- This topic has 4 replies, 5 voices, and was last updated 12 years, 11 months ago by
RoleReversal.
-
AuthorPosts
-
-
July 17, 2007 at 12:27 pm #1498
BiotiC
ParticipantI’m a couple of months into the OSCP and I am finding it a steep (but VERY interesting) learning curve. If, like me, your study time is limited then you don’t want to spend hours Googling for decent study resources when you could be spending time in the labs.
I thought I would put up a couple of links to stuff that has helped me gain a greater understanding of this frustrating / fascinating business.
First a whole raft of video tutorials (not the usual rubbish) including tuts on NMAP, Netcat, Wireshark, Socket Programming and Encryption.
http://www.security-freak.net/videos.htmlLots of security tutorials here. The site is not in English but a lot of the info is written in English and is generally available in .PDF format.
http://www.ol-service.com/sikurezza/And here are some good fuzzing resources.
http://www.infosecinstitute.com/blog/2005/12/fuzzers-ultimate-list.html
I hope someone finds this useful and that anyone else with good resources will post them up here.Regards
Ian
-
July 26, 2007 at 1:33 am #13362
Ph0tog
ParticipantThanks for the links Biotic, I just started this class on Monday. It’s been fun so far ;D
I’m not far enough into it to give any real opinion on it though. I’ll definitely be back to these boards soon to share my thoughts.
-
July 26, 2007 at 12:35 pm #13363
invincible
ParticipantHi ,
Thanks for the link . This is my first post in this forum .
The links are realy good .Thanks
-
February 20, 2008 at 1:11 am #13364
Malachai
ParticipantThank you for the links. The site looks good, and I plan on taking the cert that’s if I have enough skill with the tcp/ip and network admin side.
I’m just getting started in this field since most of my work has been in help desk.
Thanks again.
-
February 21, 2008 at 2:56 pm #13365
RoleReversal
ParticipantBiotic,
cheers for the links.I haven’t been able to take too close a look yet (no rest for the wicked and all that) But as you say the videos don’t seem constrained to the usual ‘type nmap to scan host’ basics.
If I find anything majorly interesting after a closer look I’ll let you all know
-
-
AuthorPosts
- You must be logged in to reply to this topic.