I'll second UNIX on all counts. And likewise, if you need help, drop me a line.
Ultimately, dupe as much as you can, both from the course, and from outside of it. The more you understand, and can do without too much difficulty, the better.
Practice, practice, practice.
As you replied to UNIX's post, before I posted - By 'different techniques', try to find OTHER ways to exploit flaws that are noted in the course materials or what you work with from exploit-db, beyond simply using the publicly available exploits. Also, try to learn how to do things for yourself, rather than simply mimicking / copying exactly what someone has done. Try to accomplish the same thing, without simply doing exactly as they did. This applies to both coding and non-coding exercises (such as some of the web exploitation stuff).
Last edited by hayabusa
on Wed Feb 06, 2013 2:18 pm, edited 1 time in total.
~ hayabusa ~
"All men can see these tactics whereby I conquer,
but what none can see is the strategy out of which victory is evolved."
- Sun Tzu, 'The Art of War'
OSCE, OSCP (Former - GPEN, C|EH - both expiring / expired)