r/offensive_security

▲ 34 r/offensive_security+15 crossposts

48 saatlik HASBLCTF'26 CTF yarışması

Öncelikle bu konunun bir reklam olmadığını, sadece liseli gençler olarak düzenlediğimiz bu etkinliğin daha fazla kişiye duyurulması amacıyla paylaşıldığını belirtmek isterim.

Kısaca: Biz 4 kişi HASBL CTF adında Jeopardy formatında olacak bir CTF düzenliyoruz, katılım linki en aşağıda mevcuttur.

Peki CTF nedir? CTF yani; Capture The Flag (Bayrağı Yakala), siber güvenlik alanında farklı kategorilerdeki becerilerimizi test etmek ve geliştirmek amacı güden bir yarışma formatıdır. Amacımız kategoriye göre verilen sorudaki açığı bularak cevaba (flag'e) erişmektir:

Kendimizden bahsetmem gerekirse biz sosyal bilimler lisesinde 11. sınıf öğrencisi olan 4 kişiyiz ve birçok CTF'e katıldıktan sonra; "Neden soru yazmayı da denemiyoruz?" dedik ve kendi CTF yarışmamızı yapmak istedik. Elimizden gelenin en iyisini yaparak bir şeyler yaptık işte...

Etkinlik detaylarına geçmek gerekirse:

Kategoriler:​

  • Web: Açtığınız Instance'da zafiyet bulup flag'e ulaşmak.
  • OSINT (Açık Kaynaklı Bilgi/İstihbarat): Soruda verilen foto/video, sosyal medya hesap adı vb. ortamlarda kanıt inceleme ve analiz ederek flag'e ulaşmak.
  • Cryptography (Kriptografi): Şifre kırma diyebiliriz basitçe. Kod ve/veya verinin mantığını çözerek şifrelenmiş flag'i okunabilir hale getirerek flag'e ulaşmak.
  • Reverse/Reverse Engineering (Tersine Mühendislik): Derlenmiş bir yazılımı yada makine kodunun bazı programları kullanarak nasıl çalıştığını çözüp okunabilir hale getirme ve flag'e ulaşmak.
  • Pwn (Zaafiyet/Sömürü): Hedef olarak verilen sistemin güvenlik açıklarını bularak sisteme sızıp yetki yükseltme ve flag'e ulaşmak.
  • Forensic (Adli Bilişim): Dijital kanıtların (log, disk görüntüsü, wireshark vb.) inceleyerek flag'e ulaşmak.

Kategorilerin tanımını yaparken ben bile kötü bir şey yapıyormuş hissiyatına kapıldım ama emin olun öyle bir şey yapmıyoruz kesinlikle 

Tarih:​

  • 29 - 30 - 31 Mayıs tarihlerinde 48 saat sürecek.

Platform:​

  • CTFd altyapısı üzerinden kendi sunucularımızda (Google Cloud) gerçekleşecek.
  • CTF Time üzerinden de yarışma duyurusu yaptık ama kabul bekliyoruz, CTF'lerde önemli olduğu için kabul aldığında eklerim buraya.

Kurallar: Kurallar sitemizde yer almakta ama kısaca önemli birkaç kurala değineyim.​

  • Takımlar en az 1, en fazla 4 kişilik olabilir.
  • Flag paylaşımı yapmak yasak.
  • Yarışma boyunca write-up yayınlamak yasak.
  • Yarışma sürecinde yarışmacıların birbirine saygılı olması ve sportmen olması önem arz etmekte.

Kayıt ve Daha fazla bilgi için:​

  • Kayıt ve daha fazla bilgi için sitemizi bağlantı kımından ziyaret edebilirsiniz.
  • Yarışma sürecince kayıtlar açık olacak ve belirli bir şart olmaksızın isteyen herkes katılabilecek.
  • Ödüller daha belli değil (TBA) maalesef..
  • Lise düzeyinde kısıtlı süre ve bütçede hazırladığımız bu etkinlikte hata olacaktır ama bunları düzeltmeye ve kendimizi geliştirmeye özen gösteriyoruz.
  • Sitede ve yarışma genelinde bir öneriniz, sorunuz olursa; bunları duymakta, cevaplamakta ve geliştirmekten memnuniyet duyarız.

Şimdiden ilgi gösteren herkese ve CuteTopia Sub'ına bu konuyu açamama izin verdiği için teşekkür ederim.

hasblctf.tech
u/Rav3nnd — 3 days ago

Maintain OSCP+ by CPE – Worth It?

Hi everyone, I recently passed OSCP+ and I’m thinking about whether it’s worth maintaining the certification through CPE points. From what I understand, I may need around 120 CPE points before the certification expires.
I’m also considering subscribing annually to OffSec to continue learning and collecting CPEs, but the cost is quite high for me due to currency conversion to USD. My company does provide a budget for training and certifications, but after conversion, it still becomes expensive.
For those who already maintain OSCP+:

Is it worth keeping active through CPEs?
-How do you usually collect your CPE points?
-Do you continue with OffSec subscriptions, or use alternative platforms/training?
-From a career perspective, does maintaining the active status really help?

reddit.com
u/Highlight-Simple — 3 days ago

How did you guys get an entry-level security/IT job after getting the OSCP?

Hello everyone. I know that posts like these are usually considered clutter, but I feel like I just have to ask since I've been struggling to find a job recently.

Here is what I'm currently doing:

In my local area, there aren't that many IT job postings, at least on sites like indeed, ziprecruiter, and monster.com and whenever I apply to them, nothing really comes from it. Also, nothing comes from remote jobs since thousands of people are applying to those.

The other day I also made my resume a little bit nicer, just to highlight the OSCP specifically, and I have done some other security stuff, but my previous jobs haven't been that relevant to IT, so I really don't have any on-the-job experience.

Like what else could I be doing in order to get just an entry-level IT job? It doesn't have to be security, it could just be a helpdesk role, but it seems like it's hard to get those, too. Also, how did you manage to get a job after passing that certification? I'd really appreciate any "success stories" anyone has here.

reddit.com
u/Timely_Peach_2498 — 4 days ago
▲ 117 r/offensive_security+1 crossposts

The OSCP Review

I'm sharing All the OSCP resources I actually used on my both attempts to pass the exam: notes, tools, AD enum scripts, CVEs, reporting setup, methodology, and more.

Hello everyone, Strikoder here!

Recently I passed the OSCP, and to pay the tribute for this wonderful subreddit, I decided to collect pretty much everything I personally used during preparation in one place.

This includes:

GitHub repo (with all resources):

https://github.com/strikoder/Strikoder-OSCP-Prep

Some useful stuff inside the repo:

* Notion Notes

* SysReptor installer/setup (report writing)

* OffensiveSecurity repo (I made an OSCP release so you would download the scripts as a zip file)

https://github.com/strikoder/OffensiveSecurity

* Active Directory enum scripts

https://github.com/strikoder/OffensiveSecurity/tree/main/Scripts

* LinEnum-ng (I try to maintain it without bloating it)

https://github.com/strikoder/LinEnum-ng

* New OSCP Prep List (strilist : Strikoder OSCP List)

https://strikoder.com/oscp

* gtfobinSUID

https://github.com/strikoder/gtfobinSUID

* CredSpray (Nxc bash wrapper, I really enjoied using it through the exam, and so should U!)

https://github.com/strikoder/CredSpray

* NagoyaSpray (Favorite tool)

https://github.com/strikoder/NagoyaSpray

* username-anarchy-extended (added few stuff to the main one)

https://github.com/strikoder/username-anarchy-extended

* CVE PoC implementations list

https://github.com/stars/strikoder/lists/cve-poc-implementations

* CVE repository

https://github.com/strikoder/OffensiveSecurity/tree/main/CVES

* Windows binaries collection (gonna add more)

https://github.com/strikoder/windows-binaries

* pentest interview questions (Still need improvments)

https://github.com/strikoder/pentest-interview-questions

Each project above has its own readme, feel free to check them out. I’m also working on updating the OSCP list (strilist) further, so it’s not fully finished yet. I will publish and update in 2 weeks.

For now, you can check my full exam review either on Medium or Youtube (OR BOTH <3) in the links below

OSCP Review:

Medium: https://medium.com/@strikoder/strikoder-oscp-review-47f9f6efb25e

Youtube: https://www.youtube.com/watch?v=9HFKfGs6ym8

Additionally, I want to also thank:

* Penelope developer

* Ligolo developer

* NetExec/NXC team devs

And also thanks to everyone in the community sharing tools, walkthroughs, notes, and knowledge openly. A lot of us probably would straggled more with the OSCP without that.

u/strikoder — 5 days ago

Oscp canceled due to proctoring issue

I had my exam today, but i couldn't start the exam as i was not able to share my screen due to wifi issue. My internet speed was fine as verified my the technical support but still screen sharing and web cam was not enabled. Later i switched to mobile hotspot the issue was fixed. Since i did not have a backup internet and i couldn't continue with my mobile Hotspot, I had to cancel it. I did not even complete the checkin process and did not receive the vpn credentials. Will offsec consider this and give me a free retake or i lost my exam even before i started. Did anyone else faced similar issue? I'm just worried that i have to pay again for the retake.

reddit.com
u/nirazzz — 5 days ago
▲ 14 r/offensive_security+1 crossposts

OSCP - Can I use LLM made notes in my Obsidian?

Hey guys, I've been prepping for oscp for a while and I have OCD and perfectionist tendencies due to which I spent a lot of time researching and understanding a topic using Gemini and then 2x the time for creating theoritical and checklist notes. So, I was going very slow and I pasted a lot of theortical and practical notes in my obsidian directly from Gemini's explanation cause i really understood it well.

So, if i ever forget about it I can refer to gemini's explanation in the notes instead of going through different articles. The issue is the notes look a lot like AI made, i've not put gemini response or you asked stuff in the notes but it is very well organized section by section and lists. So, i am kind of afraid will this get me disqualified? I've been saving for this since a few years, I don't have a job and no employer paying for this. So, I really need an accurate answer. Example of my notes

SMB Signing: The Practical Flow

The first step is Negotiation which is Plaintext, Client sends I support signing and Server says I require signing and Attacker in the middle realizes he can't do anything. If he sends Signing DIsabled to client and it tries to connect without signing, Server will block it. The server simply says that either use signing or don't communicate there's no other option.

After the negotiation, Server generates a challenge and gives it to client for generating the netNTLM response. At this stage the Attacker in the middle (using ARP poisonings or Responder ) can dump the Netntlm response and crack it offline

Now, the Key Generation process starts, Client takes its Password Hash and some constant like AABBCC to generate the Session Key. Server does the same, It takes the User's Password Hash (from the local DB / AD) and the same constant value to create the Session Key. Attacker sees NOTHING causing all of this happening internally in the Client and Server devices, It isn't being sent over the network which the attacker is monitoring so it has no way to know

After this the Traffic starts getting signed, So we'll see the traffic, we'll be able to capture it, we'll also be able to read the data being sent or received but we can't modify the packet cause then we'll need to generate a new signature for which we need the user's password or the session key which we don't have

reddit.com
u/_discEx_ — 6 days ago
▲ 0 r/offensive_security+1 crossposts

Can OSCP alone realistically help me find a remote job?

I'm from Saudi Arabia and I'll tell you the details so you can better understand my situation. I saw the movie hackers (1995) at 7 years old and was fascinated and mesmerized by it and I wanted to be a hacker ever since. I graduated high school in 2012 then i got into local 3 universities and dropped out or got expelled from all of them due to attendance and low grades. in April 2014 I got an opportunity for a scholarship to study in Japan. I spent 2 years at language school and passed N2 level. N1 Being the highest starting from N5. Anyway after that I got into a Japanese university (computer science) and then i got my scholarship revoked due to low attendance. my senpai at the University told me that something is wrong and I should see a psychiatrist. i went there and was diagnosed with ADHD and everything made sense. I got back home empty handed in 2018. but that made me think, what's the best thing that could get me money fast? upon searching i saw a tweet for a government platform for bug bounty hunting and I signed up. that was during covid, it said it'll take 4 months to be accepted. during that time i did a lot of htb & vulnhub machines and got myself into cyber security. it helped from time to time but I'm now thinking about marriage and having a family so bug bounty hunting doesn't cut it. I need a stable income.

The reason I'm looking for a remote job is because I had an autoimmune disorder at 16 years old, with undiagnosed musculoskeletal pain. and I got another autoimmune disorder and neck injury at 28 just after the covid vaccine. I don't want to discuss politics but that's what I believe

so tldr

I have no degree

I was freelance as a bug bounty hunter for 5 years but i can't disclose anything

saved for the OSCP 2 attempt exam planning to pass first attempt

will I get employed remotely? and if so how much is the pay realistically.

Thank you for your time. godspeed

reddit.com
u/Efficient-Carob-3075 — 7 days ago
▲ 8 r/offensive_security+1 crossposts

ISC2’s Certification Maintenance Charges A Scam?

Isn’t it looks like a scam to pay annual maintenance charges to ISC2 for any certs you do?

reddit.com
u/CrazyTech8 — 8 days ago

i need a reality check

hi everyone,

i got the 3-month OSDA bundle earlier this year, but life threw a bunch of curveballs my way and i wasn't able to fully utilise the access. regrettably, i only managed to complete some of the challenge labs.

i need an honest opinion from people who've taken the course/exam before: is it realistically possible to go through the content and labs in 1 month and still sit for the exam confidently?

for context, i'm currently working a full-time cybersecurity internship and have some prior blue team experience, though mostly at a junior level. i'm prepared to grind evenings and basically spend my weekends fully on this, but i'm wondering whether that'll realistically be enough.

i really wish i had made better use of the original 3 months, but it is what it is. just trying to make the best of the situation now.

reddit.com
u/Goofy-Gooner-6767 — 8 days ago
▲ 55 r/offensive_security+1 crossposts

70 Points in 4 Hours AMA

Took the OSCP on Friday, got my results today that I passed. Big shout-out to the community and looking to give back to anyone who's on their journey!

Finished AD set in approx 1:15hrs

Hit the gym for about 45 minutes

Crushed the first standalone in about an hour

Got the next foothold in about an hour.

Ended up with 80 points overall. After getting the points I took a few hours trying to priv ESC on the final 2 standalones but decided I'd just finish the report and hang out with my kids.

reddit.com
u/Leonzola — 10 days ago
▲ 13 r/offensive_security+1 crossposts

Red Hat Certified Specialists in Security: Linux

Hello all,

I have been thinking about going for the Red Hat EX415 but haven’t found any books on Amazon or any available study material.

Any recommendations on where to find relevant study materials for this exam?

Thanks in advance!!

reddit.com
u/EducationalHour1986 — 9 days ago

Offline Pentest Cheatsheet Terminal for OSCP/OSEP (580+ Commands + Auto Variable Replace)

Hey everyone,

I made a beautiful offline pentest cheatsheet that works like a real terminal.

**Highlights:**

- 580+ commands

- Automatic variable substitution (IP, domain, username, etc.)

- Favorites, Notes & Target panel

- No internet required

**Live Demo:** https://anshu19981.github.io/Pentestcheatsheet/

**GitHub:** https://github.com/anshu19981/Pentestcheatsheet

Any feedback is highly appreciated!

https://preview.redd.it/a5p9is0xyf0h1.png?width=1919&format=png&auto=webp&s=857fcdeef2be140b1d39399737c826ca6c820734

https://preview.redd.it/070sru0xyf0h1.png?width=1919&format=png&auto=webp&s=e689319830f1ce0a30c3000ed80791fe8f339034

reddit.com
u/Affectionate-Mail507 — 11 days ago

Passed OSCP exam

Hello everyone, I’m happy to share that I have passed my OSCP exam in the first attempt. Thank you to all those who have been part of my journey. Feel free to ask any questions and I will try my best to answer them.

A few days ago, I replied with “Can I DM?” on a post in the OSCP subreddit. I got backlash for it and downvotes too. Today I would like to share why I wanted to DM. My intention was to not leak any information about the course and it’s lab unintentionally and my question being about labs I wanted to ask it in private space. I never wanted to cheat just to be clear as people thought I was trying to do it.

Anyways I understand why the reaction was that way and I’ll keep that in my mind. I don’t want to argue or prove someone wrong, just wanted to share my pov. Sorry if this went a bit off topic. Apologies for posting it here as I’m unable to post it in OSCP subreddit due to negative karma.

reddit.com
u/chicken-biryani-143 — 13 days ago

Is the Mac M1 Max good for pentesting, ethical hacking, and red teaming?

I’m considering using my Mac M1 Max for pentesting, ethical hacking, and red teaming.
Is it viable, or will I run into too many compatibility issues?
I know most tools are built for Linux, but I’d prefer to use what I already have.
Would love to hear from anyone who’s actually using an M1/M2 Mac for offensive security work.
Any tips, setups, or things to watch out for?

reddit.com
u/Few-Pipe1767 — 10 days ago

Where do you spend most of your time ?

I’m a cybersecurity student focusing mostly on offensive security right now (HTB, CTFs, labs, etc.).

One thing I’ve been wondering about is where people actually spend most of their time during engagements, pentests, research, or even CTFs.

For me, it’s usually recon/enumeration.
At the moment my workflow is pretty basic:

  • full port scan with nmap
  • targeted service scan on open ports
  • web enumeration
  • manual inspection
  • some directory/subdomain fuzzing

But I feel like experienced people probably spend a lot of time on things that beginners don’t even notice yet.

So I’m curious:
what part of offensive work actually consumes the most time for you?

Recon? Enumeration? Priv esc? Reporting? Infrastructure? Pivoting? Debugging exploit chains? Something else entirely?

Would also be interested in hearing about workflow bottlenecks or things that still feel unnecessarily painful even with experience.

reddit.com
u/yourAverageSkid — 13 days ago

Suggestions regarding the Offsec career

I have a question for people who have completed PEN-200 / OSCP or PEN-300.

I will soon be graduating and recently spent most of my time preparing for M.Tech entrance exams. During that process I mainly built theoretical CS knowledge — networking, operating systems, databases, data structures, etc. But I did not spend much time building practical offensive security skills.

Now I am trying to understand how realistic it is to prepare for OSCP during M.Tech alongside coursework, CGPA pressure, placements, projects, etc.

I wanted to ask:

  1. How long did it take you to prepare seriously for PEN-200 / OSCP or PEN-300?

  2. Roughly how many hours per day were you spending?

  3. Is it manageable alongside a demanding academic schedule?

  4. How much does institute/college brand value matter in offensive security careers compared to actual skills, certifications, labs, CTFs, research, and real experience?

  5. Can someone from a non-elite institute still reach high-paying/offensively strong roles if they consistently build strong practical skills?

I’m trying to understand whether I should prioritize institute brand heavily or focus more on long-term practical skill building.

Would appreciate honest experiences from people already working in the field.

reddit.com
u/TopCreepy5985 — 12 days ago