Blog

You’ll Know at the Finish Line

This past weekend I had a bittersweet moment. I became a finisher in the 2021 Spartan Ultra: A 30+ mile, 60 obstacle race. It only took 10.5 hours. It was a sweet feeling because I finally completed all of the Spartan races. It was bitter because I had completed all of the Spartan races. Obstacle Course Racing (OCR) changed me, and I wouldn’t be the same person without it. I like the idea of continual growth; the idea of getting slightly better, all of the time. To do that, you have to constantly be pushing yourself to your absolute limit. It is at your breaking point where you find out a little something about yourself. OCR, especially Spartan races, are perfect for finding your breaking point. Each race is longer and has more obstacles than the last. Each race demands more, both physically and mentally. The course can be brutal, but also creates an opportunity to test your character, build camaraderie, and have a new appreciation for teamwork. Spartan races also bring out your primal skills, and give a small glimpse into how tough your ancestors had to be to survive. Finally, there is satisfaction. Knowing you completed something incredibly difficult and having the weight of the medal around your neck gives rise to a very satisfying feeling. That is the feeling of growth.

If you do what’s easy, your life will be hard. However, if you do what’s hard, your life will be easy.” ~ Les Brown

OSCP Write Up

February 19, 2021: I quit my job without a new one lined up. I was no longer growing in cybersecurity there. I wanted a meaningful career in cybersecurity, and I decided that it was better to grow and have no income, than to stay stagnant and collect money. The two most addicting things in life are heroin and a weekly paycheck.

March 2, 2021: I decided to find out how much I liked working in cybersecurity. I signed up for Offensive Security’s OSCP exam with 90 days of lab time. I chose this certification for a number of reasons but the main ones are:
1. I was unemployed, and needed something structured to do that would take a large amount of time.
2. I was determined to find out if I liked cybersecurity enough to do it for free.
3. I wanted to be able to show that I was doing something meaningful during my unemployment.
One of the things I like about the red team side of cybersecurity is that it can be gamified. Resources like Hack the Box, Try Hack Me, and the OSCP labs are just challenges that teach penetration testing techniques. I like puzzles, so this is really appealing.

March 7, 2021 – June 4, 2021: During this time period, the OSCP consumed my life. I spent over 650 hours reading, practicing, and struggling. Most of the time was spent in the lab environment; 90 days of lab time was expensive, so I wanted to get as much out of it as I could. In total, I got SYSTEM/root on 52 computers in the lab environment, with a foothold on several more. The labs are designed to be frustrating; the whole purpose of the labs is to build your methodology and strengthen your resolve. That is why everybody always says to “TRY HARDER”, although I despise that phrase. You don’t know what you don’t know, and sometimes you need help instead of knocking your head against the wall. Still, I believe it is important to struggle. It makes you find out how badly you want it. Below are the resources I used and some practical tips.

Resources Used:
– The PWK course pdf and the labs. I did not watch the videos at all.
– The Windows Privilege Escalation and Linux Privilege Escalation courses by The Cyber Mentor.
– Hack the Box and Try Hack Me.
– Google.

I tried to use as few resources as possible, and mainly just stick to the things Offensive Security provided. I think there is a tendency to get too many resources and then be overwhelmed with all of the information. I only used Hack the Box for my practice exam and Try Hack Me for buffer overflow practice. More resources does not translate to more knowledge. The same thing goes with tools; there is too much reliance on tools and not enough understanding of what is actually happening. Keep things simple, and take time to understand what is happening and why.

Take a practice exam before you sit for the actual exam. Don’t schedule your exam until you take a practice exam. Give yourself 24 hours to try to knock out one buffer overflow machine and four other machines. For my practice exam, I used:
– A buffer overflow machine from Tib3rius’s THM buffer overflow practice room
– Jeeves (HTB)
– Chatterbox (HTB)
– Cronos (HTB)
– Sense (HTB)
I stole this practice exam idea from here.

For the exam itself:
– 24 hours is more than enough time to pass the exam. I believe it is supposed to be done in 8-12 hours.
– Do NOT use new tools for the exam. If you didn’t practice with tools like AutoRecon or NmapAutomater in the labs, then you shouldn’t be using them in the exam. Use the training you developed in the labs.
– Have a methodology, write it down, and stick to it. No matter what. You have to be methodical for the exam. Do not let your stress, anxiety, or whatever pull you away from your methodology. I didn’t do this, but I wish I did. I would have finished the exam much sooner IF I HAD FOLLOWED MY OWN DAMN METHODOLOGY. Don’t be like me. Stick to your game plan.


Conclusion: The OSCP was created for penetration testers, but it can easily be applied to either the red or blue sides. The foundational skills learned in the OSCP are very transferrable. Taking the OSCP taught the core skills of system administration of Windows and Linux, networking, scripting, many different attack vectors, patience, and critical thinking. These core skills are helpful for any job in cybersecurity. No matter what side you are on (red/blue), knowing how attackers break into computer systems can help you replicate it or defend against it. I spent over 650 hours working on this without doing anything else. I have no idea how people have gotten this certification with a full time job and a family. This has been one of the most frustrating and rewarding things that I have ever done. Now it is time to find another challenging project. It was real, and it was fun. But it wasn’t really fun.

OSINT CTF RESULTS!

It is the next morning, but I am still hyped up from last night’s OSINT CTF competition! My OSINT team and I had our most successful CTF to date, and we were even missing two players! Final scoreboard says we (Team NoBarkAllByte) came in 33rd place out of 143 teams!

The CTF targets were real missing people, and the contestants had to find data on these missing people using OSINT techniques. The contestants had to submit information which would be used by Law Enforcement in the actual investigation.

Team NoBarkAllByte did well because we focused on the previous locations of people (worth 500 points) instead of finding basic information about the subject such as habits, physical features, emails, etc. (worth somewhere between 50-150 points). My two favorite moments were:
1) When I found that one of the people traveled over 1,500 miles because they took a picture of their partner, uploaded it to Facebook, and it contained a shopping center sign in the background. Based on the stores on that sign, I was able to figure out the location of where that photo was taken.
2) One of the missing people uploaded a picture of a to-go meal they ate to Instagram, and I was able to read the grease wrapper to find the name of the restaurant. The restaurant was hundreds of miles from where the person disappeared, and since the restaurant doesn’t offer delivery, I concluded the missing person stopped there.

I had such a great time! Can’t wait for the next one! Great job team, you know who you are!

US Cyber Challenge – 2020

This past week I participated in the virtual US Cyber Challenge (USCC). The USCC is a week long invitation-only accelerated training camp for top scorers in a competitive cyber security related challenge. The camp was divided up into a different class each day from 9AM-6PM. The topics for the classes were Program Analysis for Cyber Security, Large-Scale Digital Forensics, Web Application Ethical Hacking, and Memory Forensics. More information on these classes can be found below. I had an absolutely great time. I am so thankful to be apart of such an event, even if the learning style was like, “drinking out of a fire hose”. The best part of the camp is that I could learn from some of the best minds in the industry. The worst part of the camp is that I had limited interactions with the other members. There was so much talent at the camp, and I feel like I couldn’t network with the others.

Day 1: Program Analysis for Cyber Security
Instructor: Ben Holland
Topics: Principles of Programs and Compilers, Exploit Development
Fundamentals of Program Analysis, Bug Hunting, Antivirus Evasion
My Thoughts: I’m always blown away by the insecurities of software programs, and how bad actors can easily exploit these insecurities. Having a strong understanding of how underlying computer concepts work is critical to writing good code and finding flaws in the code.

Day 2: Large-Scale Forensic Analysis with SOF-ELK® and the Elastic Stack
Instructor: Phil Hagen
Topic: Large-Scale Forensic Analysis
My Thoughts: SOF-ELK® is a open-source platform for digesting large amounts of system/event data. The Elastic Stack is a popular platform for big data and analysis. An issue is that Elastic Stack is not easy to work with right away, so SOF-ELK® overcomes that problem by being configured to use right away. The instructor, Phil Hagen, is the creator of SOF-ELK®. I loved this class because it gave me so many ideas for my home lab project.

Day 3: WebApp Ethical Hacking
Instructor: Doug Logan
Topics: Web Architecture, Injection Attacks, Authentication/Authorization/Sessions
My Thoughts: This class was my favorite because I already have a strong interest in this area of cyber security. I think the material was really well presented, and there was plenty of time for labs to get hands on experience. This course (as did all of them) came with Virtual Machines so I can practice later at home.

Day 4: Memory Forensics
Instructor: Alissa Torres
Topics: Data collection, memory management, hunting for malicious code execution, Defense Evasion Detection
My Thoughts: This was an awesome class, and I need to take it again. I really enjoyed learning about memory forensics, but I don’t have a strong background in computer memory so I felt like I was at a loss. I want to go through my notes and class materials so I can wrap my head around some of these concepts. After, I would like to take this class again so I can appreciate it better.

Network Security – Live Course!

I am please to announce that my Network Security Course is now live on the Cybrary learning platform! This four-hour beginner course teaches network security concepts such as data loss prevention, incident response, network architecture designs, good cyber hygiene, network security devices, and much more! The course can be found here! Create More, Regurgitate Less!