Advertisement
Guest User

Untitled

a guest
Jan 29th, 2015
205
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.52 KB | None | 0 0
  1. the course is great! Really good variety of vulnerabilities, machines and different services running. You get bunch of webapp vulnerabilities, kernel and application vulnerabilities and some common problems in the environment such as weak passwords and password reuse. I've finished the book and now going full steam in the labs, got some low hanging fruit first and now it gets harder, a lot of learning on pretty much every step... but then it feels soooo good when you finally pop that shell! Anyway, in terms of preparation, if you're quite comfortable with the basics and can tackle some Vulnhub VMs with more or less reasonable success, I would say go for it. There's heaps to learn during the course and that's really the whole purpose of it. The notes are well designed and give you a basic skill set overview that is required, but it's just a tip of an iceberg, to actually exploit the vulnerabilities it does take a lot more than just following the book. Cater for about a week of intense studying to go through the book and exercises and then its just lab time, so constant learning and trying and failing. I'm glad I got 60 days cause 30 would be a struggle. It's hard to judge for someone whether they're ready or not, even if you went through 100s of books before hand, it may not prepare you for what's in there - it's pretty much 100% practical and that's the best way you learn :) It's fun, takes heaps of time and pretty much all I do with my time (aside from work) is OSCP, but if you can dedicate decent amount of time to it, you'll love it!
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement