OSCP Week 7

Finished up Chapter 8 in the PDF (Linux Buffer Overflows) and learned a new technique about modifying the address of a register I want to jump to in the case of needing to skip some memory locations that I didn't have control over.

Also went through Chapter 9 (Public Exploits) which was just a lot of refreshing for finding and using public exploits as well as (the horrors of) modifying them so that they compile/run/don't have malicious shellcode.

Additionally, I FINALLY started in the lab and knocked out 7 of the "easier" boxes (at least in my opinion) and started doing some further enumeration and information gathering.

It is nice being back in a lab environment like this, and while it will definitely get harder, I'm looking forward to discovering all the networks and owning all the boxes.

doyler on Githubdoyler on Twitter
doyler
Ray Doyle is an avid pentester/security enthusiast/beer connoisseur who has worked in IT for almost 16 years now. From building machines and the software on them, to breaking into them and tearing it all down; he's done it all. To show for it, he has obtained an OSCE, OSCP, eCPPT, GXPN, eWPT, eWPTX, SLAE, eMAPT, Security+, ICAgile CP, ITIL v3 Foundation, and even a sabermetrics certification!

He currently serves as a Principal Penetration Testing Consultant for Secureworks. His previous position was a Senior Penetration Tester for a major financial institution.

When he's not figuring out what cert to get next or side project to work on, he enjoys playing video games, traveling, and watching sports.

Leave a Comment

Filed under Security Not Included

Leave a Reply

Your email address will not be published. Required fields are marked *

*

This site uses Akismet to reduce spam. Learn how your comment data is processed.