+ Reply to Thread
Page 2 of 3 First 12 3 Last
Results 26 to 50 of 70
  1. Junior Member
    Join Date
    Apr 2017
    Posts
    7

    Certifications
    CCNA, NSE4, ZCSE, CyberArk PAS
    #26
    Thanks saraguru and likewise to you too, am sure you'll crack it in the first go as well... You're becoming quite an inspiration (or atleast the speeds of you popping the boxes)... Are you using msf on some/any boxes or are you just manually working through these ?
    Quote Originally Posted by saraguru View Post
    Yah..As i had already mentioned, If you are a pentester by profession the course and lab shouldn't be a problem for you at all
    All the best for your journey Ghostrider007 (Y)
    Reply With Quote Quote  

  2. SS -->
  3. Junior Member
    Join Date
    Apr 2017
    Posts
    7

    Certifications
    CCNA, NSE4, ZCSE, CyberArk PAS
    #27
    Wow ! That is some amazing work ! You seem to be plowing through it. Well done saraguru ! I know you said you were a pro programmer but do you have any experience in the offensive side as well ?
    Quote Originally Posted by saraguru View Post
    Hi everyone,

    This weekend was the best for me and I experienced both painful & joyful time in the lab!! This Friday I experienced failures after failures..i tried about 3 machines but couldn't even find the entry point for any of them...later i decided to look at the forum for hints and found that all 3 of them had some dependencies...frustrated with the failures I didn't have the mindset to proceed with other machine today!!

    And on saturday I rooted a machine and found network-secret file in it!! By this victory I have successfully unlocked the IT network ...I have been waiting to unlock a network for a long time and it happened today!! That moment, I was really feeling like floating in the sky!!!!!!

    On sunday, I was working on a privilege escalation of a machine for which I have got a limited shell long long back...since I couldn't find any way after working on it for a long time I decided to get some hint from the forum for Privilege Escalation...Based on the hint provided I went back to the lab and rooted it within like 5 min or so...i was just shocked and asked myself "Did you miss something which was this obvious??!!"..so i decided to revert the machine just to ensure that I did root the machine in the right manner!! After reverting I was shocked to see that, what I had done earlier was not the intended way to root the machine and I just used a backdoor which someone has left behind when they were working!!! I was very sad and challenged myself to complete the machine within today...I tried everything which I could but still I was stuck..evening I talked to the admin and he gave me a nudge..And after an hour or so, I OWNED this box!!! Mannn, that was really awesome..I am learning very coool things which I had never even Imagined before taking up this course...And to add to the joy of rooting this box, there was another network-secret found on this box!!! so, I even unlocked the DEV network!!! it was back to back victory for me this weekend..in two days I have unlocked two networks...Only after rooting this machine I was able to have my dinner

    Finally, I have 20 full shells and 3 limited shells with me now and also I have unlocked IT and DEV network!!! sooon, I hope to have fun with "tunneling and pivoting" Well, that's the update for this weekend!!
    Reply With Quote Quote  

  4. Member
    Join Date
    Mar 2017
    Location
    India
    Posts
    46

    Certifications
    OSCP
    #28
    Quote Originally Posted by Ghostrider007 View Post
    Thanks saraguru and likewise to you too, am sure you'll crack it in the first go as well... You're becoming quite an inspiration (or atleast the speeds of you popping the boxes)... Are you using msf on some/any boxes or are you just manually working through these ?
    Thanks a lotttt Ghostrider007!!! I too wish that I clear it in the first go..but I'm not so sure if i'll be able to do that
    My aim is to get this Cert within the end of the year though..hope I can do that
    Regarding MSF, till now I have used in about 4 machines...I know that out of the 4 I can get one without using MSF using some publically available exploit..however with the remaining 3 machines, i read from forum that, people who have done it manually have actually rewritten the MSF code to a standalone python script..I'm planning to do that in the end if I have time in the lab...and except these 4 machines I have exploited every other machine I own now manually
    Reply With Quote Quote  

  5. Senior Member
    Join Date
    Nov 2013
    Location
    NoVa
    Posts
    217
    #29
    Hello, I am taking the course as well and i have pwned machines and i didnt have to use MSF at all (besides meterpreter which is allowed in the exams). PM these 3 machine names that you have to use MSF and ill let you know if they really need MSF.

    Quote Originally Posted by saraguru View Post
    Thanks a lotttt Ghostrider007!!! I too wish that I clear it in the first go..but I'm not so sure if i'll be able to do that
    My aim is to get this Cert within the end of the year though..hope I can do that
    Regarding MSF, till now I have used in about 4 machines...I know that out of the 4 I can get one without using MSF using some publically available exploit..however with the remaining 3 machines, i read from forum that, people who have done it manually have actually rewritten the MSF code to a standalone python script..I'm planning to do that in the end if I have time in the lab...and except these 4 machines I have exploited every other machine I own now manually
    Reply With Quote Quote  

  6. Member
    Join Date
    Sep 2016
    Location
    London| United Kingdom
    Posts
    65

    Certifications
    CISSP| CEH| CISA| CISM| CGEIT|CRISC|
    #30
    Quote Originally Posted by Ghostrider007 View Post
    Hi TreySong... If you're already in the pentesting world, then you already have half the job done ....
    Am starting my lab time from 14th May (next month), have started prep work for it. But i know of 5 pentesters at my work place who cracked it in the first go. They didn't say it was an easy task, but not too hard for them as well due to their experience and am sure it will be the same for you

    Keep us posted....
    Thanks. I've not done Pen testing in the last three years plus. Before then I sent four years pentesting.
    Reply With Quote Quote  

  7. Member
    Join Date
    Sep 2016
    Location
    London| United Kingdom
    Posts
    65

    Certifications
    CISSP| CEH| CISA| CISM| CGEIT|CRISC|
    #31
    Quote Originally Posted by saraguru View Post
    Hi everyone,

    This weekend was the best for me and I experienced both painful & joyful time in the lab!! This Friday I experienced failures after failures..i tried about 3 machines but couldn't even find the entry point for any of them...later i decided to look at the forum for hints and found that all 3 of them had some dependencies...frustrated with the failures I didn't have the mindset to proceed with other machine today!!

    And on saturday I rooted a machine and found network-secret file in it!! By this victory I have successfully unlocked the IT network ...I have been waiting to unlock a network for a long time and it happened today!! That moment, I was really feeling like floating in the sky!!!!!!

    On sunday, I was working on a privilege escalation of a machine for which I have got a limited shell long long back...since I couldn't find any way after working on it for a long time I decided to get some hint from the forum for Privilege Escalation...Based on the hint provided I went back to the lab and rooted it within like 5 min or so...i was just shocked and asked myself "Did you miss something which was this obvious??!!"..so i decided to revert the machine just to ensure that I did root the machine in the right manner!! After reverting I was shocked to see that, what I had done earlier was not the intended way to root the machine and I just used a backdoor which someone has left behind when they were working!!! I was very sad and challenged myself to complete the machine within today...I tried everything which I could but still I was stuck..evening I talked to the admin and he gave me a nudge..And after an hour or so, I OWNED this box!!! Mannn, that was really awesome..I am learning very coool things which I had never even Imagined before taking up this course...And to add to the joy of rooting this box, there was another network-secret found on this box!!! so, I even unlocked the DEV network!!! it was back to back victory for me this weekend..in two days I have unlocked two networks...Only after rooting this machine I was able to have my dinner

    Finally, I have 20 full shells and 3 limited shells with me now and also I have unlocked IT and DEV network!!! sooon, I hope to have fun with "tunneling and pivoting" Well, that's the update for this weekend!!
    Awesome. At this rate you'll be ready for the exam before your lab time runs out.
    Reply With Quote Quote  

  8. Member
    Join Date
    Mar 2017
    Location
    India
    Posts
    46

    Certifications
    OSCP
    #32
    Quote Originally Posted by Ghostrider007 View Post
    Wow ! That is some amazing work ! You seem to be plowing through it. Well done saraguru ! I know you said you were a pro programmer but do you have any experience in the offensive side as well ?
    Sorry Ghostrider007, I somehow forget to reply to you. Actually, i was a competitive programmer so basically I have decent knowledge about Algorithms & Data Structures. However, I didn't have any experience on the offensive side when I was in my college. After completing my degree ( about 10 months ago ), I started to explore the security field.Before signing up for OSCP, I have done about 10-15 VMs in vulnhub, had a basic knowledge about web app security, linux, networking and also took part in few CTFs for fun .
    Reply With Quote Quote  

  9. Junior Member
    Join Date
    Apr 2017
    Posts
    7

    Certifications
    CCNA, NSE4, ZCSE, CyberArk PAS
    #33
    No problem Saraguru... thanks for summarizing your experience...
    Quote Originally Posted by saraguru View Post
    Sorry Ghostrider007, I somehow forget to reply to you. Actually, i was a competitive programmer so basically I have decent knowledge about Algorithms & Data Structures. However, I didn't have any experience on the offensive side when I was in my college. After completing my degree ( about 10 months ago ), I started to explore the security field.Before signing up for OSCP, I have done about 10-15 VMs in vulnhub, had a basic knowledge about web app security, linux, networking and also took part in few CTFs for fun .
    Reply With Quote Quote  

  10. Member
    Join Date
    Mar 2017
    Location
    India
    Posts
    46

    Certifications
    OSCP
    #34
    Hello All,

    I am back with my review for the last week..Last week was actually of the most dullest days in my OSCP journey. Monday I got a low privilege shell on a machine and on Tuesday I was able to obtain root for that same machine...That was not a hard one and I would say it is a very basic Linux Privilege Escalation technique. And from Wednesday to Friday work got too much in my way and I couldn't even find time to enter into the lab. So, I was eagerly waiting for the weekend so that I can play in the labs as much as I can. On Saturday I got a low privilege shell on machine, which was a windows box and I came to know about a very coool tool in kali which I didn't know earlier. And for Privilege Escalation, I needed a push from my friend without whom I wouldn't have got the SYSTEM for this box. Later, after rooting this I found some very valuable information which can be used against one other box in the public network. One of the most important things which I OSCP taught me is the importance of Post Exploitation. In the beginning of the course I never really cared about Post Exploitation because of which I am having lot of trouble now. So, my advice to who ever is starting their OSCP in future is "do proper post enumeration and spend some time on the box once you have got root/system on it. don't be in a hurry and jump to the next box".

    And on Sunday, I decided to do one more machine from the public network itself. This particular machine which I was trying had at the maximum of only 2 open ports. Proper enumeration was the key in getting this box. Once, you the required information then you get a straight SYSTEM for this machine!! Yes, direct SYSTEM And soon after rooting this box, I remember seeing a machine with similar ports open and back then I didn't do proper enumeration for that machine and just moved to the other machine. So, I decided to revisit that old machine and beat him up with the new skills I have gained. As I had guessed, this was a very similar box to the one which I had done today and I didn't have much difficulty in owning him. So, it was two boxes in a day

    So friends, by the end of this week, I am having 24 full shells and 3 limited shells in my hands. I am thinking of doing few more machines in the public network before attacking the IT and DEV network. One reason for doing so is we have less that 10 machines in each of the network and I already have one machine from each of them. I will be taking 2-3 days off from my work for my preparation, so hope I will be back with much BIGGER and SWEETER update next week!!
    Reply With Quote Quote  

  11. Senior Member BuzzSaw's Avatar
    Join Date
    Jul 2016
    Posts
    242

    Certifications
    CEH | SSCP | VCP6 | VCP-NV | VCP-Cloud | VCP6-NV | VCP5-DCV | VCP4 | MCTS | MCP
    #35
    Quote Originally Posted by saraguru View Post
    Hello All,

    I am back with my review for the last week..Last week was actually of the most dullest days in my OSCP journey. Monday I got a low privilege shell on a machine and on Tuesday I was able to obtain root for that same machine...That was not a hard one and I would say it is a very basic Linux Privilege Escalation technique. And from Wednesday to Friday work got too much in my way and I couldn't even find time to enter into the lab. So, I was eagerly waiting for the weekend so that I can play in the labs as much as I can. On Saturday I got a low privilege shell on machine, which was a windows box and I came to know about a very coool tool in kali which I didn't know earlier. And for Privilege Escalation, I needed a push from my friend without whom I wouldn't have got the SYSTEM for this box. Later, after rooting this I found some very valuable information which can be used against one other box in the public network. One of the most important things which I OSCP taught me is the importance of Post Exploitation. In the beginning of the course I never really cared about Post Exploitation because of which I am having lot of trouble now. So, my advice to who ever is starting their OSCP in future is "do proper post enumeration and spend some time on the box once you have got root/system on it. don't be in a hurry and jump to the next box".

    And on Sunday, I decided to do one more machine from the public network itself. This particular machine which I was trying had at the maximum of only 2 open ports. Proper enumeration was the key in getting this box. Once, you the required information then you get a straight SYSTEM for this machine!! Yes, direct SYSTEM And soon after rooting this box, I remember seeing a machine with similar ports open and back then I didn't do proper enumeration for that machine and just moved to the other machine. So, I decided to revisit that old machine and beat him up with the new skills I have gained. As I had guessed, this was a very similar box to the one which I had done today and I didn't have much difficulty in owning him. So, it was two boxes in a day

    So friends, by the end of this week, I am having 24 full shells and 3 limited shells in my hands. I am thinking of doing few more machines in the public network before attacking the IT and DEV network. One reason for doing so is we have less that 10 machines in each of the network and I already have one machine from each of them. I will be taking 2-3 days off from my work for my preparation, so hope I will be back with much BIGGER and SWEETER update next week!!

    Very cool update! Good work
    Reply With Quote Quote  

  12. Member
    Join Date
    Mar 2017
    Location
    India
    Posts
    46

    Certifications
    OSCP
    #36
    Hello Everyone,

    I actually thought of posting an update only a week later. But after getting a reverse shell on this particular machine I just couldn't resist myself without posting my experience. I will try not to disclose any information which I am not supposed to. This particular machine ( let us say X ) has to be obtained by using a client side attack and had a dependency ( let us say Y ). Y was a very easy machine and got him yesterday. After getting the Y, and doing some post exploitation work, it became clear of what to do to get X. However, the method I tried to get the shell was not successful at all. It was like "I was able to smell the shell but didn't have the opportunity to taste it". I set up my netcat listener with the hope that X would visit me. But X refused to connect with me. Having lost hope, I went to the forums and few people suggested to few different ways of delivering the payload to X and not stick to one method. After reading this, an idea popped up in my head . So, I did that thing which popped in my mind, and with my fingers crossed again I was just starring at my terminal which said "nc -lvp 443". Anddddddddd finally Mr.X connected to me . That moment when I saw the shell, I felt like shouting loud. This has been the best moment in my OSCP journey so far. That feel of waiting for a shell for a long time and getting it is nondescribeable. This whole time I was feeling like a small kid who has been refused to give Icecream which he likes the most, which is just in front of him.

    And on monday, I attacked PAIN considered one of the three most difficult machines in the lab. I got a limited shell easily and proper enumeration was the key for it. However, I was stuck with privilege escalation and I think that is the part which makes him call PAIN. I decided to do that part later and went on to other machines.

    Well, that's it what I wanted to share with you all for now!!
    Reply With Quote Quote  

  13. Senior Member
    Join Date
    Feb 2012
    Posts
    2,426
    #37
    I'm really enjoying following your updates. Good luck and I hope to read more.

    Question - I see you were a software engineer/programmer. Is that what you do for a living? I'm curious about your professional background and why you decided to take on the OSCP.
    Reply With Quote Quote  

  14. Senior Member
    Join Date
    May 2014
    Location
    Right behind you.
    Posts
    130

    Certifications
    CISA, CISM, CISSP-ISSMP, CCSFP, ITILv3
    #38
    I as well am reading all of your updates. Please keep them coming!
    Reply With Quote Quote  

  15. Member
    Join Date
    Jan 2017
    Posts
    96
    #39
    Great stuff, Keep us posted!
    Reply With Quote Quote  

  16. Member
    Join Date
    Mar 2017
    Location
    India
    Posts
    46

    Certifications
    OSCP
    #40
    Quote Originally Posted by paul78 View Post
    I'm really enjoying following your updates. Good luck and I hope to read more.

    Question - I see you were a software engineer/programmer. Is that what you do for a living? I'm curious about your professional background and why you decided to take on the OSCP.
    I am very glad to hear that you are enjoying the update and will definitely keep them posting. And to answer your question let me tell you a short/long story of how I got into Information Security Domain and decided to take on OSCP:
    Note: If you feel it is lengthy or boring feel free to skip to the 2nd para

    I did my B.E in Electronics and Communication Engineering. Before my university 2nd year which was way back in 2013, I never used computers for programming or other technical stuffs. All that I know about computer at that time was "It is a box which can be used to play games and surf internet". In my 2nd year, me along with few of my friends participated in a workshop related to robotics and at the end of the robotics we were asked to write a program to make the robot do some fancy stuff. Since we were from ECE none of us except one, had idea about programming and hence we lost in the competition. It was at that moment, I decided to learn about programming. I took few books on C programming from our university library and started reading them. I found it really interesting and the books I read had some challenges at the end of each chapter and solving them gave me some happiness. I completed those books in a month or two, and my thirst for learning more about programming was at its peak. So, I googled how to improve in programming and came to a conclusion that I will do Competitive Programming. This was one of the wisest decisions I have taken in my life so far. So, for my remaining days of my university I spent all day solving challenges in websites like codeforces, codechef, hackerrank to name a few. As a result of practicing in these websites I became quite good in Algorithms and Data Structures. In my Final year, I got placed in an IT company and before joining in the company they conducted some programming competitions for all the students who got placed into their company that particular year. Since, I had tonnes of practice in this, I aced through the competitions and stood first among all the students placed in that company. Some top students were given the preference to choose our domain and I was one among them. Since during my entire college time I was into competitive programming, I didn't have any specific technology/domain which I liked in particular. So, after giving some thought I thought I would go either for Machine learning or Information security. And I was lucky enough that I got the Information security domain.

    Though I got Information Security, I didn't have any knowledge on this domain. After a month of joining in the company, I made a lot of friends and we were a gang of around 10+ people which included few senior people who were experienced pentesters. They were the ones who introduced me to OSCP and they told me that it would be a very challenging cert but a rewarding one. So, I made up mind and decided that I should somehow get OSCP before the end of 2017. It was through their guidance i learnt a lot of things. I started off with learning Linux ( which I have never ever used in my life till that point ) from pluralsight website and started using Ubuntu as my primary OS just to get used to that. I then brushed up my knowledge about networking and did the assembly language programming from securitytube. Parallely I did a lot of vulnhub challenges in my free time and also took part in lot of CTFs. I found that CTFs are really interesting and they gave me the same amount of happiness which competitive programming gave me in my university days. It was at February that I decided to sign up for OSCP and got my starting date as March 12th and the story goes on......

    Sorry, if i have been boring you with this. I thought that If I write from my company part, it would make no sense at all and be abrupt.

    I am feeling really happy that I got to choose Information Security as my career and I find this field really interesting. When I see a reverse shell popping up at port 443 ( which i normally use ), that is the time happiness flows from my heart and fills up my whole body. I wish to learn more and get better in this field.

    Thanks all for reading this.
    Reply With Quote Quote  

  17. Member
    Join Date
    Mar 2017
    Location
    India
    Posts
    46

    Certifications
    OSCP
    #41
    Quote Originally Posted by TankerT View Post
    I as well am reading all of your updates. Please keep them coming!

    Thanks a lott TankerT. Will definitely keep them coming
    Reply With Quote Quote  

  18. Member
    Join Date
    Mar 2017
    Location
    India
    Posts
    46

    Certifications
    OSCP
    #42
    Quote Originally Posted by Dr. Fluxx View Post
    Great stuff, Keep us posted!
    Thank you Dr. Fluxx . Definitely will keep posting
    Reply With Quote Quote  

  19. Senior Member
    Join Date
    Feb 2012
    Posts
    2,426
    #43
    Quote Originally Posted by saraguru View Post
    Thanks all for reading this.
    Thanks for the time to write it. I always find it more enjoyable to read when TE members actually write more than a one sentence response. It adds more flavor and genuine care.

    The reason why I had asked about your background is because I have always had a biased believe that software engineers/developers usually make better pent-testers and information security experts. My preference comes from the fact that given that many subtle flaws are due software defects and poor software design decisions. A security technician (I use the term technician to imply someone on the technical side) who actively develops software is generally going to be more aware of the pitfalls that can arise from misconfiguration and design flaw when protecting information.

    It's great that you found your interest and you are actively pursuing it.
    Reply With Quote Quote  

  20. Junior Member
    Join Date
    Apr 2017
    Posts
    7

    Certifications
    CCNA, NSE4, ZCSE, CyberArk PAS
    #44
    Wow ! Great update sara ! Everytime I read your updates, I'm get more eager to get started in a week on this journey... You're definitely such a positive influence on this seemingly tough journey ! Keep the updates coming, good luck with PAIN (i've heard some cool stuff about it too ) !
    Quote Originally Posted by saraguru View Post
    Hello Everyone,

    I actually thought of posting an update only a week later. But after getting a reverse shell on this particular machine I just couldn't resist myself without posting my experience. I will try not to disclose any information which I am not supposed to. This particular machine ( let us say X ) has to be obtained by using a client side attack and had a dependency ( let us say Y ). Y was a very easy machine and got him yesterday. After getting the Y, and doing some post exploitation work, it became clear of what to do to get X. However, the method I tried to get the shell was not successful at all. It was like "I was able to smell the shell but didn't have the opportunity to taste it". I set up my netcat listener with the hope that X would visit me. But X refused to connect with me. Having lost hope, I went to the forums and few people suggested to few different ways of delivering the payload to X and not stick to one method. After reading this, an idea popped up in my head . So, I did that thing which popped in my mind, and with my fingers crossed again I was just starring at my terminal which said "nc -lvp 443". Anddddddddd finally Mr.X connected to me . That moment when I saw the shell, I felt like shouting loud. This has been the best moment in my OSCP journey so far. That feel of waiting for a shell for a long time and getting it is nondescribeable. This whole time I was feeling like a small kid who has been refused to give Icecream which he likes the most, which is just in front of him.

    And on monday, I attacked PAIN considered one of the three most difficult machines in the lab. I got a limited shell easily and proper enumeration was the key for it. However, I was stuck with privilege escalation and I think that is the part which makes him call PAIN. I decided to do that part later and went on to other machines.

    Well, that's it what I wanted to share with you all for now!!
    Reply With Quote Quote  

  21. Member
    Join Date
    Nov 2016
    Location
    Iowa
    Posts
    67

    Certifications
    OSCP, CISSP, Sec+
    #45
    I really enjoyed your background bit just above. Very exciting and sounds like the right doors opened up for you based on your hard work. Good job!!

    You should join up on the Discord other TE OSCP students have around here!
    Reply With Quote Quote  

  22. Member
    Join Date
    Mar 2017
    Location
    India
    Posts
    46

    Certifications
    OSCP
    #46
    Quote Originally Posted by Ghostrider007 View Post
    Wow ! Great update sara ! Everytime I read your updates, I'm get more eager to get started in a week on this journey... You're definitely such a positive influence on this seemingly tough journey ! Keep the updates coming, good luck with PAIN (i've heard some cool stuff about it too ) !
    Thanks a lot Ghostrider007...i'm sure that you will definitely enjoy the OSCP journey!!
    BTW, when are you starting you lab??!
    Reply With Quote Quote  

  23. Member
    Join Date
    Mar 2017
    Location
    India
    Posts
    46

    Certifications
    OSCP
    #47
    Quote Originally Posted by LonerVamp View Post
    I really enjoyed your background bit just above. Very exciting and sounds like the right doors opened up for you based on your hard work. Good job!!

    You should join up on the Discord other TE OSCP students have around here!
    Thank you LonerVamp
    I too would like to join the Discord..Can anyone send me an invite to join Discord?!
    Thanks in advance!!
    Reply With Quote Quote  

  24. Junior Member Registered Member
    Join Date
    May 2017
    Posts
    3
    #48
    I should work and instead I'm reading updates!
    I'm planning OSCP too and this post is just awesome!
    Reply With Quote Quote  

  25. Member
    Join Date
    Mar 2017
    Location
    India
    Posts
    46

    Certifications
    OSCP
    #49
    Quote Originally Posted by darioosh View Post
    I should work and instead I'm reading updates!
    I'm planning OSCP too and this post is just awesome!

    Thanks a lott darioosh!!
    The course is really awesome and if you are beginner to the pentesting world i'm damn sure that you will learn a tonne of things from it..And as a side note, if you are planning to take it shortly just make sure that you book it well ahead ( atleast 4-6 weeks before )
    Reply With Quote Quote  

  26. Member
    Join Date
    Mar 2017
    Location
    India
    Posts
    46

    Certifications
    OSCP
    #50
    I've been thinking of giving my cooler updates of the past 10 days but work gets toooooo much in my way and the rest of the time i'm spending in the lab. I'll just wrap it off with the number of machines i have gained so far.

    I'm realllly reallly happpy to say that I have achieved my initial target of getting 30 machines in the lab. I have 31 machines with full privilege access and 4 limited shells with me now. And the 31 machines includes, 2 machines from each of IT and DEV network.

    I'll make sure to post the detailed updates by the weekend..
    Reply With Quote Quote  

+ Reply to Thread
Page 2 of 3 First 12 3 Last

Social Networking & Bookmarks