Get Mystery Box with random crypto!

Mastering OSCP/OSCE

Logo of telegram channel oscp_osce_master — Mastering OSCP/OSCE M
Logo of telegram channel oscp_osce_master — Mastering OSCP/OSCE
Channel address: @oscp_osce_master
Categories: Uncategorized
Language: English
Subscribers: 5.35K
Description from channel

NON OFFICIAL CHANNEL

Ratings & Reviews

3.00

2 reviews

Reviews can be left only by registered users. All reviews are moderated by admins.

5 stars

1

4 stars

0

3 stars

0

2 stars

0

1 stars

1


The latest Messages

2019-09-01 13:47:12 https://www.bleepingcomputer.com/news/security/router-network-isolation-broken-by-covert-data-exfiltration/

Follow @oscp_osce_master
38.6K viewsedited  10:47
Open / Comment
2019-07-23 13:04:54 OSCP/OSCE/OSWP Review
https://www.offensive-security.com/offsec/oscp-osce-oswp-review/

It's no secret that Offensive Security offers some of the best technical training in the information security field. Their brand has become synonymous with penetration testing in the eyes of most tech recruiters on LinkedIn.
Some of the most common questions I get on LinkedIn are related to the OSCP/OSCE/OSWP certifications. Some people even go as far as asking for solutions to their exam machines. Sorry, you won't be finding anything like that here (TRY HARDER). I will however offer an honest review and offer some tips to help you decide if you are ready to take the plunge into any of these 3 awesome courses!
This article originally appeared on Jul 20, 2019, posted by Joey Lane and has been republished unedited and in its entirety with permission from the author. Original post: https://blog.own.sh/oscp-osce-oswp-review/
33.1K views10:04
Open / Comment
2019-07-09 13:35:54 Useful for local privesc on Windows systems; find unquoted service path using the following:
```
wmic service get name,displayname,pathname,startmode |findstr /i "Auto" |findstr /i /v "C:\Windows\\" |findstr /i /v """
```
#OSCP #Windows
Source: twitter.com/nemesis09
24.9K views10:35
Open / Comment
2019-06-30 14:51:01 https://medium.com/@fsx30/weaponizing-vulnerable-driver-for-privilege-escalation-gigabyte-edition-e73ee523598b

Follow @oscp_osce_master
25.4K views11:51
Open / Comment
2019-06-30 14:44:06 https://medium.com/@vickieli/how-to-write-a-better-vulnerability-report-20163ab913fb

Follow @oscp_osce_master
22.0K views11:44
Open / Comment
2019-06-30 14:43:37 https://medium.com/@AkshaySharmaUS/demystifying-java-jndi-attacks-b82018091a59

Follow @oscp_osce_master
19.4K views11:43
Open / Comment
2019-06-30 14:42:31 https://medium.com/@jonathan_fulton/web-architecture-101-a3224e126947

Follow @oscp_osce_master
17.3K viewsedited  11:42
Open / Comment
2019-06-27 21:42:26 http://blog.ret2.io/2018/06/05/pwn2own-2018-exploit-development/

Follow @oscp_osce_master
15.3K views18:42
Open / Comment
2019-06-13 11:37:45 Heap Overflow Exploitation on Windows 10 Explained

https://blog.rapid7.com/2019/06/12/heap-overflow-exploitation-on-windows-10-explained

Ref.: @WindowsHackingLibrary

Follow @oscp_osce_master
14.4K views08:37
Open / Comment
2019-06-12 14:31:14 https://medium.com/@Tib3rius/59-hosts-to-glory-passing-the-oscp-acf0fd384371

Follow @oscp_osce_master
12.8K views11:31
Open / Comment