags/OSCP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OSCP</span></a> </p><p>I know I've been quiet on mastodon for a while. I'd been doing a lot of hack the box/try hack me CTFs to stay sharp. Whoo goodness, I'm pretty relieved. Hope to do so more posting on my fav social media now.</p><p>Thanks to all who believed a qualitative researcher could do <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a>.</p>
Linux TLDR<p>How to Attach an Executable File to Your Email (Works on Gmail)<br><a href="https://noc.social/tags/Linux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Linux</span></a> <a href="https://noc.social/tags/KaliLinux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KaliLinux</span></a> <a href="https://noc.social/tags/Hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hacking</span></a> <a href="https://noc.social/tags/OSCP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OSCP</span></a> <a href="https://noc.social/tags/SysAdmin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SysAdmin</span></a> <a href="https://noc.social/tags/Security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Security</span></a><br><a href="https://linuxtldr.com/attach-an-executable-file-to-email/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">linuxtldr.com/attach-an-execut</span><span class="invisible">able-file-to-email/</span></a></p>
Marco Ivaldi<p>I'd like to share some of my projects that are hosted on <span class="h-card" translate="no"><a href="https://infosec.exchange/@github" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>github</span></a></span>. Let's start with my public <a href="https://infosec.exchange/tags/exploits" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploits</span></a> that span more than two decades of <a href="https://infosec.exchange/tags/pwning" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pwning</span></a>.</p><p><a href="https://github.com/0xdea/exploits" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/0xdea/exploits</span><span class="invisible"></span></a></p><p>"You can't argue with a root shell." -- Felix "FX" Lindner</p><p>Probably the most known is raptor_udf.c that targets <a href="https://infosec.exchange/tags/MySQL" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>MySQL</span></a> (those of you who solved the <span class="h-card" translate="no"><a href="https://infosec.exchange/@offsec" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>offsec</span></a></span> <a href="https://infosec.exchange/tags/OSCP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OSCP</span></a> training labs should recognize it).</p><p>My favorite is still raptor_rlogin.c, a glorious <a href="https://infosec.exchange/tags/Solaris" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Solaris</span></a> <a href="https://infosec.exchange/tags/RCE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RCE</span></a> from the early 2000s. Take your pick!</p>
willc<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@offsec" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>offsec</span></a></span> It feels like you just devalued OSCP for people who already have it by making "OSCP+" seem like something better. Maybe not your intention, but that is and will be the perception. I am not a fan.<br><a href="https://infosec.exchange/tags/oscp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>oscp</span></a> <a href="https://infosec.exchange/tags/offsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>offsec</span></a></p>
Keith Hoodlet :verified: :donor:<p>🤣 OSCP+ 💰 </p><p><a href="https://infosec.exchange/tags/OSCP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OSCP</span></a> <a href="https://infosec.exchange/tags/offsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>offsec</span></a></p>
SnoopGod Linux<p>Experts Uncover New Evasive SquidLoader Malware Targeting Chinese Organizations<br><a href="https://infosec.exchange/tags/GPEN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GPEN</span></a> <a href="https://infosec.exchange/tags/Hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hacking</span></a> <a href="https://infosec.exchange/tags/OSCP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OSCP</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> <a href="https://thehackernews.com/2024/06/experts-uncover-new-evasive-squidloader.html?m=1" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">thehackernews.com/2024/06/expe</span><span class="invisible">rts-uncover-new-evasive-squidloader.html?m=1</span></a></p>
SnoopGod Linux<p>Hackers Abuse Windows Search Functionality To Deploy Malware<br><a href="https://infosec.exchange/tags/DarkWeb" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DarkWeb</span></a> <a href="https://infosec.exchange/tags/Infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Infosec</span></a> <a href="https://infosec.exchange/tags/CTI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CTI</span></a> <a href="https://infosec.exchange/tags/OSINT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OSINT</span></a><br><a href="https://infosec.exchange/tags/CEH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CEH</span></a> <a href="https://infosec.exchange/tags/CPT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CPT</span></a> <a href="https://infosec.exchange/tags/GPEN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GPEN</span></a> <a href="https://infosec.exchange/tags/Hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hacking</span></a> <a href="https://infosec.exchange/tags/OSCP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OSCP</span></a> <a href="https://infosec.exchange/tags/snoopgodlinux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>snoopgodlinux</span></a> <a href="https://infosec.exchange/tags/Ubuntu" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ubuntu</span></a> <a href="https://cybersecuritynews.com/hackers-abuse-windows-search/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">cybersecuritynews.com/hackers-</span><span class="invisible">abuse-windows-search/</span></a></p>
SnoopGod Linux<p>Penetration Testing Accreditation Guide for Aspiring Professionals<br><a href="https://infosec.exchange/tags/CEH" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CEH</span></a> <a href="https://infosec.exchange/tags/CPT" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CPT</span></a> <a href="https://infosec.exchange/tags/GPEN" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>GPEN</span></a> <a href="https://infosec.exchange/tags/Hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hacking</span></a> <a href="https://infosec.exchange/tags/OSCP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OSCP</span></a> <a href="https://infosec.exchange/tags/Pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Pentesting</span></a> <a href="https://infosec.exchange/tags/PenTestPlus" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PenTestPlus</span></a> <a href="https://snoopgod.com/2024/05/20/penetration-testing-accreditation-guide-for-aspiring-professionals/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">snoopgod.com/2024/05/20/penetr</span><span class="invisible">ation-testing-accreditation-guide-for-aspiring-professionals/</span></a></p>
Vern McCandlish<p>Damn "Then, I show several novel techniques I used to drop a universal root shell on nearly all Linux kernels between at least v5.14 and v6.6.14 (unpriv userns required) without even recompiling the exploit."</p><p> <a href="https://pwning.tech/nftables/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">pwning.tech/nftables/</span><span class="invisible"></span></a></p><p>Great news for anyone taking the <a href="https://infosec.exchange/tags/OSCP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OSCP</span></a> this week and needing to pop root on a Linux box.</p>
David Bombal<p>The best Hacking Courses &amp; Certs? <br>Your 2024 roadmap to Pentester success.</p><p>YouTube video: <a href="https://youtu.be/10P4aoXdXTI" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">youtu.be/10P4aoXdXTI</span><span class="invisible"></span></a></p><p><a href="https://infosec.exchange/tags/cyber" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cyber</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/informationsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>informationsecurity</span></a> <a href="https://infosec.exchange/tags/oscp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>oscp</span></a> <a href="https://infosec.exchange/tags/pnpt" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pnpt</span></a> <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://infosec.exchange/tags/hack" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hack</span></a> <a href="https://infosec.exchange/tags/hacker" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacker</span></a> <a href="https://infosec.exchange/tags/hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hacking</span></a> <a href="https://infosec.exchange/tags/comptia" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>comptia</span></a></p>
postmodern<p>Yes you can use <a href="https://ronin-rb.dev" rel="nofollow noopener noreferrer" target="_blank">Ronin</a> on the OSCP exam. I even emailed them and you can <a href="https://ronin-rb.dev/blog/2023/11/22/yes-you-can-use-ronin-on-the-oscp.html" rel="nofollow noopener noreferrer" target="_blank">read their response</a>. This is because Ronin does not, and will not, provide any automatic exploitation functionality similar to Metasploit's <code>db_autopwn</code>. You have to select the exploit for the vulnerability and run it yourself. Ronin just provides the framework part which helps makes writing and running exploits easy. Some people keep trying to argue this, but those are the facts.<br><a href="https://infosec.exchange/tags/oscp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>oscp</span></a> <a href="https://infosec.exchange/tags/oscpexam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>oscpexam</span></a> <a href="https://infosec.exchange/tags/ronin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ronin</span></a></p>
Yahe<p>/me hat heute mit der Vorbereitung seiner <a href="https://chaos.social/tags/OSCP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OSCP</span></a> Zertifizierung begonnen. Unterstütztend habe ich mir <a href="https://chaos.social/tags/HackTheBox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HackTheBox</span></a> und <a href="https://chaos.social/tags/TryHackMe" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TryHackMe</span></a> Subscriptions geklickt.</p><p>Heute habe ich erste Inhalte auf TryHackMe durchgearbeitet. Einerseits eine nette Auffrischung und andererseits sind da tatsächlich hier und da ein paar nette Tipps dabei. <a href="https://chaos.social/tags/KennyHackt" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KennyHackt</span></a></p>
ronin-rb<p>Yes, you can use Ronin on the OSCP.<br><a href="https://ronin-rb.dev/blog/2023/11/22/yes-you-can-use-ronin-on-the-oscp.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ronin-rb.dev/blog/2023/11/22/y</span><span class="invisible">es-you-can-use-ronin-on-the-oscp.html</span></a><br><a href="https://infosec.exchange/tags/ronin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ronin</span></a> <a href="https://infosec.exchange/tags/oscp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>oscp</span></a></p>
postmodern<p>Offsec support emailed back with this nugget of wisdom:</p><blockquote><p>If a tool is capable of automatically discovering and exploiting vulnerabilities on a target machine resulting in automatic remote access or escalated privileges without effort or enumeration, it can be considered a restricted tool.</p><p>To further elaborate on the above, we highly recommend reading the below blog post regarding automated exploitation tools.</p><ul><li><a href="https://www.offsec.com/offsec/understanding-pentest-tools-scripts/" rel="nofollow noopener noreferrer" target="_blank">Understanding the tools/scripts you use in a Pentest</a></li></ul><p>Furthermore, please also keep in mind that there are many tools and unfortunately, we are unable to comment on all of them. Therefore, it is up to the student to determine if their chosen tool or script falls under a restricted category. This also demonstrates that you understand what the tool is doing and how it works.</p></blockquote><p>This seems to confirm that if a tool does not automatically identify CVEs <em>and</em> select the appropriate exploit, it is allowed on the OSCP Exam?<br><a href="https://infosec.exchange/tags/oscp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>oscp</span></a></p>
postmodern<p>Current Status: trying to get Offsec to define "automatic exploitation". The <a href="https://help.offsec.com/hc/en-us/articles/360040165632-OSCP-Exam-Guide" rel="nofollow noopener noreferrer" target="_blank">OSCP Exam Guide</a> states that "automatic exploitation" tools are restricted, but what does that include? Does that include Python and Ruby scripts? What about a Python script that loads <a href="https://github.com/Gallopsled/pwntools#readme" rel="nofollow noopener noreferrer" target="_blank">pwnlib</a> or a Ruby script that loads <a href="https://github.com/ronin-rb/ronin-support#readme" rel="nofollow noopener noreferrer" target="_blank">ronin-support</a>? What about a micro-framework like <a href="https://github.com/ronin-rb/ronin-exploits#readme" rel="nofollow noopener noreferrer" target="_blank">ronin-exploits</a> (which does not come with any exploits nor does it provide any db_autopwn-like functionality). Where is the line between "automatic exploitation" and "manual exploitation"? What about using <code>ronin-exploits new</code> to generate a skeleton exploit template? What about using ChatGPT?</p><p>Enumerating which tools are restricted isn't enough, because there will always be new tools. I would also like to <em>safely</em> recommend <a href="https://github.com/ronin-rb/ronin-support#readme" rel="nofollow noopener noreferrer" target="_blank">ronin-support</a>, <a href="https://github.com/ronin-rb/ronin-payloads#readme" rel="nofollow noopener noreferrer" target="_blank">ronin-payloads</a>, or <a href="https://github.com/ronin-rb/ronin-exploits#readme" rel="nofollow noopener noreferrer" target="_blank">ronin-exploits</a> to people looking to take the OSCP Exam.<br><a href="https://infosec.exchange/tags/oscp" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>oscp</span></a></p>
Kevin Karhan :verified:<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@kalilinux" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>kalilinux</span></a></span> I mean a lot of people put up timelapses doing <a href="https://mstdn.social/tags/OSCP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OSCP</span></a> with that track:<br><a href="https://www.youtube.com/watch?v=JC5IgIwf26I" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">youtube.com/watch?v=JC5IgIwf26</span><span class="invisible">I</span></a></p>