@cyber.spirit - I think you should definitely put the time / research in, and write your article. Regardless of sternone's remarks or thinking, IF you learn from the experience, then it's a worthwhile effort. If others learn, too, then all the better.
@sternone - I'm happy to see you advancing in Offsec's labs, however, I think your 'play-by-play', as someone called it, is borderline on giving other students too much information. The post where you pointed out the multi-NIC machine, for instance, OS and all (even without giving the IP's) is enough to have people openly going looking for that box. While yes, there is something to hitting the other parts of the network, if they start focusing on that, there's a lot of other machines that they might 'skip', thinking the importance of reaching the admin network, for instance, is of utmost importance. They'll miss out on learning topics from the remaining lab boxes.
I know you didn't give away the proverbial 'keys to the kingdom' or anything, but I think you're teetering on the fencepost. Also, please note the next bit, here, is not an attack, but... In addition, attacking cyber.spirit's article idea, when 'tooting your own horn', constantly, after every exploit you achieve in the OSCP lab, leaves me thinking you're out for self-promotion and glory. Doesn't leave me much more interested in your future writings, either.
Be tactful and respectful, please.
Last edited by hayabusa
on Sun Sep 09, 2012 10:56 am, edited 1 time in total.
~ hayabusa ~
"All men can see these tactics whereby I conquer,
but what none can see is the strategy out of which victory is evolved."
- Sun Tzu, 'The Art of War'
OSCE, OSCP (Former - GPEN, C|EH - both expiring / expired)