Skip to content

Commit

Permalink
fix
Browse files Browse the repository at this point in the history
  • Loading branch information
4xLoff committed Mar 2, 2024
1 parent b9e0e2d commit e637371
Show file tree
Hide file tree
Showing 9 changed files with 27 additions and 25 deletions.
2 changes: 1 addition & 1 deletion _posts/blog/2023-07-03-Road-to-eJPTv2.md
Original file line number Diff line number Diff line change
Expand Up @@ -29,7 +29,7 @@ Cuso de Introducción al Hacking de [hack4u.io] Academia de **s4vitar**.

<!--more-->

* this unordered seed list will be replaced by the toc
1. this unordered seed list will be replaced by the toc
{:toc}

---
Expand Down
2 changes: 1 addition & 1 deletion _posts/blog/2023-07-04-Road-to-eWPT.md
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ image:

<!--more-->

* this unordered seed list will be replaced by the toc
1. this unordered seed list will be replaced by the toc
{:toc}

---
Expand Down
4 changes: 2 additions & 2 deletions _posts/blog/2023-07-05-Metasploit-Track.md
Original file line number Diff line number Diff line change
Expand Up @@ -11,8 +11,8 @@ image:

<!--more-->

* this unordered seed list will be replaced by the toc
{:toc}
1. this unordered seed list will be replaced by the toc
{:toc}


---
Expand Down
2 changes: 1 addition & 1 deletion _posts/blog/2023-07-06-Road-to-eCPPTv2.md
Original file line number Diff line number Diff line change
Expand Up @@ -10,7 +10,7 @@ image:

<!--more-->

- this unordered seed list will be replaced by the toc
1. this unordered seed list will be replaced by the toc
{:toc}

---
Expand Down
2 changes: 1 addition & 1 deletion _posts/blog/2023-07-10-Road-to-OSCP.md
Original file line number Diff line number Diff line change
Expand Up @@ -11,7 +11,7 @@ image:

<!--more-->

* this unordered seed list will be replaced by the toc
1. this unordered seed list will be replaced by the toc
{:toc}

---
Expand Down
6 changes: 3 additions & 3 deletions _posts/blog/2023-11-24-Review-eCPPTv2.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,14 +8,14 @@ image:
path: /assets/img/ecppttrack/eCPPT.png
---

---
***

<!--more-->

1. this ordered seed list will be replaced by the toc
{:toc}
{:toc}

---
***

# Review eCPPTv2

Expand Down
34 changes: 18 additions & 16 deletions _posts/blog/2024-02-01-Review-OSWP.md
Original file line number Diff line number Diff line change
Expand Up @@ -8,41 +8,38 @@ image:
path: /assets/img/oswp/oswp.png
---

---
***

<!--more-->

1. this ordered seed list will be replaced by the toc
{:toc}
{:toc}

---
***

# Review OSWP

It is with great joy that I am here to tell you, without spoilers, how to get certified as an [OSWP] **Offensive Security Wireless Professional**. I just got this certification and I want you to get certified too. I'll share with you my experience, tips and tricks so you can get it on your first try.

[Offsec]https://www.offsec.com/courses/pen-210/
It is with great joy that I am here to tell you, without spoilers, how to get certified as an [OSWP](https://www.offsec.com/courses/pen-210/) **Offensive Security Wireless Professional**. I just got this certification and I want you to get certified too. I'll share with you my experience, tips and tricks so you can get it on your first try.

---

## Why Certify with OSWP?

In this article I will share my experience and how I prepared myself to successfully meet the challenge of OSWP, actually I am preparing for OSCP, but I bought the learner one that gives you the possibility to take this exam, I have taken advantage and I have been certified, all the resources that I will tell you have helped me a lot to achieve the goal, but I'm not going to fool you I already start with an advantage because I started the hacking world when I was a child booteaba on a usb distribution for wireless pentesting, ie doing the pranks we usually do when we are small and comprotetia personal networks WPS, WEP, WPA-PSK, WPA2-PSK, etc· and the MGT very few as we are so common, also served to reecordar, in short let's move to the important thing·
In this article I will share my experience and how I prepared myself to successfully meet the challenge of OSWP, actually I am preparing for OSCP, but I bought the learner one that gives you the possibility to take this exam, I have taken advantage and I have been certified, all the resources that I will tell you have helped me a lot to achieve the goal, but I'm not going to fool you I already start with an advantage because I started the hacking world when I was a child booteaba on a usb distribution for wireless pentesting, ie doing the pranks we usually do when we are small and comprotetia personal networks WPS, WEP, WPA-PSK, WPA2-PSK, etc· and the MGT very few as we are so common, also served to reecordar, in short let's move to the important thing.

---

## Recommendations before the Exam

As the saying goes, practice makes perfect, in the resources that you get in offsec the laboratirios you must assemble them yourself and that is tedious because you must have a moden, a wireless card, etc·
As the saying goes, practice makes perfect, in the resources that you get in offsec the laboratirios you must assemble them yourself and that is tedious because you must have a moden, a wireless card, etc.

To avoid this we will use some fancy resources created by [_r4ulcl_] called WiFiChallengeLab, which we will use them to practice the challenges of the challenger itself, but we will use them to make all the challenges of OSWP since the APs and clients are mounted in virtualvox inside the docker or image, these will not simplify much·

[_r4ulcl]@_r4ulcl_
To avoid this we will use some fancy resources created by [@\_r4ulcl](https://twitter.com/_r4ulcl_)
called WiFiChallengeLab, which we will use them to practice the challenges of the challenger itself, but we will use them to make all the challenges of OSWP since the APs and clients are mounted in virtualvox inside the docker or image, these will not simplify much.

- [WiFiChallengeLab](https://github.com/r4ulcl/WiFiChallengeLab)
- [WiFiChallengeLabv2.0](https://github.com/r4ulcl/WiFiChallengeLab)

Well, but in addition to that we will practice a lot with the resources of [attackdefense·pentesteracademy·com](https://attackdefense·pentesteracademy·com):
Well, but in addition to that we will practice a lot with the resources of [attackdefense.pentesteracademy.com](https://attackdefense·pentesteracademy·com):

### Basic

Expand All @@ -62,19 +59,24 @@ Well, but in addition to that we will practice a lot with the resources of [atta
- [Live Cracking](https://attackdefense.pentesteracademy.com/listing?labtype=wifi-security-enterprise-networks&subtype=wifi-security-enterprise-networks-online)
- [Pivoting](https://attackdefense.pentesteracademy.com/listing?labtype=wifi-security-enterprise-networks&subtype=wifi-security-enterprise-networks-pivoting)


### Other Resources

- [Wi-Fi-Pentesting-Cheatsheet](https://github.com/dh0ck/Wi-Fi-Pentesting-Cheatsheet)
- [WirelessPentesting-CheatSheet](https://github.com/V0lk3n/WirelessPentesting-CheatSheet)
- [oswp-preparacion/#](https://s4vitar.github.io/oswp-preparacion/#)
- [Oswp-Preparacion](https://s4vitar.github.io/oswp-preparacion/#)

---

## Exam

The first thing will be to verify all the requirements such as having your identification on hand, following the steps· The truth is they are very simple· This will take about 15-20 minutes· If everything is correct, the exam lasts 3 hours and 45 minutes· You must commit two of three networks, one of which is mandatory, so you have to commit to it, no matter what·
The first thing will be to verify all the requirements such as having your identification on hand, following the steps· The truth is they are very simple· This will take about 15-20 minutes· If everything is correct, the exam lasts 3 hours and 45 minutes· You must commit two of three networks, one of which is mandatory, so you have to commit to it, no matter what.

For the report, I made a LaTeX template with the Wifichallenge machine that I later modified. Something that helped me a lot was to create a mind map because it's very easy to get lost in what you're doing. I'm sharing it with you to guide you; it will serve you better if you do it yourself and link it to your vault with tags, links, etc. I assure you that with all this and putting in commitment, you will not fail your exam; you just have to dedicate yourself.

![list](/assets/img/oswp/w.png){:.lead width="800" height="100" loading="lazy"}

---

## Conclution

Personally, I believe that this certification is quite neglected in terms of resources and labs, it's much inferior to the OSCP, but overall I liked it. Even though there's a lot of theory, if you combine it properly and can deploy and execute everything, the practical exercises will go very well. Allow me to share some tips for real-life audits: if you create your AP with login pages, you'll have a better chance of obtaining credentials. For handshakes, launch the karma attack first, even if it's very noisy; no one says anything. I don't know why they don't implement more solutions. Regarding security against brute force attacks, the dictionary is the most important. The more specific data you have, the more chances you'll have of obtaining credentials. But, as I said, the mischievous AP is better. I hope I've helped you!
Personally, I believe that this certification is quite neglected in terms of resources and labs, it's much inferior to the OSCP, but overall I liked it. Even though there's a lot of theory, if you combine it properly and can deploy and execute everything, the practical exercises will go very well. Allow me to share some tips for real-life audits: if you create your AP with login pages, you'll have a better chance of obtaining credentials. For handshakes, launch the karma attack first, even if it's very noisy; no one says anything. I don't know why they don't implement more solutions. Regarding security against brute force attacks, the dictionary is the most important. The more specific data you have, the more chances you'll have of obtaining credentials. But, as I said, the mischievous AP is better. I hope I've helped you!.
Binary file modified assets/img/oswp/oswp.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added assets/img/oswp/w.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.

0 comments on commit e637371

Please sign in to comment.