Path to OSCP - Part 6, Day 2 and 3
March 1, 2016
After 8 more hours of studying, I have progressed +50 pages and +1:40h in video material. Most of my time has been spent running scans or fiddling around in hexadecimal trying to get exploits working.
Yesterday I was severely overwhelmed by how much data I am already beginning to gather -- open ftp servers, Samba shares, public SNMP enumeration etc.
I decided that I'll gather the raw data in KeepNote for further reading, but I am beginning to collect the main bits -- IP, hostname, domain/workgroup, OS etc. -- into a simple Excel spreadsheet that I am evolving as needed.
So far I have seen so many different Windows versions that this Wikipedia page came in handy since I haven't been in touch with the Windows world and forgot the version numbers :)
I also learned how you can resume nmap scans if needed!
And done! But as I learned, this does not work over VM suspends since it somehow relies on mmap() in the background -- I got an error when I tried...
Also, just some info on why progress with exercises takes longer than watching the relevant video:
Yeah.. that's from a single nmap scan of a single host! It was stuck at 99.92% for 1,5 hours before I went to sleep last night.
Another snippet of interest to anyone going to work with Kali:
It'll create a screenshot of the selected area and save the file in your home dir.
I'm really happy I've now had actual dealings with OllyDbg, Immunity debugger and edb (Evans Debugger) -- these will come in handy when I start focusing on reverse engineering after my OSCP course :)
Big thanks to anyone watching and especially leaving feedback of any form!