One of my professional goals for this year is to learn more cloud technology. It is one area where my skills are somewhat lacking. Sure, I can toss around buzzwords like everybody else, but I want to go deeper than that. I want to build things, break things, and utilize things in the cloud. So I started taking some trainings in AWS Skillbuilder. I chose AWS as the cloud technology to learn because of it’s popularity and great training resources. So far, I have completed the AWS Cloud Practitioner Essentials training and the associated Cloud Quest Labs! I really enjoyed the Cloud Quest labs; it was a great way to practice what I had learned. Now I am taking some trainings that correspond to the AWS Solutions Architect – Associate certification. My goal is to get this certification and possible the AWS Certified Security – Specialty certification. I believe in doing real world experience in conjunction with coursework, so I am also currently on the hunt for some home lab project ideas. So far, my only thoughts are to maybe host my website on AWS, but I’m hoping to get some more ideas shortly.
Category: Cybersecurity
Happy Halloween!
TCM Security had a spooky good deal on this course! I got a really good overview of how a pentest is conducted from start to finish. For me, the topics were a good mix of new and review. I think this is an excellent course for aspiring pentesters.
OSCP Write Up
February 19, 2021: I quit my job without a new one lined up. I was no longer growing in cybersecurity there. I wanted a meaningful career in cybersecurity, and I decided that it was better to grow and have no income, than to stay stagnant and collect money. The two most addicting things in life are heroin and a weekly paycheck.
March 2, 2021: I decided to find out how much I liked working in cybersecurity. I signed up for Offensive Security’s OSCP exam with 90 days of lab time. I chose this certification for a number of reasons but the main ones are:
1. I was unemployed, and needed something structured to do that would take a large amount of time.
2. I was determined to find out if I liked cybersecurity enough to do it for free.
3. I wanted to be able to show that I was doing something meaningful during my unemployment.
One of the things I like about the red team side of cybersecurity is that it can be gamified. Resources like Hack the Box, Try Hack Me, and the OSCP labs are just challenges that teach penetration testing techniques. I like puzzles, so this is really appealing.
March 7, 2021 – June 4, 2021: During this time period, the OSCP consumed my life. I spent over 650 hours reading, practicing, and struggling. Most of the time was spent in the lab environment; 90 days of lab time was expensive, so I wanted to get as much out of it as I could. In total, I got SYSTEM/root on 52 computers in the lab environment, with a foothold on several more. The labs are designed to be frustrating; the whole purpose of the labs is to build your methodology and strengthen your resolve. That is why everybody always says to “TRY HARDER”, although I despise that phrase. You don’t know what you don’t know, and sometimes you need help instead of knocking your head against the wall. Still, I believe it is important to struggle. It makes you find out how badly you want it. Below are the resources I used and some practical tips.
Resources Used:
– The PWK course pdf and the labs. I did not watch the videos at all.
– The Windows Privilege Escalation and Linux Privilege Escalation courses by The Cyber Mentor.
– Hack the Box and Try Hack Me.
– Google.
I tried to use as few resources as possible, and mainly just stick to the things Offensive Security provided. I think there is a tendency to get too many resources and then be overwhelmed with all of the information. I only used Hack the Box for my practice exam and Try Hack Me for buffer overflow practice. More resources does not translate to more knowledge. The same thing goes with tools; there is too much reliance on tools and not enough understanding of what is actually happening. Keep things simple, and take time to understand what is happening and why.
Take a practice exam before you sit for the actual exam. Don’t schedule your exam until you take a practice exam. Give yourself 24 hours to try to knock out one buffer overflow machine and four other machines. For my practice exam, I used:
– A buffer overflow machine from Tib3rius’s THM buffer overflow practice room
– Jeeves (HTB)
– Chatterbox (HTB)
– Cronos (HTB)
– Sense (HTB)
I stole this practice exam idea from here.
For the exam itself:
– 24 hours is more than enough time to pass the exam. I believe it is supposed to be done in 8-12 hours.
– Do NOT use new tools for the exam. If you didn’t practice with tools like AutoRecon or NmapAutomater in the labs, then you shouldn’t be using them in the exam. Use the training you developed in the labs.
– Have a methodology, write it down, and stick to it. No matter what. You have to be methodical for the exam. Do not let your stress, anxiety, or whatever pull you away from your methodology. I didn’t do this, but I wish I did. I would have finished the exam much sooner IF I HAD FOLLOWED MY OWN DAMN METHODOLOGY. Don’t be like me. Stick to your game plan.
Conclusion: The OSCP was created for penetration testers, but it can easily be applied to either the red or blue sides. The foundational skills learned in the OSCP are very transferrable. Taking the OSCP taught the core skills of system administration of Windows and Linux, networking, scripting, many different attack vectors, patience, and critical thinking. These core skills are helpful for any job in cybersecurity. No matter what side you are on (red/blue), knowing how attackers break into computer systems can help you replicate it or defend against it. I spent over 650 hours working on this without doing anything else. I have no idea how people have gotten this certification with a full time job and a family. This has been one of the most frustrating and rewarding things that I have ever done. Now it is time to find another challenging project. It was real, and it was fun. But it wasn’t really fun.
OSINT CTF RESULTS!
It is the next morning, but I am still hyped up from last night’s OSINT CTF competition! My OSINT team and I had our most successful CTF to date, and we were even missing two players! Final scoreboard says we (Team NoBarkAllByte) came in 33rd place out of 143 teams!
The CTF targets were real missing people, and the contestants had to find data on these missing people using OSINT techniques. The contestants had to submit information which would be used by Law Enforcement in the actual investigation.
Team NoBarkAllByte did well because we focused on the previous locations of people (worth 500 points) instead of finding basic information about the subject such as habits, physical features, emails, etc. (worth somewhere between 50-150 points). My two favorite moments were:
1) When I found that one of the people traveled over 1,500 miles because they took a picture of their partner, uploaded it to Facebook, and it contained a shopping center sign in the background. Based on the stores on that sign, I was able to figure out the location of where that photo was taken.
2) One of the missing people uploaded a picture of a to-go meal they ate to Instagram, and I was able to read the grease wrapper to find the name of the restaurant. The restaurant was hundreds of miles from where the person disappeared, and since the restaurant doesn’t offer delivery, I concluded the missing person stopped there.
I had such a great time! Can’t wait for the next one! Great job team, you know who you are!