Offsec Proving Grounds Walkthrough – Exghost

New OffSec Proving Grounds walkthrough. This time we tackle a machine called Exghost. This walkthrough involves: ☑️Brute forcing credentials ☑️Reading through a Wireshark packet capture file ☑️Crafting a malicious image to exploit ExifTool ☑️Exploiting a kernel vulnerability I had to get creative at the end and I leaned a bunch…

Walkthrough – Offsec Proving Grounds – Astronaut

New video - OffSec Proving Grounds Walkthrough of "Astronaut". This was an interesting box that we use many tools an techniques to pwn including Metasploit Framework, PHP reverse shell, and GTFObins! This is a complete walkthrough of the machine so don't watch the video unless you want help compromising the…

Walkthrough – Offsec Proving Grounds – Slort

🔔Another Offsec Proving Grounds Walkthrough - "Slort". ⚠️***SPOILER*** this is an entire walkthrough of the machine called Slort in Offsec's Proving Grounds...don't watch unless you want help getting through the machine.⚠️ We do things like: ✅Remote file inclusion attack to gain a foothold, ✅Utilize winPEAS and msfvenom to escalate privileges…

Which Certification for Entry Level Pentester (Pentest+, CEH, eJPT, or PJPT)?

In this video I talk about "entry" level penetration testing certifications that I have taken and if they prepare you for a junior level/entry level pentesting role. I have taken and passed all of these exams on the first try. The exams I cover in this video are: TCM Security…

Walkthrough – Offsec Proving Grounds – Algernon

🚨 New video - Offsec Proving Grounds Walkthrough of "Algernon" 🚨 This is one of the fastest times for me to pwn a machine. ***SPOILER*** this is an entire walkthrough of the machine called Algernon in Offsec's Proving Grounds...don't watch unless you want help getting through the machine. I hope…

Walkthrough – Offsec Proving Grounds – Levram

🚨 New video - Offsec Proving Grounds Walkthrough of "Levram" 🚨 In this video I show you how to install a Python virtual environment to handle library/package dependencies for exploit code written in Python. We also cover how to use a website called GTFObins to escalate privileges in Linux. ***SPOILER***…