.

Finally took the plunge, started 08/05/12

<<

YuckTheFankees

User avatar

Sr. Member
Sr. Member

Posts: 332

Joined: Fri Apr 08, 2011 3:07 pm

Post Mon Aug 06, 2012 5:38 am

Finally took the plunge, started 08/05/12

After hearing and reading so many positive reviews over the past year, I decided to take the plunge. I received my materials late Saturday (08/04) evening, which was technically 08/05 00:00 GMT. So far I have about 8 hours invested into the course and I have enjoyed everything so far. At first, I started reading the modules in order (lab pdf) but then I decided to briefly fly through the entire lab pdf, just to see exactly what I will be learning. Sooo..I've been reading/slighty skimming through the lab for about 4-6 hours and I'm only on module 8, so that should give people an indication to how much material is packed into the lab pdf.

Just like so many people have mentioned, I can get through the first five modules pretty easy (learning backtrack, learning some BASH/python, port scanning, enumeration, etc..)but from module six and on, I know I will have to do A LOT of outside research...which I'm completely fine with. I'm not going to lie, going through the buffer overflow section for the first time was like reading Japanese.

The further I get into the Lab pdf, the more I feel a little overwhelmed. I kind of wish OffSec would give you the choice of going through the PDF and Video's for a week or two, then starting the lab time. The material is totally worth it but I can't help but think I'm losing money by reading, researching, and watching video's..rather than messing with the lab.

My personal goal is to get everything done within 60 lab days and take the test some time after that.

Well I better get back to the pdf. Any comments are welcomed.
OSCP in progress
<<

RoleReversal

User avatar

Hero Member
Hero Member

Posts: 928

Joined: Fri Jan 04, 2008 8:54 am

Location: UK

Post Mon Aug 06, 2012 6:54 am

Re: Finally took the plunge, started 08/05/12

Good luck with the course.

From my own experience, try not to get too worried about the buffer overflow section. If it only seems like Japanese you're probably doing alright :). After a couple of run throughs and the hands-on examples everything starts making sense.

When I did the final challenge (and (hopefully) without giving too much away from my own challanges) I finished one section, sat back in the chair with a grin on my face, and the question of 'did I really just do that' going through my mind.

The material is tough, but you should get there in the end. Although I do agree with you re: offsetting courseware/lab time, I took an extension to get more time in the labs (partly for extra practice, and partly just because the labs are FUN).
<<

DragonGorge

User avatar

Jr. Member
Jr. Member

Posts: 86

Joined: Wed Feb 08, 2012 6:30 pm

Post Mon Aug 06, 2012 9:31 am

Re: Finally took the plunge, started 08/05/12

YuckTheFankees wrote:I kind of wish OffSec would give you the choice of going through the PDF and Video's for a week or two, then starting the lab time. The material is totally worth it but I can't help but think I'm losing money by reading, researching, and watching video's..rather than messing with the lab.

I completely agree. I think the key here is your loss = their gain as a lot of people seem to end up buying extensions.

One thing I'd caution you on is to use BOTH the pdf & video - I got hung up in a big way on the buffer overflow section because the pdf skipped over a key component. The video on the other hand covered it correctly.
<<

Jamie.R

User avatar

Sr. Member
Sr. Member

Posts: 435

Joined: Mon Aug 06, 2012 9:57 am

Location: UK

Post Mon Aug 06, 2012 10:14 am

Re: Finally took the plunge, started 08/05/12

Cool good luck I hope to be doing this course soon too just trying free up extra money...
| OSWP | eCPPT Silver and Gold | eWPT |

I'm an InterN0T'er
<<

YuckTheFankees

User avatar

Sr. Member
Sr. Member

Posts: 332

Joined: Fri Apr 08, 2011 3:07 pm

Post Mon Aug 06, 2012 4:03 pm

Re: Finally took the plunge, started 08/05/12

What other resources did you use to learn buffer overflows?

I have about 5 links but any other suggestions would be nice.
OSCP in progress
<<

dynamik

Recruiters
Recruiters

Posts: 1119

Joined: Sun Nov 09, 2008 11:00 am

Location: Mile High City

Post Mon Aug 06, 2012 4:44 pm

Re: Finally took the plunge, started 08/05/12

YuckTheFankees wrote:What other resources did you use to learn buffer overflows?

I have about 5 links but any other suggestions would be nice.


Exploit Writing Tutorials: https://www.corelan.be/index.php/articles/

Buffer Overflow Megaprimer: http://www.securitytube.net/groups?oper ... &groupId=4

Smashing the Stack in 2010: http://pentest.cryptocity.net/files/exp ... si2010.pdf

Reviewing exploits on ExploitDB. I believe cd1zz recommended FreeFloat FTP as a good service to play around with.
The day you stop learning is the day you start becoming obsolete.
<<

shadowzero

User avatar

Full Member
Full Member

Posts: 120

Joined: Sat Jun 02, 2012 10:03 pm

Post Mon Aug 06, 2012 5:13 pm

Re: Finally took the plunge, started 08/05/12

This is also a pretty handy resource, using vulnserver: http://www.backtrack-linux.org/forums/s ... .php?t=203
<<

YuckTheFankees

User avatar

Sr. Member
Sr. Member

Posts: 332

Joined: Fri Apr 08, 2011 3:07 pm

Post Mon Aug 06, 2012 5:34 pm

Re: Finally took the plunge, started 08/05/12

thanks for the link
OSCP in progress
<<

dynamik

Recruiters
Recruiters

Posts: 1119

Joined: Sun Nov 09, 2008 11:00 am

Location: Mile High City

Post Mon Aug 06, 2012 6:05 pm

Re: Finally took the plunge, started 08/05/12

shadowzero wrote:This is also a pretty handy resource, using vulnserver: http://www.backtrack-linux.org/forums/s ... .php?t=203


Yes, great link. I hadn't seen that one before.

Also, I just remember that the Metasploit blog recently started providing these types of tutorials as well: https://community.rapid7.com/community/ ... the-series
The day you stop learning is the day you start becoming obsolete.
<<

Darktaurus

User avatar

Full Member
Full Member

Posts: 181

Joined: Thu Sep 03, 2009 8:48 am

Post Mon Aug 06, 2012 8:45 pm

Re: Finally took the plunge, started 08/05/12

shadowzero wrote:This is also a pretty handy resource, using vulnserver: http://www.backtrack-linux.org/forums/s ... .php?t=203



+1 Definitely agree.  Do not stress the course however.  It is easy to feel too much pressure and stress.  It will be a fun, painful ride either way.  Have fun. 
OSCE, OSCP, OSWP, CISSP, GPEN

www.agoonie.com
<<

cd1zz

User avatar

Recruiters
Recruiters

Posts: 566

Joined: Sun Oct 03, 2010 9:01 pm

Post Mon Aug 06, 2012 9:39 pm

Re: Finally took the plunge, started 08/05/12

Agree with Agoonie. Just take it one lesson at a time and try not to stress about the stuff that sounds difficult. You can always circle back and deal with that after you've got some momentum.
<<

Jamie.R

User avatar

Sr. Member
Sr. Member

Posts: 435

Joined: Mon Aug 06, 2012 9:57 am

Location: UK

Post Tue Aug 07, 2012 3:25 am

Re: Finally took the plunge, started 08/05/12

Cool some really good advice from the more expierence guys who done the course good luck ....
| OSWP | eCPPT Silver and Gold | eWPT |

I'm an InterN0T'er
<<

dbest

Jr. Member
Jr. Member

Posts: 79

Joined: Thu Jun 23, 2011 1:14 pm

Post Fri Aug 10, 2012 3:04 am

Re: Finally took the plunge, started 08/05/12

My advice for learning the buffer overflow is to load the vulnerable software on your own lab machine and practice it there. That's what I did to successfully complete the exercise. :)
CISM, CEH, CISA, ISO 27001 LA
<<

Jamie.R

User avatar

Sr. Member
Sr. Member

Posts: 435

Joined: Mon Aug 06, 2012 9:57 am

Location: UK

Post Fri Aug 10, 2012 5:03 am

Re: Finally took the plunge, started 08/05/12

Cool bit fo advice any other advice from people who have passed ?
| OSWP | eCPPT Silver and Gold | eWPT |

I'm an InterN0T'er
<<

satish.lx

User avatar

Newbie
Newbie

Posts: 36

Joined: Thu Jun 17, 2010 1:15 pm

Post Fri Aug 10, 2012 9:39 am

Re: Finally took the plunge, started 08/05/12

I don't know why every bufferover flow document talking about 32bit OS exploit (EIP, ESP etc..)

I didn't find any single document about 64bit OS exploit (RIP, RSP etc..) Because it has totally different register set..
Next

Return to OSCP - Offensive Security Certified Professional

Who is online

Users browsing this forum: No registered users and 0 guests

cron
.
Powered by phpBB® Forum Software © phpBB Group.
Designed by ST Software