Ace the OSEP Exam with Sliver Framework

preview_player
Показать описание

Tune in to learn how our senior security expert, Jon Guild, set himself up for success to pass the esteemed OSEP exam. Listen in to hear Jon’s first-hand experience using Bishop Fox’s Sliver C2 framework to practice pivoting, enumeration, lateral movement, and escalation in an ideal vulnerable lab environment. Jon will offer actionable tips and tricks to enhance your own preparedness for offensive security certification exams.

Don't miss out on this opportunity to excel in the world of penetration testing. During this livestream, our senior security expert will share expertise on:
• Using Sliver to prepare for and pass the OSEP exam
• Developing and refining technical methodologies for exam success
• Soft skills to make the most of study sessions and exam preparation

#cybersecurity #penetrationtesting #hacking
Рекомендации по теме
Комментарии
Автор

I just wanted to say thanks very much. Currently studying OSEP, which is an incredible course. I was trying to decide which framework to use for the extra mile exercise and you have definitely swung it for Sliver.

DarkDonnieMarco
Автор

Just wanted to say this was excellent. Please more of this content.

DavidKennedy-
Автор

More more more. John has a fantastic talent at explaining things!

patrickdee
Автор

This is awesome, ive got my exam scheduled and will be using sliver!

nathanmay
Автор

Amazing content, this is a blessing! Thank you so much!

dgoncalo
Автор

Excellent video. Thanks for posting. Could you provide the HTB link for the double hop explanation as shown @52:11 into the video? I am subscribed Thanks.

HYHaXR
Автор

Thx for this ! this is exactly what i needed sir !

freemnn
Автор

Only partway through, but it was so crazy, I was just reading a post by RastMouse before I came here to learn more about using Sliver with C2 BOFs :)

designzonebeats
Автор

Great work! Btw it looks like CME was exporting the AS-REP user hash as AES-256 as the hash encryption type is tgs$18$ so you wouldn’t likely crack it.

Kerbrute is requesting the hash as tgs$23$ which is the older RC4 encryption and much weaker/faster to crack.

patrickm
Автор

What is the terminal you are using??? Or theme I like those icons

snakiesnake
Автор

Hey there awesome video!
What is the terminal you are using??? Or theme I like those icons

TheSenSeTime
Автор

Is about OSCP or OSEP? Bcs, we see "OSEP" in title but video content targeted OSCP. Am I wrong?

babanaber
Автор

is there any discord channel where we can interact with the development team?

gianluca
welcome to shbcf.ru