<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>offensive security on Asa&#39;s Website</title><link>https://ahessmat.netlify.com/tags/offensive-security/</link><description>Recent content in offensive security on Asa&#39;s Website</description><generator>Hugo -- gohugo.io</generator><language>en-us</language><lastBuildDate>Fri, 26 Jun 2020 03:38:47 +0000</lastBuildDate><atom:link href="https://ahessmat.netlify.com/tags/offensive-security/index.xml" rel="self" type="application/rss+xml"/><item><title>Quick 3 (June)</title><link>https://ahessmat.netlify.com/post/2020-06-quick-5-june/</link><pubDate>Fri, 26 Jun 2020 03:38:47 +0000</pubDate><guid>https://ahessmat.netlify.com/post/2020-06-quick-5-june/</guid><description>This month&amp;rsquo;s quick three:
The Offensive Security (OffSec) Penetration Testing With Kali Linux (PWK) course materials are far more dense than I had anticipated. Students who take the Offensive Security Certified Professional (OSCP) exam may include in their final writeup a post-mortem of their work with the PWK for extra credit. Since 2017, this writeup has included a detailed summary of the student&amp;rsquo;s work through the PWK course exercises. I thought these exercises would be trivial - most of the testimonials regarding the PWK revolve around pwning the practice machines, not the exercises.</description></item></channel></rss>