Hacking Live Stream: Episode 2 – HackTheBox Active, Vulnserver Buffer Overflow, and Career Q&A / AMA

https://youtu.be/uByoC5wv00Q In this video, we cover common Active Directory attacks, including GPP/cPasswords and Kerberoasting against Hack the Box's Active. We also cover basic buffer overflows with Vulnserver. We conclude with career Q&A. If you enjoy this video, please follow me on Twitch (https://www.twitch.tv/thecybermentor) for future lessons! Wanna chat? Add me on Twitter, YouTube or LinkedIn!Veteran?…

Hacking Live Stream: Episode 1 – Kioptrix Level 1, Hack The Box’s Jerry, and Career Q&A / AMA

https://youtu.be/zO6NdOjgwY0?t=280 In this video, we cover vulnerable machines from a penetration tester's perspective. Instead of just capturing the flag, we cover what vulnerabilities potentially exist and would be noted on a penetration testing report. We conclude with career Q&A. If you enjoy this video, please follow me on Twitch (https://www.twitch.tv/thecybermentor) for future lessons! Wanna chat?…

My eLearnSecurity Experience: Part 1 – WAPT

Introduction Around a month ago, I was looking for my next "hacking" certification. Up to this point, I've achieved the CEH, OSCP, OSWP, and Pentest+ (beta), in that order. I was specifically looking for web application, reverse engineering, and advanced penetration testing certifications that were relatively up to date as I felt that I needed…

x86 Exploit Development Pt 2 – ELF Files and Memory Segmentation

Hey again! This is part 2 of my Introduction to x86 Exploit Development. If you didn't check out my first part of this series, I highly recommend it before reading this. In this post, we go a little more in depth as to how things get laid out in memory from a program standpoint, now…