Cybersecurity Career Beyond OSCP: What Comes After OSCP?
Introduction This post explores career advancement options and certifications for cybersecurity professionals who have obtained the Offensive…
Introduction This post explores career advancement options and certifications for cybersecurity professionals who have obtained the Offensive…
Introduction The cybersecurity landscape offers several certifications for professionals aiming to validate their penetration testing skills. Among…
Introduction The Offensive Security Certified Professional (OSCP) and CompTIA PenTest+ are two prominent certifications in the field…
Introduction The Offensive Security Certified Professional (OSCP) and Certified Ethical Hacker certifications are both reputable credentials in…
Introduction In the rapidly growing field of cybersecurity, certifications like the Offensive Security Certified Professional (OSCP) have…
Introduction The Offensive Security Certified Professional (OSCP) and Hack The Box Certified Penetration Testing Specialist (CPTS) certifications…
In this post, we covered a black box penetration testing challenge where we performed initial port scanning,…
We covered a scenario of a vulnerable Microsoft IIS web server which was leveraged to compromise a…
Premise In this walk-through, we demonstrated the exploitation of a vulnerable Tomcat Web-server to gain initial access…
Premise In this walkthrough, we went over a Linux lab machine and demonstrated basic application and use…
We demonstrated how to do privilege escalation on windows after grabbing plain text credentials in XML files….
Premise In this post, we went over fingerprinting and discovering firewalls and Instruction detection systems. We used…
Premise In this post walk-through, we demonstrated how to conduct security testing for SQL Databases deployed to…
Premise In this post walkthrough, we demonstrated how to move from local file inclusion into the remote…
Introduction In this post tutorial, we went over a machine in cyberseclabs that goes by Boats. We…
Premise In this post walkthrough, we went over one of the machines in cyberseclabs that goes by…
Premise In this post, I’ll show you how I performed a basic penetration test on a Windows…
In this article, we will discuss combining Nmap and Metasploit together to perform port scanning and enumerate…
Premise In this post walkthrough, I demonstrated how to compromise and get a reverse connection starting from…
Premise In this post walkthrough, I solved a CTF challenge designed to resemble OSCP Lab machines and…