Well, I decided to finally register for the Penetration Testing with Kali (PWK) course and the subsequent OSCP certification exam.
I decided to sign up for the 90 day lab access version after my (slow) experience with CPPT as well as the need to work/travel.
While I’m not to worried about the course or the materials, I do have a few goals/things to keep in mind other than getting the actual cert.
- I want to automate more of my enumeration/exploitation/ex-filtration as well as keep these scripts somewhere to use later.
- Improve my ability to pivot without constantly looking at documentation, improve my ability to tunnel all tools through my pivoted tunnels.
- Get better at non basic (simple BOF -> JMP) exploit development.
- Improve my pentest report template and content.
- Find faster and cleaner methods of privilege escalation as well as data ex-filtration.
- Increase my knowledge and usage of Metasploit (yea, this is usually the opposite for most people, but I rarely use it and am still not super efficient in it).
Other than that, my course starts on the 12th and I’m looking forward to all of the materials, but more importantly a lab environment to play in again.
Ray Doyle is an avid pentester/security enthusiast/beer connoisseur who has worked in IT for almost 16 years now. From building machines and the software on them, to breaking into them and tearing it all down; he’s done it all. To show for it, he has obtained an OSCE, OSCP, eCPPT, GXPN, eWPT, eWPTX, SLAE, eMAPT, Security+, ICAgile CP, ITIL v3 Foundation, and even a sabermetrics certification!
He currently serves as a Senior Staff Adversarial Engineer for Avalara, and his previous position was a Principal Penetration Testing Consultant for Secureworks.
This page contains links to products that I may receive compensation from at no additional cost to you. View my Affiliate Disclosure page here. As an Amazon Associate, I earn from qualifying purchases.