How To Hack The Box To Your OSCP (Part 2)
What you'll learn
- Technical confidence needed to take on the OSCP exam
- Attacker tradecraft mapped to the MITRE ATT&CK Framework
- New tooling and techniques to conduct higher quality penetration tests and red team exercises.
- Expert tips and tactics for becoming a competent offensive cyber security professional
- Basic computer with at least 16GB of RAM
- VMWare Workstation Trial
- VIP Hack The Box Account
- Constant Curiosity and a thirst to learn new things :)
Hack The Box is becoming ascendant in the penetration testing infosec community. It has rapidly risen to stardom as super hackers such as IppSec and 0xdf have published tons of free material helping our community graduate from n00b to ninja. Hack The Box has gameified hacking and has made the entire learning process both fun and educational.
In this course I wanted to give you a set of boxes that are more challenging to hack. If you're looking for harder boxes and want to peek inside my hacking methodology, mindset and technique then this course is for you. You won't pass the OSCP exam from simply going through these videos lectures and I currently don't have the OSCP cert. I've taken the training material and took the 24 hour exam but failed it. BUT! Instead of letting that get me down, I decided to create an online course as a means of helping me master the concepts I encountered in my training and on the exam. I created this course as a means of helping me pass the exam and helping others as we go through the journey together.
The good news is the training in this course will help you because you'll develop the attacker tradecraft and technical skillset needed to compromise systems. You'll also learn why attacks work. This isn't a course about push-button-hacking. You will learn the rationale behind various real-world attacks and understand the gotches and pitfalls newbies make when using select tools.
We are about to have a lot of fun and I can hardly wait to come along side you on your journey to earning your OSCP. Are you ready to have fun studying for this thing?
Get prepared to go on a ride. You’re about to learn a lot and many of the tactics and techniques we leverage align with real world scenarios.
All attacks and techniques are mapped to the MITRE ATT&CK Framework.
If you're a software engineering dreaming about how to pwn boxes then this course is for you.
If you're the curious type who wonders what could have been done differently after rooting a box or if you want to know WHY exploits fail... then this course is for you.
If you want to stop feeling like an imposter who acts like you know what you're talking about and want to finally feel the confidence, pleasure and peace that comes from REALLY knowing what you're talking about.. then this.... course.... is for you.
Let's go! You got this baby!
Who this course is for:
- Students who want to understand the thinking methodology behind hacking computers
- Students who want to earn their OSCP Certification
I'll never forget the day I first got hacked.
I was fooling around in an AOL chat room downloading little hacking programs called proggies and punters. I thought I was special, or leet as they call it, simply because I had a lowercase screenname which made me a bit mysterious since AOL didn't let ordinary people create lowercase names (called icases); my icase indicated that I knew how to "hack" the system.
I also commanded a vast array of punters including Fate X, HaVok Platinum, Firetoolz and Area51. Punters were tiny programs that let you violate AOL's terms of service by booting innocent people off AOL. If someone made me mad I would just click a button and send them into oblivion. The victim would almost immediately be forced to logoff and go through the painful process of dialing-up and reconnecting.. These proggies also let you scroll text super fast which would prevent other people from chatting and force them to leave the room.
Now that that I think about it, I was was probably at the apex of immaturity but I was barely in middle school and booting people offline was simply too much fun.
But one day I met my match.
I downloaded a program that was purportedly a new punter that had a bevy of features that my other tools lacked. Everything was fun in the beginning but after a few days weird things started happening to my computer.
For example, my CD-ROM would randomly open on its own, my mouse cursor seemed to move without my input and strange programs would sometimes leap onto my screen and then instantly vanish.
I was freaking out! It's really hard to describe just how scary this was.
I had no idea what was happening but I had to find out. Apparently whoever, (or whatever) had seized control of my computer didn't make any effort to hide his or her antics. After a few weeks of complete frustration, a chat box popped on my screen from an unknown name. I was the guy who hacked me. He started to taunt me by saying things like "i got you" or "your password is 1234567"
This is when I made it my mission to figure out as much as I could about this person and his methodology. After several interactions I learned he was using a remote access trojan called SubSeven. I quickly scoured the internet looking for this tool and once I found it I found my new love.
That's how I got into cybersecurity and ethical hacking. I was hacked and wanted to learn how it happened.
Unfortunately, back in middle school my motives weren't so pure and I used my new skills to hack other victims; however, after graduating from high school and with a little prodding by my dad to explore programming, I decided I wanted to major in Computer Science to do good in the world.
Since then I've never looked back.
So who am I? My name is Vonnie Hudson and I have over 13 years of hands-on experience maintaining, troubleshooting and repairing computer software and hardware. I actually started my career as a technical support analyst at a satellite internet company and eventually landed a job at IBM as a security engineer. From there I became the IT director of a large multimedia enterprise based in Time Square, New York.
I'm currently a Senior CyberSecurity Analyst at a large D.C based firm and I regularly contribute to the information security community by attending information security conferences and webinars and sharing my knowledge on my blog and email list.
My blog, fixedByVonnie, gets about half a million visitors per month. The articles span topics ranging from speeding up your browser to ethical hacking with Kali Linux.
I'm also an author and have published a highly rated Windows 8.1/10 Kindle book on Amazon. And always being an avid learner myself, I hold numerous industry standard certifications in good standing including the A+, Network+, Security+, CCNA, CCNP, CISSP and GCIH.
I have a lively Youtube channel, loyal Twitter following and a bunch of book and video ideas which I can't wait to implement. Thanks for reading my profile and checking out my videos - it's going to be a fun ride!
I think my teaching style is a bit unique. I try to respect your time by quickly getting into the content but I also let my personality bleed into everything I do. My videos sometimes feel like you have your very own guru sitting next to you showing you step-by-step how to learn. I promise you that you'll not only get your solid fill of content from my videos but also take away few laughs alone the way. I can't wait to see you inside!