Jump to content

ajes

Members
  • Content Count

    42
  • Joined

  • Last visited

Community Reputation

465 Excellent

About ajes

  • Rank
    Member

Profile Information

  • Gender
    Not Telling
  • Location
    Minneapolis

Recent Profile Visitors

90 profile views
  1. I have just discovered, that it is very easy to remove watermark from PDF file. You need to use `pdftohtml` Linux command, and then from outputed HTML file, you need to remove one line per page, which include watermark. Not sure if images are watermarked.
  2. OffSec is not using image, but they put text watermark, that is mixing with "real" content on the page.
  3. [Hidden Content]
  4. I am presenting One-Stop for all Offensive Security materials. I don't have anything else, so don't ask. It is just collection of other shares from this forum, so nothing new. Please mirror it as soon as possible, otherwise links would be dead. Here is a list of files in the archives: Offensive Security - Advanced Web Attacks and Exploitation (AWAE): 0_Syllabus_Advanced_Web_Attacks_and_Exploitation.pdf AWAE_2016_BlackHat.pdf Hints_Server Offensive Security - Advanced Windows Exploitation (AWE): 0_Syllabus_Advanced_Windows_Exploitation.pdf 1.1_2009_BlackHat 2.0_2010 Offensive Security - Advanced Windows Exploitation (AWE)/1.1_2009_BlackHat: AWE-1.pdf AWE-2.pdf AWE-3.pdf AWE-4.pdf Offensive Security - Advanced Windows Exploitation (AWE)/2.0_2010: AWE-PRES.pdf Module 0x01 Egghunters.pdf Module 0x02a Bypassing NX.pdf Module 0x02b (Update) Bypassing DEP AlwaysOn Policy.pdf Module 0x03 Custom Shellcode Creation.pdf Module 0x04 Venetian Shellcode.pdf Module 0x05 Kernel Drivers Exploitation.pdf Module 0x06 Heap Spraying.pdf Offensive Security - Cracking the Perimeter (CTP): 0_Syllabus_Cracking_the_Perimeter.pdf CTP_2008_BlackHat.pdf video Offensive Security - Lab Exercises: Offensive Security Lab Exercises_2007.pdf Offensive Security - Penetration Testing with Kali Linux (PWK): 0_Syllabus_Penetration_Testing_with_Kali_Linux.pdf PWK_2014.pdf video Offensive Security - Wireless Attacks (WiFu): 0_Syllabus_Wireless_Attacks_-_WiFu.pdf BackTrack WiFu 2.0_2009.pdf BackTrack WiFu 3.0_2012.pdf video [Hidden Content]
  5. [Hidden Content]
  6. Could someone upload Code Review materials from PentesterLab: [Hidden Content] ?
  7. I don't think so that anyone has prepared "pack" with VMs for PWK, but there are some VMs on HackTheBox or in VulnHUB, that could be helpful for the mastering knowledge acquired in this training. Example list: [Hidden Content] And to answer you question about differences between VMs for AWAE and PWK. Them are totally different, as the goals are different. In AWAE you are getting credentials to admin/root of VM, as you are about to perform source code analysis (whitebox approach), and on PWK you need to do enumeration and hack the VM from blackbox perspective. In PWK lab you have about 54 VMs to hack in different "networks".
  8. This one works for me: [Hidden Content]
  9. ajes

    SANS599

    First downloaded rar file, shows that this is PDF and year is 2017.
  10. ajes

    SANS599

    Could you upload it to mega.nz?
  11. ajes

    OSCP

    I have passed OSCP.
×
×
  • Create New...