Wednesday, 21st February 2018.

Posted on Monday, 19th February 2018 by Michael

In this video, I give a review of the Infosec Addicts Powershell for the infosec professional class. To learn more about this class or to sign up visit their website at the following link : https://infosecaddicts.com/product/unlimited-classes/

Posted in OSCP | Comments (0)

Posted on Thursday, 15th February 2018 by Michael

In this 4th video part 2 of the series. I take a look at sickos 1.2 and how to escalate our user-level shell to root. We will make use of Burp and some other tools for web testing. Stay tuned as we root this box. Some items that I did not get into the video. Bruteforce over ssh […]

Posted in OSCP | Comments (0)

Posted on Sunday, 11th February 2018 by Michael

In this 4th video of the series. I take a look at sickos 1.2 and gain a web shell on the system. We will make use of Burp and some other tools for web testing. Stay tuned as we explore this vuln VM further.

Posted in OSCP | Comments (1)

Posted on Monday, 5th February 2018 by Michael

In the final video on the BrainPan Vulnerable VM I look at gaining root access using the user shell I got from the buffer overflow. We will use tools such as LinEnum.sh and Linuxprivchecker.py to discover ways to privilege escalate to root.

Posted in OSCP | Comments (0)

Posted on Wednesday, 31st January 2018 by Michael

In this second installment of my progress against BrainPan I go through the identification of the buffer overflow vulnerability identifying the required bytes, offsets, returns and so on to craft my own exploit in python to gain shell access to the victim. Follow along and make sure you subscribe and like the video. If you […]

Posted in OSCP | Comments (0)

Posted on Sunday, 28th January 2018 by Michael

In this video, I take my first look at BrainPan. The video shows the identification of a buffer overflow in a service running and my ability to crash the application. In the next video, we will look at how to get control of the EIP and create a payload for exploitation. Make sure to subscribe […]

Posted in OSCP | Comments (0)

Posted on Friday, 26th January 2018 by Michael

In this video, I take a look at the vulnerable VM called Stapler. While there are many vectors to get to root. We will cover just one method from zero to hero in the video. Make sure to subscribe and like the video.

Posted in OSCP | Comments (0)

Posted on Friday, 26th January 2018 by Michael

Early this year I made an attempt at the OSCP. While I learned a lot I missed the passing grade by a few points. In this series, I will reflect back on that and discuss my path moving forward.  Follow me on youtube.com and subscribe.

Posted in OSCP | Comments (0)

About Consulting Products Page