Herramientas de usuario

Herramientas del sitio


seguridad:enlaces:certificaciones:oscp

Diferencias

Muestra las diferencias entre dos versiones de la página.

Enlace a la vista de comparación

Ambos lados, revisión anteriorRevisión previa
Próxima revisión
Revisión previa
seguridad:enlaces:certificaciones:oscp [2019/04/08 18:36] cayuseguridad:enlaces:certificaciones:oscp [2020/03/09 19:50] (actual) cayu
Línea 1: Línea 1:
 ====== Profesional certificado en seguridad ofensiva (OSCP) ====== ====== Profesional certificado en seguridad ofensiva (OSCP) ======
 Profesional certificado en seguridad ofensiva (**OSCP**) es una certificación de ethical hacking ofrecida por Offensive Security que enseña metodologías de exámenes de penetración y utilizan herramientas incluyendo el examen de pentración BackTrack (ahora realizado con éxito con la distribución Kali Linux)1​2​ La certificación OSCP consiste en un examen práctico que requiere atacar y penetrar de manera satisfactoria varias maquinas en un ambiente seguro controlado.3​ Actualmente, es una de las pocas certificaciones que requiere evidencia de las habilidades en la parte práctica que consiste en una prueba de penetración. Profesional certificado en seguridad ofensiva (**OSCP**) es una certificación de ethical hacking ofrecida por Offensive Security que enseña metodologías de exámenes de penetración y utilizan herramientas incluyendo el examen de pentración BackTrack (ahora realizado con éxito con la distribución Kali Linux)1​2​ La certificación OSCP consiste en un examen práctico que requiere atacar y penetrar de manera satisfactoria varias maquinas en un ambiente seguro controlado.3​ Actualmente, es una de las pocas certificaciones que requiere evidencia de las habilidades en la parte práctica que consiste en una prueba de penetración.
-===== Referencias para prepararse =====+===== Referencias que veo para prepararme =====
  
   * shi_ver_bot : A Telegram bot to see if your password was in the BreachCompilation   * shi_ver_bot : A Telegram bot to see if your password was in the BreachCompilation
Línea 833: Línea 833:
  
 https://www.peerlyst.com/posts/tips-for-an-information-security-analyst-pentester-career-ep-71-web-app-pentesting-practice-mattia-campagnano-13-years-experience-akron-oh?utm_source=peerlyst_perspective&utm_medium=email&utm_content=peerlyst_post&utm_campaign=special_digest_04072019 https://www.peerlyst.com/posts/tips-for-an-information-security-analyst-pentester-career-ep-71-web-app-pentesting-practice-mattia-campagnano-13-years-experience-akron-oh?utm_source=peerlyst_perspective&utm_medium=email&utm_content=peerlyst_post&utm_campaign=special_digest_04072019
 +
 +
 +https://github.com/besimorhino/powercat
 +
 +
 +
 +https://justhackerthings.com/post/my-oscp-workflow/
 +
 +https://clintonmetu.com/2018/06/how-i-prepared-for-the-pwk-course-and-oscp-exam-oscp-exam-review/
 +
 +
 +https://github.com/codingo/Reconnoitre
 +
 +
 +https://seguridadyredes.wordpress.com/2010/04/05/wireshark-captura-conversaciones-voip-protocolo-sip-sdp-y-rtp-extraccion-de-audio/
 +
 +
 +
 +
 +wiki con cosas
 +
 +
 +
 +https://blog.m0noc.com/
 +
 +
 +
 +CFT http://www.fc4.me/
 +
 +https://ctf.sec.army/resources
 +
 +
 +https://pentestlab.blog/2012/12/24/sql-injection-authentication-bypass-cheat-sheet/
 +
 +https://pentestlab.blog/
 +
 +https://0x09al.github.io/security/ctp/osce/exploitation/2017/07/06/osce-ctp-prep-heapspreay-seh-egghunter.html
 +
 +
 +
 +https://www.hacktoday.io/
 +
 +
 +https://www.hacktoday.io/t/journey-of-getting-oscp-certificatio/2496
 +
 +https://github.com/NeuronAddict/pentesting-notes
 +
 +https://www.abatchy.com/2017/03/how-to-prepare-for-pwkoscp-noob
 +
 +
 +https://github.com/vitalysim/Awesome-Hacking-Resources
 +
 +https://github.com/hugsy/gef
 +
 +
 +https://www.offensive-security.com/information-security-training/
 +
 +
 +
 +https://github.com/andyacer/ms08_067
 +
 +
 +
 +https://github.com/andyacer/pentest
 +
 +
 +https://cexplr.github.io/
 +
 +
 +https://www.shogunlab.com/blog/
 +
 +
 +
 +
 +https://github.com/freddiebarrsmith/Buffer-Overflow-Exploit-Development-Practice
 +
 +
 +
 +--------
 +
 +https://stacktrac3.co/category/osce-prep/
 +https://github.com/s7acktrac3/OSCE-Exploit-Scripts
 +https://github.com/s7acktrac3/PHP-Cheatsheet-Script
 +
 +https://www.fuzzysecurity.com/tutorials/expDev/1.html
 +
 +https://www.abatchy.com/2017/03/osce-study-plan
 +
 +https://github.com/NeuronAddict/pentesting-notes
 +
 +
 +
 +1.  Censys.io
 +2.  Shodan.io
 +3.  Viz.Greynoise.io/table
 +4.  Zoomeye.org
 +5.  Fofa.so
 +6.  Onyphe.io
 +7.  App.binaryedge.io
 +8.  Hunter.io
 +9.  Wigle.net
 +10. Ghostproject.fr
 +
 +
 +
 +https://cybexsec.es/
 +
 +
 +https://github.com/Shiva108/CTF-notes
 +
 +
 +https://github.com/rebe11ion/CTFs/blob/master/HackTheBox-RE.md
 +
 +https://0x00sec.org/
 +
 +
 +https://paumunoz.tech/2018/01/11/reversing-c-code-with-ida-part-i/
 +
 +http://aboureada.com/oscp/2017/12/07/oscp_course_layout.html 
 +http://aboureada.com/cheat_sheet/2017/12/20/radare2_cheat_sheet.html
 +
 +http://aboureada.com/buffer_overflow/2017/12/20/solving-backdoor-echo.html
 +
 +http://aboureada.com/buffer_overflow/2017/12/19/exploiting_protostar_stack4.html
 +
 +
 +https://paumunoz.tech/2015/06/06/hacking-series-kioptrix-level-2/
 +
 +
 +https://jhalon.github.io/OSCP-Review/
 +
 +https://github.com/RustyShackleford221/OSCP-Prep
 +
 +
 +https://www.jpsecnetworks.com/week-8-oscp-preparation-exploit/
 +
 +
 +https://honeysec.blogspot.com/2019/05/writeup-challenge-linux-201-by-1r0dm448o.html
 +
 +
 +https://ired.team
 +
 +
 +https://typora.io/#linux
 +
 +
 +
 +
 +https://sensepost.com/blog/2017/linux-heap-exploitation-intro-series-riding-free-on-the-heap-double-free-attacks/
 +
 +
 +
 +https://www.sec.army/webcasts
 +
 +
 +
 +https://www.netsecfocus.com/oscp/2019/03/29/The_Journey_to_Try_Harder-_TJNulls_Preparation_Guide_for_PWK_OSCP.html
 +
 +
 +
 +
 +https://www.peerlyst.com/posts/the-how-to-get-the-oscp-certification-wiki-peerlyst
 +
 +https://www.peerlyst.com/posts/ctf-write-ups-wiki-peerlyst
 +
 +https://www.peerlyst.com/posts/oscp-prep-kioptrix-5-walkthrough-video-cristi-vlad?utm_source=Mandrill&utm_medium=email&utm_campaign=invitation-to-chime-in-on-a-post-by-system
 +
 +
 +
 +
 +https://shellterlabs.com/en/
 +
 +https://nvd.nist.gov/
 +
 +
 +reviews
 +
 +https://scriptdotsh.com/index.php/2018/04/17/31-days-of-oscp-experience/
 +https://netsec.ws/?p=398
 +https://jhalon.github.io/OSCP-Review/
 +https://hakin9.org/try-harder-my-penetration-testing-with-kali-linux-oscp-review-and-courselab-experience-my-oscp-review-by-jason-bernier/
 +https://h4ck.co/oscp-journey-pwk-course-review/
 +https://awansec.com/oscp-review.html
 +http://jameelnabbo.com/oscp-preparation-guide-and-exam-review/
 +https://www.linkedin.com/pulse/oscp-review-nick-frichette
 +https://www.secjuice.com/oscp-prep-guidance/
 +https://www.jimwilbur.com/2017/07/oscp-review/
 +https://www.hackingtutorials.org/hacking-courses/offensive-security-certified-professional-oscp/
 +https://clintonmetu.com/2018/06/how-i-prepared-for-the-pwk-course-and-oscp-exam-oscp-exam-review/
 +http://dsolstad.com/PWK-OSCP-Review/
 +https://medium.com/@forwardsecrecy/oscp-post-exam-and-final-review-448e51bf7dae
 +https://medium.com/@LearnerPentest/oscp-i-did-it-af9ee3335a1c
 +http://dann.com.br/oscp-offensive-security-certification-pwk-course-review/
 +http://niiconsulting.com/checkmate/2017/06/a-detail-guide-on-oscp-preparation-from-newbie-to-oscp/
 +http://ly0n.me/2018/04/30/offensive-security-certs-oscp-and-osce-review/
 +https://www.netsecfocus.com/oscp/review/2019/01/29/An_Adventure_to_Try_Harder_Tjnulls_OSCP_Journey.html
 +https://dubell.io/my-oscp-review/
 +https://m4cybersolutions.com/oscp-review/
 +https://dejandayoff.com/oscp-review---felt-the-pain-and-suffered-through-it/
 +https://stormctf.ninja/ctf/blog/c0ax/review/oscp-review
 +https://github.com/D3cl4n/OSCP-Review
 +https://community.infosecinstitute.com/discussion/132306/oscp-review
 +https://ethicalhackers.club/oscp-penetration-testing-kali-linux-experience-review/
 +https://limbenjamin.com/articles/oscp-review.html
 +http://www.exumbraops.com/blog/2018/4/6/7-things-you-didnt-know-about-passing-the-oscp
 +http://www.websecgeeks.com/2017/04/penetration-testing-with-kali-linux.html
 +https://blog.fadyothman.com/pwk-and-oscp-my-experience/
 +https://wiki.securityweekly.com/Hack_Naked_TV_OSCP_Review
 +https://dilsec.com/2017/04/06/oscp-certification-the-review/
 +https://infosecuritygeek.com/my-oscp-journey/
 +https://kongwenbin.wordpress.com/2017/02/23/officially-oscp-certified/
 +https://raaqim.me/2017/07/26/oscp-review-different/
 +https://hackmethod.com/oscp-review-tips/
 +https://www.ethicalhacker.net/forums/forum/ethical-hacking-discussions-and-related-certifications/network-pen-testing/oscp-offensive-security-certified-professional/page/1/
 +https://www.arcade-desk.com/index.php/2018/08/06/oscp-review/
 +https://thor-sec.com/review/oscp/oscp_review/
 +
 +
 +http://www.digitaloffensive.com/category/oscp/
 +
 +https://www.thecybermentor.com/zero-to-hero-pentesting
 +
 +
 +https://www.puckiestyle.nl/oscp-journey-1st-month/
 +
 +
 +https://www.offensive-security.com/vulndev/freepbx-exploit-phone-home/
 +http://www.offensive-security.com/0day/freepbx_callmenum.py.txt
 +
 +
 +https://malikashish8.github.io/Walkthrough/notes/
 +
 +
 +https://cs485.mjkranch.com/lessons.html
 +
 +
 +https://tcm-sec.com/2019/05/25/buffer-overflows-made-easy/
 +
 +
 +
 +reversing
 +
 +https://ocw.cs.pub.ro/courses/cns/labs/start
 +
 +
 +
 +
 +https://github.com/OlivierLaflamme/Cheatsheet-God
 +
 +
 +
 +https://book.hacktricks.xyz/exploiting/windows-exploiting-basic-guide-oscp-lvl
  
  
seguridad/enlaces/certificaciones/oscp.1554748579.txt.gz · Última modificación: 2019/04/08 18:36 por cayu