+ Reply to Thread
Page 2 of 3 First 12 3 Last
Results 26 to 50 of 63
  1. California Kid JoJoCal19's Avatar
    Join Date
    Mar 2009
    Location
    Jacksonville, FL
    Posts
    2,357

    Certifications
    CISSP, CISM, CISA, CRISC, GCIA, GSEC, CEHv8, CHFIv8, ITIL-F, MSISA, BSBA
    #26
    Quote Originally Posted by joneno View Post
    Is metasploit not allowed in the final exam?
    Not really. It's only allowed in a very limited manner.
    Have: CISSP, CISM, CISA, CRISC, GCIA, GSEC, CEHv8, CHFIv8, ITIL-F, BSBA - University of Florida, MSISA - WGU
    Currently Working On: MS Cybersecurity, Learning Python
    Next Up:​ None
    Reading:​ Python Crash Course
    Reply With Quote Quote  

  2. SS -->
  3. Senior Member
    Join Date
    Apr 2011
    Location
    DMV
    Posts
    221
    #27
    Thanks Jojo. I was actually learning some msfuuing using the security tube videos - I have to change plans now.
    Reply With Quote Quote  

  4. Senior Member
    Join Date
    Nov 2012
    Location
    Montreal
    Posts
    589

    Certifications
    OSCP, GWAPT, CEH, SSCP, EJPT, CCNA:Security, CCNA:R&S, MCSA:W2K8, Linux+, LPIC-1, SCLA
    #28
    I've been on a roll these past 2 days. During the last 6.5 hours I've been on this (including yesterday evening), I rooted 5 hosts and finally escalated my privileges on Gh0st. I'm mad at myself at this one though, the answer to my problem was right in front of me all long... in the exploit comments. I didn't bother reading everything. Oh well, lesson learned.
    Last edited by JasminLandry; 04-26-2016 at 08:45 PM.

    Reply With Quote Quote  

  5. Junior Member
    Join Date
    Apr 2016
    Location
    Ann Arbor
    Posts
    15

    Certifications
    OSCP | GWAPT | CISA | CPTE | ITIL Foundations | Network + | A+ | MCP | MBA
    #29
    Quote Originally Posted by joneno View Post
    Is metasploit not allowed in the final exam?
    You can use Metasploit on one host, like a Metasploit lifeline. It's generally a good idea to be able to root all the boxes manually. Learning Metasploit is also valuable but not in the context of the exam.
    Reply With Quote Quote  

  6. Senior Member
    Join Date
    Nov 2012
    Location
    Montreal
    Posts
    589

    Certifications
    OSCP, GWAPT, CEH, SSCP, EJPT, CCNA:Security, CCNA:R&S, MCSA:W2K8, Linux+, LPIC-1, SCLA
    #30
    Day 16 is done and I now have 16 rooted and 1 low privileged shell on Mail. Things are going well but I have a feeling that's not going to last too long as the hosts are probably going to get harder now.

    Reply With Quote Quote  

  7. Junior Member
    Join Date
    Apr 2016
    Location
    Ann Arbor
    Posts
    15

    Certifications
    OSCP | GWAPT | CISA | CPTE | ITIL Foundations | Network + | A+ | MCP | MBA
    #31
    Quote Originally Posted by JasminLandry View Post
    I've been on a roll these past 2 days. During the last 6.5 hours I've been on this (including yesterday evening), I rooted 5 hosts and finally escalated my privileges on Gh0st. I'm mad at myself at this one though, the answer to my problem was right in front of me all long... in the exploit comments. I didn't bother reading everything. Oh well, lesson learned.
    Congrats on rooting Gh0st!
    Reply With Quote Quote  

  8. Member
    Join Date
    Jan 2016
    Posts
    56
    #32
    Quote Originally Posted by JasminLandry View Post
    Day 16 is done and I now have 16 rooted and 1 low privileged shell on Mail. Things are going well but I have a feeling that's not going to last too long as the hosts are probably going to get harder now.
    Things definitely pick up around the 20 host mark, but as long as you have good notes so that you can go back to previously exploited systems and look for connections to other hosts you should be fine. There was a particular web server when I did my OSCP that landed me like 5 or 6 other systems once I'd exploited it (the lab has changed since I did it)
    Reply With Quote Quote  

  9. Junior Member
    Join Date
    Apr 2016
    Location
    Ann Arbor
    Posts
    15

    Certifications
    OSCP | GWAPT | CISA | CPTE | ITIL Foundations | Network + | A+ | MCP | MBA
    #33
    Quote Originally Posted by invictus_123 View Post
    Things definitely pick up around the 20 host mark, but as long as you have good notes so that you can go back to previously exploited systems and look for connections to other hosts you should be fine. There was a particular web server when I did my OSCP that landed me like 5 or 6 other systems once I'd exploited it (the lab has changed since I did it)
    Invictus has a good point. Having good documentation will help identifying the connection. This blog post was probably the most helpful resource outside of the manual Offensive Security's PWB and OSCP - My Experience - Security SiftSecurity Sift He has some good ideas for organizing documentation, not to mention a great nifty tool.
    Reply With Quote Quote  

  10. Senior Member
    Join Date
    Nov 2012
    Location
    Montreal
    Posts
    589

    Certifications
    OSCP, GWAPT, CEH, SSCP, EJPT, CCNA:Security, CCNA:R&S, MCSA:W2K8, Linux+, LPIC-1, SCLA
    #34
    Thanks Kaizen_404, I'll definitely take a look at that blog post. In the mean time, I rooted Kevin earlier today and I currently have a low privileged shell on Pain.. Privilege escalation is starting to get PAINful!

    Reply With Quote Quote  

  11. Member
    Join Date
    Apr 2016
    Posts
    41
    #35
    I haven't started my OSCP journey yet, but I have started practicing my documentation. I've started taking notes on every vulnerable VM I practice on. I find it helps with the learning process, and helping me re-exploit the box if I have to.

    What I do is after I've exploited the box, captured the flag, what have you, I'll go back through the process in a final report on a new page. I maintain my raw notes as well for reference. When I'm going back through the box I clean up my screenshots and copy/pates from terminal.
    Reply With Quote Quote  

  12. Senior Member
    Join Date
    Nov 2012
    Location
    Montreal
    Posts
    589

    Certifications
    OSCP, GWAPT, CEH, SSCP, EJPT, CCNA:Security, CCNA:R&S, MCSA:W2K8, Linux+, LPIC-1, SCLA
    #36
    3 weeks have gone by now. I'm currently at 18 hosts rooted with 2 low privilege shells on Pain and FC4. I haven't had much time over the weekend to work on this so hopefully the upcoming week will be better.

    Reply With Quote Quote  

  13. Senior Member
    Join Date
    Nov 2012
    Location
    Montreal
    Posts
    589

    Certifications
    OSCP, GWAPT, CEH, SSCP, EJPT, CCNA:Security, CCNA:R&S, MCSA:W2K8, Linux+, LPIC-1, SCLA
    #37
    So day 25 is complete. I'm currently sitting at 23 hosts rooted plus 1 low privileged shell on Pain which I'll go at later on. My goal for the end of the week is to have the rest of the directly exploitable hosts in the public network rooted.

    Reply With Quote Quote  

  14. Senior Member
    Join Date
    Nov 2012
    Location
    Montreal
    Posts
    589

    Certifications
    OSCP, GWAPT, CEH, SSCP, EJPT, CCNA:Security, CCNA:R&S, MCSA:W2K8, Linux+, LPIC-1, SCLA
    #38
    The first month is now over, so 2 more months to go. I'm currently sitting at 24 hosts rooted and 2 more low priv shells. I have identified my weaknesses so I'll be concentrating on those for the coming weeks so that I can be fully prepared for the exam. I started pivoting into the IT network this past weekend, my first time doing so. I found it a bit confusing but once you run the commands and practice, it makes more sense so I'd say I'm getting better at it. I'm planning or hoping to get 15-20 hosts in the next month so I can hit the 40 mark. Once I hit that mark, I'll start thinking at scheduling my exam so that if I fail I'll still have some lab time left to practice and then re-schedule it. But I really hope I won't need a second attempt

    Reply With Quote Quote  

  15. osc
    osc is offline
    Junior Member Registered Member
    Join Date
    May 2016
    Posts
    5
    #39
    hi Jasmin, I'm at a similar stage to you except I attempted the exam after the first month. Message me if you'd like to be study buddies, we can motivate each other and save time.
    Reply With Quote Quote  

  16. Senior Member
    Join Date
    Nov 2012
    Location
    Montreal
    Posts
    589

    Certifications
    OSCP, GWAPT, CEH, SSCP, EJPT, CCNA:Security, CCNA:R&S, MCSA:W2K8, Linux+, LPIC-1, SCLA
    #40
    @osc I sent you a pm. It'll be better if we chat on IRC!

    I'm now at 27 hosts rooted and 1 low privilege shell on Bethany which I'm really close to getting root. I was able to root Pain today. I guess last time I tried I forgot one option while compiling the exploit so after re-compiling it today I got root on my first attempt. And in my opinion, this host doesn't belong in the "top 3". For me, it was easier than Gh0st and maybe even a few others as well. I'm starting to run low on targets in the public network so I'm slowly starting to get into the 2 Dev and IT networks. I have to work on client side exploits though as this is definitely one my weaknesses as I've never really done this before.

    Reply With Quote Quote  

  17. Junior Member
    Join Date
    Apr 2016
    Location
    Ann Arbor
    Posts
    15

    Certifications
    OSCP | GWAPT | CISA | CPTE | ITIL Foundations | Network + | A+ | MCP | MBA
    #41
    Quote Originally Posted by JasminLandry View Post
    @osc I sent you a pm. It'll be better if we chat on IRC!

    I'm now at 27 hosts rooted and 1 low privilege shell on Bethany which I'm really close to getting root. I was able to root Pain today. I guess last time I tried I forgot one option while compiling the exploit so after re-compiling it today I got root on my first attempt. And in my opinion, this host doesn't belong in the "top 3". For me, it was easier than Gh0st and maybe even a few others as well. I'm starting to run low on targets in the public network so I'm slowly starting to get into the 2 Dev and IT networks. I have to work on client side exploits though as this is definitely one my weaknesses as I've never really done this before.
    I agree with you on Pain. It was pretty straight forward. Did you root Bethany yet? Make sure you have good notes on this one.
    Reply With Quote Quote  

  18. Senior Member
    Join Date
    Nov 2012
    Location
    Montreal
    Posts
    589

    Certifications
    OSCP, GWAPT, CEH, SSCP, EJPT, CCNA:Security, CCNA:R&S, MCSA:W2K8, Linux+, LPIC-1, SCLA
    #42
    I agree with you on Pain. It was pretty straight forward. Did you root Bethany yet? Make sure you have good notes on this one.
    Yes I did root Bethany, over the weekend I believe. I'm now starting to work on client side exploits. I was able to root Pedro on Monday and currently working on an XSS exploit. I messed up my Beef config and it's not working so I'm trying to do things manually now. I'm seeing the client requesting the file from my server but that's about it for now. I haven't been able to get a shell yet. I am now at 30 rooted and 1 low privilege shell on Gamma.

    Reply With Quote Quote  

  19. Member
    Join Date
    Jan 2016
    Posts
    56
    #43
    Quote Originally Posted by JasminLandry View Post
    Yes I did root Bethany, over the weekend I believe. I'm now starting to work on client side exploits. I was able to root Pedro on Monday and currently working on an XSS exploit. I messed up my Beef config and it's not working so I'm trying to do things manually now. I'm seeing the client requesting the file from my server but that's about it for now. I haven't been able to get a shell yet. I am now at 30 rooted and 1 low privilege shell on Gamma.
    Im sure youre aware of this, but it is very important to know the browser version of the client for the client side exploits. So either figure out how beef gets this information and do it manually, or try and fix beef. good luck
    Reply With Quote Quote  

  20. Senior Member
    Join Date
    Nov 2012
    Location
    Montreal
    Posts
    589

    Certifications
    OSCP, GWAPT, CEH, SSCP, EJPT, CCNA:Security, CCNA:R&S, MCSA:W2K8, Linux+, LPIC-1, SCLA
    #44
    Im sure youre aware of this, but it is very important to know the browser version of the client for the client side exploits. So either figure out how beef gets this information and do it manually, or try and fix beef. good luck
    Yes I did get the browser version. I think I'll just try to fix BeEF, it's a useful tool not just for the course and exam.

    Reply With Quote Quote  

  21. Senior Member
    Join Date
    Nov 2012
    Location
    Montreal
    Posts
    589

    Certifications
    OSCP, GWAPT, CEH, SSCP, EJPT, CCNA:Security, CCNA:R&S, MCSA:W2K8, Linux+, LPIC-1, SCLA
    #45
    So I was able to fix Beef, but I don't think I'll even need to use it, well at least for this one host I was working on.

    Reply With Quote Quote  

  22. Senior Member
    Join Date
    Nov 2012
    Location
    Montreal
    Posts
    589

    Certifications
    OSCP, GWAPT, CEH, SSCP, EJPT, CCNA:Security, CCNA:R&S, MCSA:W2K8, Linux+, LPIC-1, SCLA
    #46
    I've made some progress this past week. I'm now sitting at 37 hosts rooted including my first few in the IT network. I still don't have anything in the Dev network though and I haven't even found the key to the Admin network yet so hopefully I can get this soon. I have scheduled my first exam attempt (and hopefully my last) for June 9th. I still have to finish up the exercises and work on the lab report so I can relax a bit after that 24 hour rush.

    My goal was to root every single hosts and seeing that I still have 40 days left out of my 90 days, I do believe I still have some time to achieve it. And yes, even if I do pass the exam, I still want to root everything

    Reply With Quote Quote  

  23. Achieve excellence daily
    Join Date
    May 2012
    Location
    Washington State
    Posts
    1,380

    Certifications
    CISSP
    #47
    Great progress! I'm running much slower, only rooting a few hosts by now. Press on!
    When you go the extra mile, there's no traffic.
    Reply With Quote Quote  

  24. Member
    Join Date
    Jan 2016
    Location
    Novato, CA
    Posts
    53

    Certifications
    OSCP,Network+,Security+,MTA-Net,MTA-Sec
    #48
    Quote Originally Posted by JasminLandry View Post
    I've made some progress this past week. I'm now sitting at 37 hosts rooted including my first few in the IT network. I still don't have anything in the Dev network though and I haven't even found the key to the Admin network yet so hopefully I can get this soon. I have scheduled my first exam attempt (and hopefully my last) for June 9th. I still have to finish up the exercises and work on the lab report so I can relax a bit after that 24 hour rush.

    My goal was to root every single hosts and seeing that I still have 40 days left out of my 90 days, I do believe I still have some time to achieve it. And yes, even if I do pass the exam, I still want to root everything

    Very nice progress man!!!!!!!!
    Reply With Quote Quote  

  25. Senior Member
    Join Date
    Nov 2012
    Location
    Montreal
    Posts
    589

    Certifications
    OSCP, GWAPT, CEH, SSCP, EJPT, CCNA:Security, CCNA:R&S, MCSA:W2K8, Linux+, LPIC-1, SCLA
    #49
    Quote Originally Posted by CarlSaiyed View Post
    Great progress! I'm running much slower, only rooting a few hosts by now. Press on!
    Doesn't matter what how fast you go as long as you do things correctly. I have been spending an average of a good 4-5 hours per day minimum though, also trying not to stay up too late

    Reply With Quote Quote  

  26. Senior Member
    Join Date
    Nov 2012
    Location
    Montreal
    Posts
    589

    Certifications
    OSCP, GWAPT, CEH, SSCP, EJPT, CCNA:Security, CCNA:R&S, MCSA:W2K8, Linux+, LPIC-1, SCLA
    #50
    Just rooted Master and Slave, which were pretty easy, no exploits needed. Just gathered information and hints throughout the network. Once I got in, I was able to get all user credentials from the domain, well just the few that were left that I didn't have! I'll now be trying to escalate my privileges on Nina tonight. If I do get her, I'll be at 40 fully rooted hosts... exactly 1 week away from my exam date.

    Reply With Quote Quote  

+ Reply to Thread
Page 2 of 3 First 12 3 Last

Social Networking & Bookmarks