For this walkthrough, I decided to target FriendZone. This particular machine took me three days to complete, and I was cursing its creator the entire time. What’s worse? They retired the machine while I was sleeping, the night before I beat the machine, so I got no points for the accomplishment. Fake internet points aren’t as important as real-world experience. But it would have been nice to get the points.
My PWK lab access has ended, but I haven’t stopped preparing for the upcoming OSCP examination. I’ve been practicing on the HTB labs to sharpen my skills, and working on writing buffer overflow exploits so that I’m more comfortable with the process. I hope to write more tutorials once I’ve finished my OSCP journey, but for now I’m focusing primarily on studying. That doesn’t mean I’m going to leave you all high and dry, though.
What a busy week it’s been! Until yesterday the course has largely been a review of concepts I already understood (though the review definitely helped), with a few new nuggets of wisdom thrown in for good measure. The only gripe I have so far is that the videos are older than the PDF, and the PDF is a little outdated compared to the course, and certain changes in the lab and the Kali VM weren’t reflected in the course material, which caused a bit of a headache as I tried to piece everything together.
The day has finally come! I’ve received my materials and lab access credentials. I’ve been added to the exclusive Super Secret Student Forum. It’s time to get hacking! While I cannot share any specific details about the PWK course or lab, I will do my best to write about the interesting topics I encounter as I progress through the course. I’m sure there will be plenty I can write about without spoiling anything.
With the start of my PWK course only three days away, I decided to try my hand at one of the newer HackTheBox machines, called Help. I chose this box for two reasons. First, it was rated as moderately easy, and had a more real-world, CVE approach instead of a brain-bending, unrealistic CTF approach. Second, I had attempted this box previously without success, and taking another stab at it would allow me to judge how much I’d learned in the previous month.