{"id":7379,"date":"2018-02-20T10:03:43","date_gmt":"2018-02-20T09:03:43","guid":{"rendered":"https:\/\/hansesecure.de\/2018\/02\/offensive-security-certified-expert-me\/"},"modified":"2018-02-20T10:03:43","modified_gmt":"2018-02-20T09:03:43","slug":"offensive-security-certified-expert-me","status":"publish","type":"post","link":"https:\/\/hansesecure.de\/en\/2018\/02\/offensive-security-certified-expert-me\/","title":{"rendered":"Offensive Security Certified Expert &amp;&amp; me"},"content":{"rendered":"<p><a href=\"https:\/\/hansesecure.de\/wp-banane\/uploads\/2018\/02\/success.jpg\"><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter wp-image-861\" src=\"https:\/\/hansesecure.de\/wp-banane\/uploads\/2018\/02\/success.jpg\" alt=\"\" width=\"900\" height=\"601\"><\/a><\/p>\n<p>As promised on Twitter here is my <a href=\"https:\/\/www.offensive-security.com\/information-security-certifications\/osce-offensive-security-certified-expert\/\" target=\"_blank\" rel=\"noopener\">OSCE<\/a> review. You can read my time line from before course enrolling until the end of the exam <a href=\"https:\/\/twitter.com\/HanseSecure\/status\/916344972110172161\" target=\"_blank\" rel=\"noopener\">here<\/a>. So, let&#8217;s go.<\/p>\n<h1>Stage_0: Preparation just before enrolling!<\/h1>\n<p>First, I read a ton of other reviews to get an idea about the course and the exam. There is nothing special or important in these before enrolling. The only thing I would really recommend you: Do the <a href=\"http:\/\/www.securitytube-training.com\/online-courses\/securitytube-linux-assembly-expert\/index.html\" target=\"_blank\" rel=\"noopener\">SLAE<\/a> from penetestacademy! The other things like exploitDev tutorials etc. are not much important at this stage<a href=\"https:\/\/twitter.com\/HanseSecure\/status\/916344972110172161\" target=\"_blank\" rel=\"noopener\">.*<\/a><\/p>\n<h1>Stage_1: Crack the challenge fc4.me and waiting for course starting!<\/h1>\n<p>Before you can enroll for the course you need to solve a small <a href=\"http:\/\/fc4.me\/\" target=\"_blank\" rel=\"noopener\">challenge<\/a>. Nothing to add here, just one thing: Do not bother yourself and search the web for the solution. If you can&#8217;t crack it, you are not ready for the course at the moment<a href=\"https:\/\/twitter.com\/HanseSecure\/status\/918716570955808768\" target=\"_blank\" rel=\"noopener\">!*<\/a><\/p>\n<h1>Stage_2: Studying the course material while decreasing sleeptime<\/h1>\n<p>The course material is not comparable to these from the <a href=\"https:\/\/www.offensive-security.com\/information-security-certifications\/oscp-offensive-security-certified-professional\/\" target=\"_blank\" rel=\"noopener\">PWK<\/a>. You have a PDF with &#8216;only&#8217; 150 sites and additional videos. Following topics are covered<a href=\"https:\/\/twitter.com\/HanseSecure\/status\/924572778967289856\" target=\"_blank\" rel=\"noopener\">.*<\/a><\/p>\n<p>Advice:<br \/>\nI would recommend checking the videos after finishing each module in the PDF. Another very important point: Report everything in a well written form (I used cherryNote and Word, but this is your choice). Do these steps for the whole material and go to Stage_4.<\/p>\n<h2>The Web Application angle<\/h2>\n<p>This is a small upgrade to your skills learned in the PWK. Clever XSS attacks, DirTraversal and other things I can&#8217;t tell you \ud83d\ude1b<br \/>\nIf you are familiar with pentesting in general or CTF games you should not have any trouble here.<\/p>\n<h2>The Backdoor angle<\/h2>\n<p>Manually backdooring of PE-files (executables). Always nice to have \ud83d\ude09<\/p>\n<h2>Advanced Exploitation Techniques<\/h2>\n<p>Here begins the fun (and most important stuff). You learn the basics about buffer overflows in windows and mitigation of the low-level kernel protections like SEH or ASLR.<\/p>\n<h2>The 0Day angle<\/h2>\n<p>This was my favorite part. You are going to recreate the whole exploitDev process for the evil NMM <a href=\"https:\/\/www.exploit-db.com\/exploits\/5342\/\" target=\"_blank\" rel=\"noopener\">exploit<\/a> from fuzzing up to RCE. You are also encountered with several curve balls here \ud83d\ude09<\/p>\n<h2>The Networking Angle &#8211; Attacking the Infrastructure<\/h2>\n<p>This part is about a very rare area of pentesting, so relax and learn something uncommon.<\/p>\n<h1>Stage_3: TrainingTime -&gt; rebuild | improve | change exploits from exploitdb<\/h1>\n<p>Now comes to the most important part for your journey to receive your OSCE certification&#8230; &#8220;Wait, but I finished all the course materials!&#8221;<br \/>\nWelcome to the infoSec world ;-<a href=\"https:\/\/twitter.com\/HanseSecure\/status\/931423058665107457\" target=\"_blank\" rel=\"noopener\">)*<\/a><\/p>\n<p>Without the following additional steps, I wouldn&#8217;t have any chance within the exam. So, pay attention \ud83d\ude1b<\/p>\n<h2>Re-Study Course Materials<\/h2>\n<p>At first you should go through the course materials again, but rebuild the exploits from the scratch (fuzzing) and use custom techniques (other registers, fancy jumping, etc).<\/p>\n<h2>External Study Resources<\/h2>\n<p>Check <a href=\"http:\/\/www.abatchy.com\/2017\/03\/osce-study-plan\" target=\"_blank\" rel=\"noopener\">this<\/a> study plan. All topics are covered and each got links to several very good resources. The most important ones are<\/p>\n<ol>\n<li>FuzzSecurity: <a href=\"http:\/\/fuzzysecurity.com\/tutorials.html\" target=\"_blank\" rel=\"noopener\">Windows Exploit Development Tutorial Series<\/a><\/li>\n<li>Corelan: <a href=\"https:\/\/www.corelan.be\/index.php\/articles\/\" target=\"_blank\" rel=\"noopener\">Exploit writing tutorial<\/a><\/li>\n<\/ol>\n<p>Another well written preparation guide is <a href=\"https:\/\/tulpa-security.com\/2017\/07\/18\/288\/\" target=\"_blank\" rel=\"noopener\">here<\/a>. If you finished these preparations you should switch from reading newspapers to reading exploits on <a href=\"https:\/\/www.exploit-db.com\/\" target=\"_blank\" rel=\"noopener\">exploitDB<\/a>. Going through these will give you nice ideas for custom bufferoverflow magics. But the most important thing is: Try to find vulnerable software version mentioned in the exploits, download them and go through the whole exploitDev process. From fuzzing to CodeExecution. And be creative with jumping techniques, used registers, encoders or other techniques. Also try to cover SEH or ASLR protected software.<\/p>\n<p>PS: You can also check my little post about a simple bufferoverflow in the recent coolplayer <a href=\"https:\/\/hansesecure.de\/en\/2018\/02\/cve-2009-1437-rce-in-coolplayer-2-19-6-windows-10-pro\/\" target=\"_blank\" rel=\"noopener\">here<\/a>\ud83d\ude09<\/p>\n<h2>Go into the wild<\/h2>\n<p>At this stage I decided to look for 0days in recent software from huge German computer magazines. I found several ones (from local DoS to RCE), which will be released on this blog, if they are fixed or my deadline is reached \ud83d\ude1b<\/p>\n<h2>Sharpen your Weapons<\/h2>\n<p>Following things turned out as very useful<\/p>\n<ol>\n<li>Build skeleton exploits and fuzzing config-files for several use cases. (will release some of these on my <a href=\"https:\/\/github.com\/HanseSecure\" target=\"_blank\" rel=\"noopener\">github<\/a> account)<\/li>\n<li>Automate things you can automate (some small helpers are already <a href=\"https:\/\/github.com\/HanseSecure\/ExploitDev\" target=\"_blank\" rel=\"noopener\">here<\/a>)<\/li>\n<li>Prepare a command cheat sheet (for example eggHunting code, custom jumps, etc.)<\/li>\n<\/ol>\n<h1>Stage_3.5: Relax &amp;&amp; Have fun in the exam.<\/h1>\n<p>If you followed this guide, you are well prepared and should handle most problems within the time. I started my exam action <a href=\"https:\/\/twitter.com\/HanseSecure\/status\/962963444688400384\">here<\/a>. This exam was crazy and brutal. I thought several times that I am lost and don&#8217;t see any foothold. All targets got different points for achieving several challenges. I decided to start with the higher ones. I found the entry point for all higher pointed targets, but didn&#8217;t find a way to reach the aim. So, I switched to the lower ones. Same problem here, finding the entry point knowing which steps should lead to the solution but crashing against a wall or running into rabbit holes.<\/p>\n<p>I took a break for pizza and had a shower. I went back to my laptop and tried an idea which come to my mind while having my meal. I did a longer research in the web for this specific idea and &#8211; BOOM, the first important step on a high target accomplished. After another half an hour I owned this one totally.<\/p>\n<p>Now I retried some things on the other high target and noticed that I have several smaller mistakes in my code. So, doing some magic here, reconstruct here and &#8211; YES, next one owned.<\/p>\n<p>Okay, only the lower targets and about 24 hours left, I went to bed. After 6 hours of sleep, I recharged my laptop and tried my best on the lower targets&#8230; But these were just evil. I did a lot of research in the web and really tried harder. Finally, both challenges were finished.<\/p>\n<p>I finished the report and reached Stage_4.<\/p>\n<h1>Stage_4: Submitting my Exam Report and hoping for the best<\/h1>\n<p>I was very nervous because my report was very technical (more than for my OSCP) and maybe I missed an important task. But in the end I received the holy email and got a <a href=\"https:\/\/twitter.com\/HanseSecure\/status\/964038957121064960\" target=\"_blank\" rel=\"noopener\">retweet<\/a> from offensive-security themselves :<a href=\"https:\/\/twitter.com\/HanseSecure\/status\/963715910006697984\" target=\"_blank\" rel=\"noopener\">-P*<\/a><\/p>\n<p><a href=\"https:\/\/hansesecure.de\/wp-banane\/uploads\/2018\/02\/offsec_twitter.png\"><img decoding=\"async\" class=\"aligncenter wp-image-848\" src=\"https:\/\/hansesecure.de\/wp-banane\/uploads\/2018\/02\/offsec_twitter-300x280.png\" alt=\"\" width=\"400\" height=\"373\"><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>I would recommend this course to everyone who works in technical infoSec area.<\/p>\n<pre><strong>Thank You Offsec for this awesome journey!<\/strong><\/pre>\n","protected":false},"excerpt":{"rendered":"<p>As promised on Twitter here is my OSCE review. You can read my time line from before course enrolling until the end of the exam here. So, let&#8217;s go. Stage_0: Preparation just before enrolling! First, I read a ton of other reviews to get an idea about the course and the exam. There is nothing [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[257],"tags":[272,276,277,266,280,279],"class_list":["post-7379","post","type-post","status-publish","format-standard","hentry","category-deep-dive-techniques","tag-bufferoverflow-en-2","tag-exploit-en-2","tag-exploitdev-en","tag-migration-en","tag-osce-en-2","tag-windows-en-2"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Offensive Security Certified Expert &amp;&amp; me &#8211; HanseSecure GmbH<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/hansesecure.de\/en\/2018\/02\/offensive-security-certified-expert-me\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Offensive Security Certified Expert &amp;&amp; me &#8211; HanseSecure GmbH\" \/>\n<meta property=\"og:description\" content=\"As promised on Twitter here is my OSCE review. You can read my time line from before course enrolling until the end of the exam here. So, let&#8217;s go. Stage_0: Preparation just before enrolling! First, I read a ton of other reviews to get an idea about the course and the exam. There is nothing [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hansesecure.de\/en\/2018\/02\/offensive-security-certified-expert-me\/\" \/>\n<meta property=\"og:site_name\" content=\"HanseSecure GmbH\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/hansesecure\" \/>\n<meta property=\"article:published_time\" content=\"2018-02-20T09:03:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/hansesecure.de\/wp-banane\/uploads\/2018\/02\/success.jpg\" \/>\n<meta name=\"author\" content=\"HanseSecure\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberWarship\" \/>\n<meta name=\"twitter:site\" content=\"@CyberWarship\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"HanseSecure\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/2018\\\/02\\\/offensive-security-certified-expert-me\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/2018\\\/02\\\/offensive-security-certified-expert-me\\\/\"},\"author\":{\"name\":\"HanseSecure\",\"@id\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/#\\\/schema\\\/person\\\/6ec6ef4887ff2fc97a14f1a7f390f593\"},\"headline\":\"Offensive Security Certified Expert &amp;&amp; me\",\"datePublished\":\"2018-02-20T09:03:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/2018\\\/02\\\/offensive-security-certified-expert-me\\\/\"},\"wordCount\":1050,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/2018\\\/02\\\/offensive-security-certified-expert-me\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/hansesecure.de\\\/wp-banane\\\/uploads\\\/2018\\\/02\\\/success.jpg\",\"keywords\":[\"BufferOverflow\",\"exploit\",\"exploitDev\",\"Migration\",\"OSCE\",\"windows\"],\"articleSection\":[\"Deep Dive Techniques\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/hansesecure.de\\\/en\\\/2018\\\/02\\\/offensive-security-certified-expert-me\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/2018\\\/02\\\/offensive-security-certified-expert-me\\\/\",\"url\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/2018\\\/02\\\/offensive-security-certified-expert-me\\\/\",\"name\":\"Offensive Security Certified Expert &amp;&amp; me &#8211; HanseSecure GmbH\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/2018\\\/02\\\/offensive-security-certified-expert-me\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/2018\\\/02\\\/offensive-security-certified-expert-me\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/hansesecure.de\\\/wp-banane\\\/uploads\\\/2018\\\/02\\\/success.jpg\",\"datePublished\":\"2018-02-20T09:03:43+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/2018\\\/02\\\/offensive-security-certified-expert-me\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/hansesecure.de\\\/en\\\/2018\\\/02\\\/offensive-security-certified-expert-me\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/2018\\\/02\\\/offensive-security-certified-expert-me\\\/#primaryimage\",\"url\":\"https:\\\/\\\/hansesecure.de\\\/wp-banane\\\/uploads\\\/2018\\\/02\\\/success.jpg\",\"contentUrl\":\"https:\\\/\\\/hansesecure.de\\\/wp-banane\\\/uploads\\\/2018\\\/02\\\/success.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/2018\\\/02\\\/offensive-security-certified-expert-me\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Startseite\",\"item\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Offensive Security Certified Expert &amp;&amp; me\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/\",\"name\":\"HanseSecure GmbH\",\"description\":\"Choose the Intruder\",\"publisher\":{\"@id\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/#organization\",\"name\":\"HanseSecure GmbH\",\"url\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/hansesecure.de\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/cropped-000-LOGO-intensiv-schwarz-rot-HanseSecure_LOGO_CTI_Vektor_rotes_H11806.png\",\"contentUrl\":\"https:\\\/\\\/hansesecure.de\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/cropped-000-LOGO-intensiv-schwarz-rot-HanseSecure_LOGO_CTI_Vektor_rotes_H11806.png\",\"width\":512,\"height\":512,\"caption\":\"HanseSecure GmbH\"},\"image\":{\"@id\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/facebook.com\\\/hansesecure\",\"https:\\\/\\\/x.com\\\/CyberWarship\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/hansesecure\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCAABbKOA_stDFkEKS3MSF7Q\",\"https:\\\/\\\/www.instagram.com\\\/hansesecure\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/hansesecure.de\\\/en\\\/#\\\/schema\\\/person\\\/6ec6ef4887ff2fc97a14f1a7f390f593\",\"name\":\"HanseSecure\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/58fe26b2270315f2ab1268b229465b72c497c86aac3696aaaf2e629ae4e4f0af?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/58fe26b2270315f2ab1268b229465b72c497c86aac3696aaaf2e629ae4e4f0af?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/58fe26b2270315f2ab1268b229465b72c497c86aac3696aaaf2e629ae4e4f0af?s=96&d=mm&r=g\",\"caption\":\"HanseSecure\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Offensive Security Certified Expert &amp;&amp; me &#8211; HanseSecure GmbH","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/hansesecure.de\/en\/2018\/02\/offensive-security-certified-expert-me\/","og_locale":"en_US","og_type":"article","og_title":"Offensive Security Certified Expert &amp;&amp; me &#8211; HanseSecure GmbH","og_description":"As promised on Twitter here is my OSCE review. You can read my time line from before course enrolling until the end of the exam here. So, let&#8217;s go. Stage_0: Preparation just before enrolling! First, I read a ton of other reviews to get an idea about the course and the exam. There is nothing [&hellip;]","og_url":"https:\/\/hansesecure.de\/en\/2018\/02\/offensive-security-certified-expert-me\/","og_site_name":"HanseSecure GmbH","article_publisher":"https:\/\/facebook.com\/hansesecure","article_published_time":"2018-02-20T09:03:43+00:00","og_image":[{"url":"https:\/\/hansesecure.de\/wp-banane\/uploads\/2018\/02\/success.jpg","type":"","width":"","height":""}],"author":"HanseSecure","twitter_card":"summary_large_image","twitter_creator":"@CyberWarship","twitter_site":"@CyberWarship","twitter_misc":{"Written by":"HanseSecure","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/hansesecure.de\/en\/2018\/02\/offensive-security-certified-expert-me\/#article","isPartOf":{"@id":"https:\/\/hansesecure.de\/en\/2018\/02\/offensive-security-certified-expert-me\/"},"author":{"name":"HanseSecure","@id":"https:\/\/hansesecure.de\/en\/#\/schema\/person\/6ec6ef4887ff2fc97a14f1a7f390f593"},"headline":"Offensive Security Certified Expert &amp;&amp; me","datePublished":"2018-02-20T09:03:43+00:00","mainEntityOfPage":{"@id":"https:\/\/hansesecure.de\/en\/2018\/02\/offensive-security-certified-expert-me\/"},"wordCount":1050,"commentCount":0,"publisher":{"@id":"https:\/\/hansesecure.de\/en\/#organization"},"image":{"@id":"https:\/\/hansesecure.de\/en\/2018\/02\/offensive-security-certified-expert-me\/#primaryimage"},"thumbnailUrl":"https:\/\/hansesecure.de\/wp-banane\/uploads\/2018\/02\/success.jpg","keywords":["BufferOverflow","exploit","exploitDev","Migration","OSCE","windows"],"articleSection":["Deep Dive Techniques"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/hansesecure.de\/en\/2018\/02\/offensive-security-certified-expert-me\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/hansesecure.de\/en\/2018\/02\/offensive-security-certified-expert-me\/","url":"https:\/\/hansesecure.de\/en\/2018\/02\/offensive-security-certified-expert-me\/","name":"Offensive Security Certified Expert &amp;&amp; me &#8211; HanseSecure GmbH","isPartOf":{"@id":"https:\/\/hansesecure.de\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/hansesecure.de\/en\/2018\/02\/offensive-security-certified-expert-me\/#primaryimage"},"image":{"@id":"https:\/\/hansesecure.de\/en\/2018\/02\/offensive-security-certified-expert-me\/#primaryimage"},"thumbnailUrl":"https:\/\/hansesecure.de\/wp-banane\/uploads\/2018\/02\/success.jpg","datePublished":"2018-02-20T09:03:43+00:00","breadcrumb":{"@id":"https:\/\/hansesecure.de\/en\/2018\/02\/offensive-security-certified-expert-me\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hansesecure.de\/en\/2018\/02\/offensive-security-certified-expert-me\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/hansesecure.de\/en\/2018\/02\/offensive-security-certified-expert-me\/#primaryimage","url":"https:\/\/hansesecure.de\/wp-banane\/uploads\/2018\/02\/success.jpg","contentUrl":"https:\/\/hansesecure.de\/wp-banane\/uploads\/2018\/02\/success.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/hansesecure.de\/en\/2018\/02\/offensive-security-certified-expert-me\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Startseite","item":"https:\/\/hansesecure.de\/en\/"},{"@type":"ListItem","position":2,"name":"Offensive Security Certified Expert &amp;&amp; me"}]},{"@type":"WebSite","@id":"https:\/\/hansesecure.de\/en\/#website","url":"https:\/\/hansesecure.de\/en\/","name":"HanseSecure GmbH","description":"Choose the Intruder","publisher":{"@id":"https:\/\/hansesecure.de\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hansesecure.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/hansesecure.de\/en\/#organization","name":"HanseSecure GmbH","url":"https:\/\/hansesecure.de\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/hansesecure.de\/en\/#\/schema\/logo\/image\/","url":"https:\/\/hansesecure.de\/wp-content\/uploads\/2023\/05\/cropped-000-LOGO-intensiv-schwarz-rot-HanseSecure_LOGO_CTI_Vektor_rotes_H11806.png","contentUrl":"https:\/\/hansesecure.de\/wp-content\/uploads\/2023\/05\/cropped-000-LOGO-intensiv-schwarz-rot-HanseSecure_LOGO_CTI_Vektor_rotes_H11806.png","width":512,"height":512,"caption":"HanseSecure GmbH"},"image":{"@id":"https:\/\/hansesecure.de\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/hansesecure","https:\/\/x.com\/CyberWarship","https:\/\/www.linkedin.com\/company\/hansesecure","https:\/\/www.youtube.com\/channel\/UCAABbKOA_stDFkEKS3MSF7Q","https:\/\/www.instagram.com\/hansesecure\/"]},{"@type":"Person","@id":"https:\/\/hansesecure.de\/en\/#\/schema\/person\/6ec6ef4887ff2fc97a14f1a7f390f593","name":"HanseSecure","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/58fe26b2270315f2ab1268b229465b72c497c86aac3696aaaf2e629ae4e4f0af?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/58fe26b2270315f2ab1268b229465b72c497c86aac3696aaaf2e629ae4e4f0af?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/58fe26b2270315f2ab1268b229465b72c497c86aac3696aaaf2e629ae4e4f0af?s=96&d=mm&r=g","caption":"HanseSecure"}}]}},"_links":{"self":[{"href":"https:\/\/hansesecure.de\/en\/wp-json\/wp\/v2\/posts\/7379","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hansesecure.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/hansesecure.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/hansesecure.de\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/hansesecure.de\/en\/wp-json\/wp\/v2\/comments?post=7379"}],"version-history":[{"count":0,"href":"https:\/\/hansesecure.de\/en\/wp-json\/wp\/v2\/posts\/7379\/revisions"}],"wp:attachment":[{"href":"https:\/\/hansesecure.de\/en\/wp-json\/wp\/v2\/media?parent=7379"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/hansesecure.de\/en\/wp-json\/wp\/v2\/categories?post=7379"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/hansesecure.de\/en\/wp-json\/wp\/v2\/tags?post=7379"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}