I’m working through the OSCP course work. And I don’t know what to feel, because this is all simple basic shit. I already know how to do everything in the course. This isn’t a good course nor is the material any good. Well maybe it is, but I already know the content.
So why do I struggle to actually pop boxes so much? I struggle and scrape to get through boot2rooots and CTFs from vulnhub, I’ve only got three of the easy boxes from HTB under my belt; what am I missing? This course work is too simple. Why aren’t I good at popping boxes?
Easton Jenkins
First, stop saying "pop boxes", you sound like a gigantic faggot. Second, just keep working through online wargames
Thomas Hill
>Advanced Penetration Testing This is not a good book
Nathan Jackson
Fuck off and fuck you.
Jacob King
>smirks Maybe you should get back to practicing so you can learn to "pop boxes"
Luke Russell
agreed, it is some of the most ridiculous trash i have ever read. complete fucking fantasy
can someone redpill me on fail2ban? can i automatically find out the region where it's coming from?
Austin Sanders
Enumerate the boxes you're working on thoroughly. port scan, vuln scan, or use superscan if you still cannot figure it out. >t. oscp
Ian Peterson
>superscan I’ll look this one up, ty
Nathan Gomez
Hm it’s windows only
Logan Lopez
Daily reminder that whether you think you can or can't, you're right Keep your chin up and stay positive. Also inb4 the obligatory MUH BLAK HAT UR ALL SKIDS poster who can't even break into htb
Thanks dude, I got a road trip tomorrow so ill download the pdf's tonight.
Gabriel Cooper
Pretty bloody obvious. I want to rectify this, clearly.
Samuel Carter
Insomnia bump
Eli Scott
insomina? its 445am and im working nugga
Jayden Ramirez
Honestly man, the real content is the labs. I am taking my exam next week.
Gabriel Walker
Ty for bumping non OP guy, I am glad to have someone else in here who likes this thread.
Sadly this isn’t going well. I don’t think I’ll make another hmg. I’d love to find a way to contact maderas, but otherwise I’m just not getting anything out of the handsome man generals ive made since Christmas.
It’s a shame that I do my best study in this field solo. I’d love some dedicated friends in the arena to learn with, but as evident by this thread, and all the others in the many, many archives, they are just filled with shitposters.
Such a shame.
Joseph Gonzalez
Anyone in here into memory corruption vulnerability analysis/exploit dev? I'm too much of a brainlet to do any vuln hunting in 64bit environments with ASLR/DEP/other exploit mitigations enabled.
Landon Nguyen
>break into htb not exactly difficult nor "breaking in"
Juan Ward
Yeah I'm pretty big into it. Work takes up much of my time though so I haven't been doing much bug hunting lately.
Matthew Flores
Got any nice cves under your belt?
Michael Hall
Never bothered with that shit. It's a bit of a waste of time as far as I'm concerned.
Zachary Long
Here's a list of legal links to practice on. Finish all of these, and you will be pretty good.
IM A NEGROHAT YOU"RE ALL SKIDS AND OP GAVE YOU ALL SHIT RESOURCES ENJOY ACHIEVING ENTRY LEVEL SHIT.
D'awwww you missed me
Kayden Sanchez
If you really know all the course material, "popping boxes" wouldn't be that hard for you.
Stop being such a fucking egomaniacal faggot, and try harder.
Sincerely, oscp-certified-fag
Tyler Smith
I like these threads and its a shame they don't a ton of interaction. As someone who is interested in information security but know little to nothing, it'd be awesome to learn with others.
Kevin Watson
>it's not hard That's the joke retard
Xavier Sanchez
currently running random -iR 10000 for port 3389. ive come acumulated a varied list of potential targets to check but without doing any recon at this point ide be blindly bruting the login.
other than that ive been playing the fool with the "do not scan these IP's" list (you all know which one i mean)
Carter Gomez
Other than unlinking your process from EPROCESS, what other stealth techniques do you have for winblows?
Unlinking a process from EPROCESS is easily detectable by most AV.
More stealth would be injecting your process into another. This can be done in a lot of ways, but one of the more recent ones is process doppelgänging.
Web dev guy here; I'm interesting in it and I have a few questions. 1. Do I need to study networking deeply before the OSCP (like CCNA -level) or can I learn as I go? 2. Did you get a job easily once you have OSCP? 3. Can you get another job than pen tester? And finally; 4. I've read that pen testing is a lot of repetition; writing reports and going to the clients. Is that your experience as well?
Brody Cox
Why? It could make you money and put your name in good rep around the community.
Christian Jackson
This is nice, thanks man
Gavin Gonzalez
Let's collaborate, OP. Who knows, maybe someday out of a pile of shit threads a golden boy will pop up. There's was an epic thread on g about some wanker running Raid 0 on 16hdds and his data got corrupted on one so he lost them all. I still remember it to this day. Anyway user, what are you working on right now? I'm trying to work my way through WEb App hackers handbook and do big bounties. I have experience with boot to root. And some meh cybrary classes. Also programmed as a hobbyist for awhile
Nathaniel Richardson
1. No, but you need to have a decent knowledge of core concepts. 2. I got OSCP on the job, but it definitely makes getting a pentesting job way easier. Anyone with technical skills will consider CEH worthless though. 3. I would say you can transition to a lot of other related jobs if you have some skills. Programming and consulting for one. 4. Yes, literally half of my job consists of writing reports and often going to customers.
David Nelson
I like this thread and am interested in security. Doing the bandit stuff atm, hope the thread gets more traction.
Adam Williams
Holy shit this thread survived the night, so now I can reply to you. Today is going to be a good day.
>what are you working on A few different things. I got a new job as a sysadmin, so I am doing things like DFS replication and practicing SYSVOL migrations so I can make them die and fix it. As for Infosex I am going through HTB, rooted a few boxes there, going through the PWK material from the link above, and am just generally grinding it out until I feel confident enough to actually pay my OSCP fee and tackle the lab.
>sysadmin work >HTB >PWK
is the tldr.
What about you?
Jose Ramirez
>Doing the bandit stuff atm Remember that stuff is a Linux primer, not a sec primer. Once you’ve got bandit underway, snap up some boot2roots like kioptrix and off you go
Cooper Mitchell
>hope the thread gets more traction. no you dont. go see what the current state of the cyb threads are. more active threads bring the lowest class of fuckwit in.
Christopher Foster
>Remember that stuff is a Linux primer, not a sec primer. Once you’ve got bandit underway, snap up some boot2roots like kioptrix and off you go Yeah, still I learned some useful stuff from it, now I'm stuck at level 29. I will give kioptrix a try, thanks.
We still need people to show interest so OP(s) don't get discouraged. So few good threads on Jow Forums lately.
Hunter Fisher
>level 29. Fucking what
Did they add a few more? Last level I played was the ZSH one which I think was 26 or so
Brayden Walker
Yeah about 6 new levels. These focus on git exploits it seems, I got stuck pretty early.
Lincoln Gomez
>Yeah about 6 new levels. Well I guess i needed something to keep me occupied over the weekend
Leo Miller
OP or anyone else. I'm interested in getting a good understanding of pentesting for fun. Thought about doing OSCP to get the foundations and certified. Current knowledge is a basic understanding of networking, frequent Linux usage and understanding, and a strong programming background.
Isaiah Walker
I swear to god, I can’t get past level 0 of the bandit thing. I fucking am doing everything that every walkthrough and wikihow says and yet it still doesn’t work. Someone help
Still haven't made any money yet, so I fell like an absolute brainlet
David Phillips
Thanks
Jordan Baker
Wait can you explain what I do?
Josiah Russell
>use Linux >open terminal
ssh user@address -p portNumber
Dominic Nguyen
Have been working on several poker related programs for a few years (not bots) mostly interoperability programs, that will for example read the bet sizes on a table and convert them to big blinds. Simple stuff included hooking winapi functions like DrawText, other things included hooking Qt functions, or completely random places in code. Now mobile apps have become popular, which many people use on emulators. Tried messing with the apk code, but couldn't get past the security restrictions of android, checksums, certificates and so on. Thinking about learning more about network sniffing now, but not sure if it will be worth the time, as some good tools already exist. There are still some useful things I could build, but maybe not really worth the effort at this point.
Nathan Sanders
stop holding his hand you fucking kook, the proper answer was
man ssh
Christopher Johnson
We all need help sometimes
Adrian Lopez
Nothing, my motivation comes and goes. One week im motivated, finish 90% of the project, and then lose motivation. Im professor calamitous from jimmy neutron, essentially.
I managed to get into hackthebox with only a /tiny/ amount of googling, now I'm going to read a bunch and try and do the easy boxes.
In terms of real shit, I plan to do a lot of sniffing for wifi data once I move into my new uni flat, see if I can get lucky with a couple WEP protected routers or even find ones that have MAC addresses for passwords, or even admin/password.
Anthony Fisher
>try and do the easy boxes.
Jerry Poison Celestial
These are the three I found reasonably easy.
Jaxon Morales
>WEP protected
If your uni is using this, then yes, they deserve to get their wifi cracked... It literally takes minutes.
John Ross
Nah not my uni, every user has their own username and password so it's more complex than a regular home network, as you'd imagine. They do use MSCHAPv2 though which I recall reading somewhere isn't super secure. Maybe in the future when I've learnt more I'll give their network a go. For now though, I just mean other houses around where I live.
Nicholas Sanders
You’re about half a decade too late. Even the shittiest of ISPs ship routers with WPA2 codes taped to them.
Oliver Morgan
Oh shit they do don't they. I was just thinking cus I was messing with old routers recently to turn them into switches and they used MAC addresses and generic passwords by default, but thinking about it my home router has an actual password by default now.
Guess I gotta try it out in the suburbs where no one's changed their routers for the past 5 years.
Hudson Gutierrez
I haven’t dug into it for a while because stealing internet isn’t as important to me now I’ve got MIMO gear and refuse to go backwards in speeds, but if there’s a POC in the wild for the KRACK vuln you can exploit WPA2
Logan Carter
That over the wire bandit thing is some bullshit..how is leraning all the different ways to use find going to teach me hacking? I can see it being useful for learning to be a sysadmin but is this really the thread for that?
David Williams
>how is leraning all the different ways to use find going to teach me hacking? It doesn’t. It teaches you to be comfortable with Linux.
Jordan Baker
I found something about .htaccess, it can bring down the whole data center where the file is uploaded to, especially if it's running on a VPS-based network. Basically, add 15-20 MB worth of IP and IP ranges filtering rules in the file then upload the file. Keep in mind your server will be the first affected, especially if your traffic is a bit high, you won't be able to delete it once the upload is complete.
It happened twice to me from two different providers, of course my server got nuked and I got banned after but it was worth trying.
Nolan Brown
>I got banned after but it was worth trying. Hmm
Owen Rivera
My account and the associated payment informations, to be precise, were blocked. I can make a new one under a new paypal but I don't really care, for now. I tried to get the account unbanned saying "it was an accident" but they didn't care naturally.
Tyler Wilson
I’m thinking it’s time I part with my money and try the OSCP. I’m scared for two reasons; the first being I’m hell under prepared, and the second being I achieve it and don’t know what to after that.
I am 26 and just started a new role as a sysadmin. Is it too late to start from scratch in a new industry?
>Is it too late to start from scratch in a new industry? Lol you’re young as fuck
Jeremiah Stewart
Mr Robot has nothing to do with hacking
Ryder James
>Mr Robot has nothing to do with hacking >a show about hacking has nothing to do with hacking
Jace Butler
Why are you so pretentious?
Ian Gomez
>monkeys can interpret scan results Why do you enjoy tearing people down?
Austin Brown
If only there were some other, recently related interest that you could merge threads with in order to have bumps.
Jackson Morgan
This is LARP
Jace Campbell
Imagine being this much of a gatekeeping fuckwit.
Isaiah Stewart
That sounds fucking terrible.
Bentley Hernandez
Is there a way to get an .mfa file from .exe game made in Multimedia fusion? I know people did this with the FNAF game but I'm a complete dumbo. Basically decompile the game or something.. like that?
That's like saying Game of Thrones has something to do with swordfighting. Maybe if you're a LARPer.
Xavier Smith
Beginner here. Just started learning html, css and c paralelly. Should I start learning pentesting or let's say paralelly learn hexxing or learn a few more programming languages and then start learning??
Nathaniel Reyes
I'm not sure if this question belongs ITT but do you know of a good guide for setting up a SOCKS proxy on a vps?
So far what I've figured is that you need to install OpenSSH on let's say Ubuntu server and that's pretty much it?
Andrew Wood
I meant SOCKS5 proxy, sorry.
Ethan Nguyen
I go to cons and stuff once or twice a year and hang out with some people from the skidosphere. Don't really care for money or attention; I have a pretty ordinary and decently enough paying job. Honestly I just don't have the motivation to be doing any serious reverse engineering stuff right now; but I often have some small personal project on the go. Nah I'm not saying I've hacked some big company or some dumb shit like that. I just like reverse engineering for fun. Last year work was pretty quiet so I spent a lot of time reversing and writing exploits for a certain enterprise application development framework. Managed to steal baked-in encryption keys, credentials, and write two RCE exploits for both the web frontend and service dispatcher between the client and server. Most of the bugs I found are pretty useless, but a few of them; outside of the ones I used in my server exploit chain, are pretty fun.
Ryan Murphy
shadowsocks
Jacob Flores
he's right though. this is like getting stuck on a tutorial level. people need to learn how to help themselves, the answer was a quick search away.
Hudson Hughes
thanks! It's just what I needed.
Levi White
Even /sqt/ has a clause to at least google the answer before asking.
/fglt/ Has the following things to try before asking: >$ man %command% >$ info %command% >$ help %command% >$ %command% -h >$ %command% --help >Don't know what to look for? >$ apropos %something%
Honestly if you go through all that then ask a stupid question in a friendly Gnu/Linux thread about compsec/pentesting them maybe you deserve some honest help. Else anything negative that comes to you isn't "gatekeeping" but actually keeping standards sacred.