Saturday, 20th April 2024.

Posted on Tuesday, 19th March 2019 by Michael

Part of my Path to OSCP series. I will be documenting my lab time to help others progress through the labs. Giving tips and encouragement along the way. Today I completed days 87 -90. My lab is now over! As of now I have completed 99.5% of the public network. I went back and got a low priv shell on ghost, ran out of time trying for root, oh well. Check out my new Amazon link below, show anything you want with the link that you need and it supports this channel.

Patreon:
Help create new content: https://www.patreon.com/join/2391355 .

Support Me, While you shop Amazon. Just use the link below.
https://www.amazon.com/?tag=digitaloffens-20

Social Media Contact:
Twitter: https://twitter.com/genxweb
LinkedIn: https://www.linkedin.com/in/michael-lasalvia-7743732/
YouTube: https://www.youtube.com/user/genxweb

Posted in OSCP | Comments (0)

Posted on Friday, 15th March 2019 by Michael

Part of my Path to OSCP series. I will be documenting my lab time to help others progress through the labs. Giving tips and encouragement along the way. Today I completed days 80 - 86. As of now, I have completed 99% of the public network. I have unlocked all the networks. I have completed 90% of the IT, about 30% of the admin network and 0% of the Dev network. On this past Monday, I completed my last goal other than passing the exam. I finished the public machines that I wanted with the completion of PIE. Which is interesting as PIE day was Thursday which is a week before my exam. In the video, I cover lack of motivation, my final prep, next steps and what's to come. Check out my new Amazon link below, show anything you want with the link that you need and it supports this channel.

Patreon:
Help create new content: https://www.patreon.com/join/2391355 .

Suppport Me, While you shop amazon. Just use the link below.
https://www.amazon.com/?tag=digitaloffens-20

Social Media Contact:
Twitter: https://twitter.com/genxweb
LinkedIn: https://www.linkedin.com/in/michael-l…
YouTube:http:// https://www.youtube.com/user/genxweb

Posted in OSCP | Comments (0)

Posted on Friday, 8th March 2019 by Michael

Part of my Path to OSCP series. I will be documenting my lab time to help others progress through the labs. Giving tips and encouragement along the way. Today I completed days 73 - 79. As of now, I have completed 98% of the public network. I have unlocked all the networks. Which means I met my goal of finding the admin network. And unlocking it. This also allowed me to find a machine I been searching for several weeks to hope to complete another machine that relies on it. I give a quick review of pivoting and go over 3 main types that will help you in the labs, HTB, and real life. Check out my new Amazon link below, show anything you want with the link that you need and it supports this channel.

Patreon:
Help create new content: https://www.patreon.com/join/2391355 .

Support Me, While you shop Amazon. Just use the link below.
https://www.amazon.com/?tag=digitaloffens-20

Social Media Contact:
Twitter: https://twitter.com/genxweb
LinkedIn: https://www.linkedin.com/in/michael-l…
YouTube: https://www.youtube.com/user/genxweb

Posted in OSCP | Comments (0)

Posted on Friday, 1st March 2019 by Michael

Part of my Path to OSCP series. I will be documenting my lab time to help others progress through the labs. Giving tips and encouragement along the way. Today I completed days 66- 72. As of now, I have about 4 machines left in the public network to compromise. I have two more goals to complete in the next 18 days. 1 complete public network and 2 unlock admin network. In this video we cover identifying client-side attacks, delivery of client attacks, Window hashes and passwords, Suid /SGID attacks and Size does matter for payloads.


Patreon:
Help create new content: https://www.patreon.com/join/2391355 .

Store:
http://digitaloffensive.com/store -- don't see what you want, use any of the ads to search and purchase.

Social Media Contact:
Twitter: https://twitter.com/genxweb
LinkedIn: https://www.linkedin.com/in/michael-l…YouTube:https://www.youtube.com/user/genxweb

Posted in Uncategorized | Comments (0)

Posted on Thursday, 21st February 2019 by Michael

Part of my Path to OSCP series. I will be documenting my lab time to help others progress through the labs. Giving tips and encouragement along the way. Today I completed days 61 - 65. As of now, I have about 6 machines left in the public network to compromise. I have two more goals to complete in the next 25 days. 1 complete public network and 2 unlock admin network. In this video I choose the gift card winner, give you an update and look at some simple pivoting.

Patreon:
Help create new content: https://www.patreon.com/join/2391355 .

Store:
http://digitaloffensive.com/store -- don't see what you want, use any of the ads to search and purchase.

Social Media Contact:
Twitter: https://twitter.com/genxweb
LinkedIn: https://www.linkedin.com/in/michael-l…
YouTube: https://www.youtube.com/user/genxweb

Posted in OSCP | Comments (0)

Posted on Monday, 18th February 2019 by Michael

Part of my Path to OSCP series. I will be documenting my lab time to help others progress through the labs. Giving tips and encouragement along the way. Today I completed days 47 - 60. As of now, I have about 6 machines left in the public network to compromise. I am currently working on one of the IT machines. All my labs and exercises are done and focusing on the last few boxes in my remaining days. In the video we review some PowerShell tips, delivering php encoded payloads and samba enumeration. Along the way, I mention a few other great tools to check out.

Patreon:
Help create new content: https://www.patreon.com/join/2391355 .

Store:
http://digitaloffensive.com/store -- don't see what you want, use any of the ads to search and purchase.

Code from the video:

Samba Enumeration Script:
http://www.digitaloffensive.com/files/smbver.sh

Social Media Contact:
Twitter: https://twitter.com/genxweb
LinkedIn: https://www.linkedin.com/in/michael-l…
YouTube: https://www.youtube.com/user/genxweb

Posted in OSCP | Comments (0)

Posted on Sunday, 3rd February 2019 by Michael

Part of my Path to OSCP series. I will be documenting my lab time to help others progress through the labs. Giving tips and encouragement along the way. Today I completed days 34 - 46 As of now I have compromised 25 machines in the 46 days I been in the lab. I have also completed all of the labs and exercises as well as completed my lab report.
In this video, we will review three great tools for windows post-enumeration exploitation (JAWS, Powerless.bat, Windows-exploit-suggester)

Tools:
Powerless: https://github.com/M4ximuss/Powerless
Windows Exploit Suggester: https://github.com/GDSSecurity/Windows-Exploit-Suggester
JAWS: https://github.com/411Hall/JAWS

Patreon:
Help create new content: https://www.patreon.com/join/2391355 .

Amazon store:
http://www.digitaloffensive.com/store

Social Media Contact:
Twitter: https://twitter.com/genxweb
LinkedIn: https://www.linkedin.com/in/michael-l…
YouTube: https://www.youtube.com/user/genxweb

Posted in OSCP | Comments (0)

Posted on Wednesday, 23rd January 2019 by Michael

Today we detour from the OSCP and we look at a project that I use in my red team engagements and network pen-testing. While there are many videos on youtube about turning your raspberry pi into a kali attack box, they don’t cover it from a real-world scenario. Many are sitting on their home networks and more of a play with then actually use in production. Also many rely on using wifi on the companies network connectivity. Today we will use out of band connectivity to shovel a shell to us from within the network and pivot our attacking box through it to access the internal network resources.

Links from video:

OneHostcloud: https://onehostcloud.hosting/kali-lin...
VPSdime: http://www.vpsdime.com
Linode: http://www.linode.com
Kali Arm images: https://www.offensive-security.com/ka...

Build one yourself:
Raspberry Pi 3 w/ power adapter: https://amzn.to/2TdYXx2
16 gig micro sd card: https://amzn.to/2WlqiiK
Anker Battery pack: https://amzn.to/2Wc5PwG
Calyx Modem: https://www.calyxinstitute.org/member...
Pwnie Express: https://www.pwnieexpress.com/


Store: http://digitaloffensive.com/store -- don't see what you want, use any of the ads to search and purchase.


Social Media Contact:
Twitter: https://twitter.com/genxweb
LinkedIn: https://www.linkedin.com/in/michael-l...
YouTube: https://www.youtube.com/user/genxweb

Posted in Uncategorized | Comments (0)

Posted on Monday, 21st January 2019 by Michael

Part of my Path to OSCP series. I will be documenting my lab time to help others progress through the labs. Giving tips and encouragement along the way. Today I completed days 29 - 33 As of now I have compromised 22 machines in the 33 days I been in the lab. I have also completed all of the labs and exercises. I am currently working on my lab report. As you know from my last video, I am 3 days behind in my goal of completing labs and report by day 30. I plan to wrap up the report in the next day and spend the remainder working on the machines and honing my skills. I still have not re-compromised the machines I did the first time through the lab. That will come before I start on the new ones, next.

Patreon: Help create new content: https://www.patreon.com/join/2391355 .

Amazon store: http://www.digitaloffensive.com/store

Social Media Contact:

Twitter: https://twitter.com/genxweb

LinkedIn: https://www.linkedin.com/in/michael-l...

YouTube: https://www.youtube.com/user/genxweb

Outdoor Channel: https://www.youtube.com/channel/UC2N3...

Scuba Channel: https://www.youtube.com/channel/UCVe1...

Family Channel: https://www.youtube.com/channel/UCwpS...

Posted in Uncategorized | Comments (0)

Posted on Wednesday, 16th January 2019 by Michael

Part of my Path to OSCP series. I will be documenting my lab time to help others progress through the labs. Giving tips and encouragement along the way. Today I completed days 21-28 As of now I have compromised 20 machines in the 28 days I been in the lab. II have also completed 13 of the 18 Lab exercise sections. This leaves 5 to go. My goal is by day 30 is to complete all labs and have them documented as well as complete the lab report allowing for the remaining 60 days to compromise more boxes and improve my methodology and skills. In this video, I give a recap of my current progress but also give some career advice on education and skills. While to some this part is like seriously like people don't know that, others will find it helpful.

Amazon picks of the day:

Web Application Hackers Handbook: https://amzn.to/2VAhUvr
Buffer Overflow Attacks: Detect, Exploit, Prevent: https://amzn.to/2C7TbFM
Kali Linux - An Ethical Hacker's Cookbook: End-to-end penetration testing solutions: https://amzn.to/2ReHZBA

Store:
http:// http://digitaloffensive.com/store -- don't see what you want, use any of the ads to search and purchase.

Social Media Contact:
Twitter: https://twitter.com/genxweb
LinkedIn: https://www.linkedin.com/in/michael-l…
YouTube: https://www.youtube.com/user/genxweb

Posted in Uncategorized | Comments (0)

About Consulting Store