UNIX

Forum Replies Created

Viewing 15 posts - 1 through 15 (of 1,196 total)
  • Author
    Posts
  • #54291
     UNIX 
    Participant

    I don’t know which training you are referring to, but maybe the labs from Offensive Security offer what you are looking for.

    You could also have a look at Vulnhub which offers virtual machines to practice some hands-on security testing or any of the many CTF challenges that are available online.

  • #54257
     UNIX 
    Participant

    Did you eventually take the course?

  • #54284
     UNIX 
    Participant

    What area of security are you interested in?

    β€’ The Web Application Hacker’s Handbook (https://www.amazon.com/Web-Application-Hackers-Handbook-Exploiting/dp/1118026470)
    β€’ The Art of Software Security Assessment (https://www.amazon.com/Art-Software-Security-Assessment-Vulnerabilities/dp/0321444426)
    β€’ The Tangled Web (https://www.amazon.com/Tangled-Web-Securing-Modern-Applications/dp/1593273886)

  • #54269
     UNIX 
    Participant

    In order to get LPT you need to have passed CEH and ECSA. Once you have these two, you just apply for LPT and pay some money – there is no pratical or theoretical exam involved.

  • #54255
     UNIX 
    Participant

    Hi Robert,

    I haven’t taken their training, but as a general recommendation corelanc0d3r’s tutorials cover many different topics that would be useful as a preparation. Similarly, you can find some tutorials by FuzzySecurity, The Grey Corner, Security Shift and Open Security Training. And of course other great resources like phrack and PoC||GTFO.

    Looking at the course syllabus and searching for the covered examples that are used during the training, you can find some tutorials and further explanations that deal with the same vulnerabilities online. For example, for “Module 3: ActFax (OSVDB 89944)” a tutorial is provided by Craig himself (assuming it is the same vulnerability that he discovered) as well as by others. The same applies to other examples covered such as “Mozilla Firefox (CVE-2011-2371)” (see here and here).

    If you decide to take the course it would be great to see a review. πŸ™‚

  • #54238
     UNIX 
    Participant

    You can find a couple reviews through Google, for example here.

  • #54236
     UNIX 
    Participant

    I haven’t taken the course, but from the website:

    6. Is this Course for Novices or only for Experts?

    This course is for both. The language basics and PowerShell programming, which form almost half of the course, are covered with patience and keeping in mind the students, who have, no or very little prior programming experience. During the part where application of PowerShell in penetration testing is discussed, the course gathers speed and even expert users will learn new concepts and applications of Offensive PowerShell.

    So it seems that if someone has no prior experience with PowerShell it should be fine.

  • #45388
     UNIX 
    Participant

    dynamik, how was the AWAE course and certification? πŸ™‚

    Has anyone else attended it at the last Black Hat conference and could provide some feedback?

  • #45386
     UNIX 
    Participant

    It seems they are trying hard to release the online version of AWAE by the end of this year. πŸ™‚

  • #54208
     UNIX 
    Participant

    Then why not include them?

  • #54206
     UNIX 
    Participant
  • #54194
     UNIX 
    Participant

    Thanks for the review, Tim. It would be nice if you could update it once you have taken the associated exam. πŸ˜‰

  • #53628
     UNIX 
    Participant

    @dynamik wrote:

    I did recently book AWAE at Black Hat. I’ll probably limit 2014 to that and my degree. CRISC isn’t really a priority, and I’ll push that to 2015. After the OSWE exam, I think I’m going to need an extended vacation from 2+ years of OffSec training.

    Did you eventually take AWAE? I’d love to see a review from you. πŸ˜‰

  • #54145
     UNIX 
    Participant

    Thanks Don, seems to be a nice opportunity for complete beginners.

  • #53960
     UNIX 
    Participant

    I think your background is better than as of many others who have taken the course, so I wouldn’t worry too much about it. Like m0wgli, I too would sign up initially for 30 days and see how it goes. If you are in no hurry, you could try a couple vulnerable vms (for example, see vulnhub.com) before enrolling in the course, but based on your description I’d say you could start any time.

Viewing 15 posts - 1 through 15 (of 1,196 total)

Copyright Β©2019 Caendra, Inc.

Contact Us

Thoughts, suggestions, issues? Send us an email, and we'll get back to you.

Sending

Sign in with Caendra

Forgot password?Sign up

Forgot your details?