OSCP - Can I use LLM made notes in my Obsidian?
Hey guys, I've been prepping for oscp for a while and I have OCD and perfectionist tendencies due to which I spent a lot of time researching and understanding a topic using Gemini and then 2x the time for creating theoritical and checklist notes. So, I was going very slow and I pasted a lot of theortical and practical notes in my obsidian directly from Gemini's explanation cause i really understood it well.
So, if i ever forget about it I can refer to gemini's explanation in the notes instead of going through different articles. The issue is the notes look a lot like AI made, i've not put gemini response or you asked stuff in the notes but it is very well organized section by section and lists. So, i am kind of afraid will this get me disqualified? I've been saving for this since a few years, I don't have a job and no employer paying for this. So, I really need an accurate answer. Example of my notes
SMB Signing: The Practical Flow
The first step is Negotiation which is Plaintext, Client sends I support signing and Server says I require signing and Attacker in the middle realizes he can't do anything. If he sends Signing DIsabled to client and it tries to connect without signing, Server will block it. The server simply says that either use signing or don't communicate there's no other option.
After the negotiation, Server generates a challenge and gives it to client for generating the netNTLM response. At this stage the Attacker in the middle (using ARP poisonings or Responder ) can dump the Netntlm response and crack it offline
Now, the Key Generation process starts, Client takes its Password Hash and some constant like AABBCC to generate the Session Key. Server does the same, It takes the User's Password Hash (from the local DB / AD) and the same constant value to create the Session Key. Attacker sees NOTHING causing all of this happening internally in the Client and Server devices, It isn't being sent over the network which the attacker is monitoring so it has no way to know
After this the Traffic starts getting signed, So we'll see the traffic, we'll be able to capture it, we'll also be able to read the data being sent or received but we can't modify the packet cause then we'll need to generate a new signature for which we need the user's password or the session key which we don't have