networkfilter.blogspot.com
Network Filter: My OSCE Review
http://networkfilter.blogspot.com/2016/01/my-osce-review.html
Blog about network and security. Monday, 18 January 2016. Offensive Security Certified Expert ( OSCE. Is a certification earned when one passes the exam after following the Cracking The Perimeter (CTP) course. It is more specialised than OSCP, and can be a natural continuation after OSCP. You can read my previous OSCP review. To learn about my experience with it. Should I learn or pratice particular topics? Is there a gap between OSCP and OSCE? How does PWK and CTP courses compare? 1 FROM OSCP TO OSCE.
csmusings.blogspot.com
Musings of a CSM: Review: Cracking The Perimeter (CTP/OSCE)
https://csmusings.blogspot.com/2016/04/review-cracking-perimeter-ctposce.html
Encore un autre blog de geek. Samedi 9 avril 2016. Review: Cracking The Perimeter (CTP/OSCE). Update: Ajout de quelques liens et références, ainsi que des vidéos Shmoocon/Defcon. Reformulation de certaines phrases. Ajout de références sur la partie réseau/cisco. L'an dernier je vous faisais une review, en français, de ce que l'on appelle vulgairement "OSCP" (le training " Pentesting With Kali. Avec la certification OSCP. Cette année ça sera " OSCE. Allez, c'est parti! CTP, ou " Cracking The Perimeter.
buffered.io
OSCE and Me
http://buffered.io/posts/osce-and-me
A Note on Disclosure. The Offensive Security Playground. February 17, 2014. I have always found it hard to separate myself from something that I have a keen interest, and this has certainly proven to be the case when it comes to Information Security. My recent foray into the field, both as a developer and as a wannabe pentester/researcher, has had a big impact on me and my desire to learn more has not lessened as time has passed. When I passed my OSCP. Given the fun I had while doing the PWB. Just as I d...
networkadminsecrets.com
Network Administration Secrets: May 2011
http://www.networkadminsecrets.com/2011_05_01_archive.html
A brain dump about obscure network problems and what I did to fix them. I also talk about infosec issues and other nerdy stuff. Monday, May 16, 2011. A complete overview of Replay and its features can be found on their website:. Http:/ www.appassure.com/solutions/backup/. My requirements for this new backup/dr product were as follows:. Quick and reliable backups. The ability to recover entire VMs. Mailbox level Exchange and SQL backups. Replication would often get corrupted which mean having to re-seed t...
theevilbit.blogspot.com
The Evil Bit Blog: My CTP / OSCE story
http://theevilbit.blogspot.com/2014/11/my-ctp-osce-story.html
The Evil Bit Blog. Forensics, Pentesting, Networking and Security. Monday, November 3, 2014. My CTP / OSCE story. I generally don't write long course reviews, but the Offensive Security ones always leave a deep impression. Even before you can register to the course, there is a small, two stage challenge which you need to go through. You need to get your registration key from http:/ www.fc4.me. Http:/ www.offensive-security.com/information-security-training/cracking-the-perimeter/. The last part is the ne...
networkadminsecrets.com
Network Administration Secrets: Offensive Security Certified Expert
http://www.networkadminsecrets.com/2011/05/offensive-security-certified-expert.html
A brain dump about obscure network problems and what I did to fix them. I also talk about infosec issues and other nerdy stuff. Tuesday, May 3, 2011. Offensive Security Certified Expert. I will start this post the same way I started my post on the OSCP certification. With a slight modification:. One of the hardest. The Offensive Security guys recommend taking the "Pentesting with Backtrack". Course and successfully completing the OSCP exam challenge before you take the " Cracking the Perimeter. I attempt...
theevilbit.blogspot.com
The Evil Bit Blog: November 2014
http://theevilbit.blogspot.com/2014_11_01_archive.html
The Evil Bit Blog. Forensics, Pentesting, Networking and Security. Wednesday, November 26, 2014. FireEye's FLARE ON challenge solutions 1-4. Here are my solutions for FireEye's FLARE On challenges, which you can download from here:. Http:/ www.flare-on.com/. This is a .NET executable, I used ILSpy. To decompile the app. There was a decode function, which decoded the Resources.dat secret byte stream:. We could export the stream with clicking on the Resources item, and then save it. Byte = f.read(31).