r/offensive_security

▲ 59 r/offensive_security+1 crossposts

70 Points in 4 Hours AMA

Took the OSCP on Friday, got my results today that I passed. Big shout-out to the community and looking to give back to anyone who's on their journey!

Finished AD set in approx 1:15hrs

Hit the gym for about 45 minutes

Crushed the first standalone in about an hour

Got the next foothold in about an hour.

Ended up with 80 points overall. After getting the points I took a few hours trying to priv ESC on the final 2 standalones but decided I'd just finish the report and hang out with my kids.

reddit.com
u/Leonzola — 2 days ago

Passed OSCP exam

Hello everyone, I’m happy to share that I have passed my OSCP exam in the first attempt. Thank you to all those who have been part of my journey. Feel free to ask any questions and I will try my best to answer them.

A few days ago, I replied with “Can I DM?” on a post in the OSCP subreddit. I got backlash for it and downvotes too. Today I would like to share why I wanted to DM. My intention was to not leak any information about the course and it’s lab unintentionally and my question being about labs I wanted to ask it in private space. I never wanted to cheat just to be clear as people thought I was trying to do it.

Anyways I understand why the reaction was that way and I’ll keep that in my mind. I don’t want to argue or prove someone wrong, just wanted to share my pov. Sorry if this went a bit off topic. Apologies for posting it here as I’m unable to post it in OSCP subreddit due to negative karma.

reddit.com
u/chicken-biryani-143 — 5 days ago
▲ 14 r/offensive_security+1 crossposts

Red Hat Certified Specialists in Security: Linux

Hello all,

I have been thinking about going for the Red Hat EX415 but haven’t found any books on Amazon or any available study material.

Any recommendations on where to find relevant study materials for this exam?

Thanks in advance!!

reddit.com
u/EducationalHour1986 — 24 hours ago

Offline Pentest Cheatsheet Terminal for OSCP/OSEP (580+ Commands + Auto Variable Replace)

Hey everyone,

I made a beautiful offline pentest cheatsheet that works like a real terminal.

**Highlights:**

- 580+ commands

- Automatic variable substitution (IP, domain, username, etc.)

- Favorites, Notes & Target panel

- No internet required

**Live Demo:** https://anshu19981.github.io/Pentestcheatsheet/

**GitHub:** https://github.com/anshu19981/Pentestcheatsheet

Any feedback is highly appreciated!

https://preview.redd.it/a5p9is0xyf0h1.png?width=1919&format=png&auto=webp&s=857fcdeef2be140b1d39399737c826ca6c820734

https://preview.redd.it/070sru0xyf0h1.png?width=1919&format=png&auto=webp&s=e689319830f1ce0a30c3000ed80791fe8f339034

reddit.com
u/Affectionate-Mail507 — 3 days ago

Where do you spend most of your time ?

I’m a cybersecurity student focusing mostly on offensive security right now (HTB, CTFs, labs, etc.).

One thing I’ve been wondering about is where people actually spend most of their time during engagements, pentests, research, or even CTFs.

For me, it’s usually recon/enumeration.
At the moment my workflow is pretty basic:

  • full port scan with nmap
  • targeted service scan on open ports
  • web enumeration
  • manual inspection
  • some directory/subdomain fuzzing

But I feel like experienced people probably spend a lot of time on things that beginners don’t even notice yet.

So I’m curious:
what part of offensive work actually consumes the most time for you?

Recon? Enumeration? Priv esc? Reporting? Infrastructure? Pivoting? Debugging exploit chains? Something else entirely?

Would also be interested in hearing about workflow bottlenecks or things that still feel unnecessarily painful even with experience.

reddit.com
u/yourAverageSkid — 5 days ago
▲ 34 r/offensive_security+1 crossposts

Hey everyone,

I put together a small Bash wrapper for NetExec called nxc-sweep to help speed up credentialed enumeration on Windows/AD targets.

It uses netcat first to check if the port's even open before using nxc on SMB, RDP, WinRM, MSSQL, and FTP. If the port isn't open, it'll skip it and move on

I've been using it a lot during my OSCP+ prep and while working through many HTB boxes. It hasn't failed me yet, so I wanted to share with the community and get any thoughts or feedback.

Here's a link to my LinkedIn post: https://www.linkedin.com/feed/update/urn:li:activity:7455985386528501760/

Or if you wanna go straight to the repo: https://github.com/corey-farley/nxc-sweep

Hope some of you find it useful for your labs or exam prep!

u/Unable-Preference913 — 12 days ago

Does OSCP hold any weight for other security roles? Im curious if hiring managers or HR look for oscp when considering requirements for other roles like security engineer or if seeing oscp on a candidates resume catch a hiring manager’s attention.

reddit.com
u/DontCountOnMe22 — 10 days ago