{"id":1592,"date":"2016-02-16T10:58:44","date_gmt":"2016-02-16T10:58:44","guid":{"rendered":"http:\/\/nethemba.com\/sk\/oscp-review\/"},"modified":"2016-02-18T11:01:58","modified_gmt":"2016-02-18T11:01:58","slug":"oscp-review","status":"publish","type":"post","link":"https:\/\/nethemba.com\/sk\/oscp-review\/","title":{"rendered":"OSCP review"},"content":{"rendered":"<p>Medzin\u00e1rodn\u00e1 bezpe\u010dnostn\u00e1 spolo\u010dnos\u0165 Offensive Security pon\u00faka v s\u00fa\u010dasnosti nieko\u013eko druhov \u0161kolen\u00ed a certifik\u00e1tov. Ku kurzom, ktor\u00e9 je mo\u017en\u00e9 realizova\u0165 na dia\u013eku patria Penetration Testing with Kali (OSCP), Wireless Attacks (OSWP) a Cracking the Perimeter (OSCE). \u010eal\u0161ie <a href=\"https:\/\/www.offensive-security.com\/information-security-training\/\">\u0161kolenia<\/a> Advanced Windows Exploitation (OSEE) a Advanced Web Attacks and Exploitation (AWAE), ktor\u00e9 je nutn\u00e9 absolvova\u0165 na prest\u00ed\u017enych konferenci\u00e1ch ako Black Hat USA, boli u\u017e za\u010diatkom roka 2015 vypredan\u00e9<span style=\"font-family: Liberation Serif,serif;\"><span style=\"font-size: medium;\">.<\/span><\/span><\/p>\n<p>Certifik\u00e1t OSCP som si chcel spravi\u0165 u\u017e pred p\u00e1r rokmi. Predpokladom pre pripustenie k OSCP sk\u00fa\u0161ke je povinn\u00e9 zaplatenie si kurzu Penetration Testing with Kali Linux na dobu minim\u00e1lne jeden mesiac. V cene je zahrnut\u00fd lab, \u0161tudijn\u00e9 materi\u00e1ly a poplatok za sk\u00fa\u0161ku. V pr\u00edpade, \u017ee by sa v\u00e1m nepodarilo sk\u00fa\u0161ku zlo\u017ei\u0165 na prv\u00fdkr\u00e1t, zaplat\u00edte za ka\u017ed\u00fd \u010fal\u0161\u00ed pokus 60 dol\u00e1rov. \u010cakacia doba sa v tomto pr\u00edpade postupne predl\u017euje. V \u010dase, ke\u010f som nad kurzom uva\u017eoval, sa e\u0161te lab volal Penetration Testing with Backtrack, dnes je jeho n\u00e1zov Penetration Testing with Kali. V minulosti po v\u00fdbere 30tich dn\u00ed a vzh\u013eadom k tomu, \u017ee som bol zahlten\u00fd mno\u017estvom projektov, som v labe str\u00e1vil len p\u00e1r hod\u00edn a nestihol sa ani zaregistrova\u0165 na sk\u00fa\u0161ku.<\/p>\n<h3>LAB<\/h3>\n<p>V decembri 2015 som si op\u00e4\u0165 zaplatil lab a za\u010diatkom janu\u00e1ra tohto roku za\u010dal so samotn\u00fdm testovan\u00edm. V \u00favode dostanete asi 300 stranov\u00e9 PDF s \u00falohami a takisto pr\u00edstup do verejnej siete, kde sa nach\u00e1dza okolo 40 zranite\u013en\u00fdch serverov s priamou konektivitou. Postupne sa dost\u00e1vate do \u010fal\u0161\u00edch siet\u00ed (IT, dev, admin) a objavujete nov\u00e9 servery. T\u00e1to \u010das\u0165 je nepovinn\u00e1, ale ak by v\u00e1m pri z\u00e1vere\u010dnej sk\u00fa\u0161ke ch\u00fdbali body, kompromitovan\u00edm t\u00fdchto serverov a n\u00e1sledn\u00fdm vypracovan\u00edm a zaslan\u00edm reportu m\u00f4\u017eete zop\u00e1r bonusov\u00fdch bodov obdr\u017ea\u0165.<\/p>\n<p>\u010co vn\u00edmam ako benefit je fakt, \u017ee m\u00f4\u017eete pou\u017e\u00edva\u0165 IRC na komunik\u00e1ciu s adminmi \u2013 v\u00e4\u010d\u0161inou sa do min\u00faty n\u00e1jde niekto, kto v\u00e1m odpovie. Pokia\u013e sa sp\u00fdtate na server, ktor\u00fd nie je \u201eoptional\u201c, radi v\u00e1m poradia.<\/p>\n<p>V labe sa nach\u00e1dzaj\u00fa stroje (pain, sufference, humble, fc4, gh0st), ktor\u00e9 maj\u00fa reput\u00e1ciu ako n\u00e1ro\u010dn\u00e9 na hacknutie (sta\u010d\u00ed si da\u0165 do Google oscp review) a admini k nim nie s\u00fa ochotn\u00ed poskytova\u0165 \u017eiadne rady. Samozrejme, je to individu\u00e1lne. Mne osobne pri\u0161iel lab trivi\u00e1lny vzh\u013eadom k podobnosti <a href=\"http:\/\/vulnhub.com\/\">http:\/\/vulnhub.com<\/a>, kde sa nach\u00e1dzaj\u00fa \u00falohy, s ktor\u00fdmi u\u017e som mal ve\u013ea sk\u00fasenost\u00ed. K pr\u00edprave odpor\u00fa\u010dam prejs\u0165 si tie\u017e nieko\u013eko \u010dl\u00e1nkov o p\u00edsan\u00ed exploitov na <a href=\"https:\/\/www.corelan.be\/index.php\/2009\/07\/19\/exploit-writing-tutorial-part-1-stack-based-overflows\/\">corelan.be<\/a> a v\u00fdborne nap\u00edsan\u00fa knihu \u201e<a href=\"http:\/\/www.amazon.com\/The-Hacker-Playbook-Practical-Penetration\/dp\/1494932636\">The Hacker Playbook: Practical Guide To Penetration Testing\u201c<\/a>.<\/p>\n<p>Sufference som dokon\u010dil ako predposledn\u00fd a sta\u010dilo mi pribli\u017ene 34 dn\u00ed k z\u00edskaniu opr\u00e1vnenia root\/SYSTEM na v\u0161etk\u00fdch po\u010d\u00edta\u010doch a sie\u0165ach. \u0164a\u017eko poveda\u0165 ko\u013eko \u010dasu mi to denne zabralo, ale kompromit\u00e1cia jedn\u00e9ho servera mi trvala pribli\u017ene 0.5-5h, v z\u00e1vislosti od obtia\u017enosti. Po\u010das tohto \u010dasu som si priebe\u017ene p\u00edsal report a na konci som odovzdal 244 stranov\u00fd dokument. Nie z d\u00f4vodu, \u017ee by som reporty p\u00edsal r\u00e1d, ale preto\u017ee to je z m\u00f4jho poh\u013eadu najnudnej\u0161ia \u010das\u0165 \u0161kolenia, ktor\u00fa som si nechcel nech\u00e1va\u0165 na z\u00e1ver.<\/p>\n<p>Exploit\u00e1cia v\u00e4\u010d\u0161inou spo\u010d\u00edvala v n\u00e1jden\u00ed spr\u00e1vneho exploitu a minim\u00e1lnej modifik\u00e1cie offsetov alebo playloadu. Stretol som sa s t\u00fdm, \u017ee \u0161tudenti mali najv\u00e4\u010d\u0161\u00ed probl\u00e9m s eskal\u00e1ciou. Z vlastnej sk\u00fasenosti viem, \u017ee sa sta\u010dilo rozhliadnu\u0165 po nain\u0161talovan\u00fdch bal\u00ed\u010dkoch, s\u00faboroch s citliv\u00fdmi inform\u00e1ciami, alebo verzi\u00e1ch jadra na to, aby ste dostali spr\u00e1vny n\u00e1pad a nechali sa n\u00edm vies\u0165. Pre m\u0148a bolo najv\u00e4\u010d\u0161ou pridanou hodnotou mno\u017estvo po\u010d\u00edta\u010dov s opera\u010dn\u00fdm syst\u00e9mom Windows, kde som sa nau\u010dil nov\u00e9 sp\u00f4soby eskal\u00e1cie. Podobne sa mi p\u00e1\u010dili klientsk\u00e9 \u00fatoky. Ak zist\u00edte, \u017ee niektor\u00e9 po\u010d\u00edta\u010de medzi sebou komunikuj\u00fa, dok\u00e1\u017eete im posun\u00fa\u0165 aj v\u00e1\u0161 exploit.<\/p>\n<h3>SK\u00da\u0160KA<\/h3>\n<p>Po tom, \u010do sa zap\u00ed\u0161ete na sk\u00fa\u0161ku, dostanete 24 hod\u00edn na hacknutie piatich serverov s r\u00f4znym bodov\u00fdm ohodnoten\u00edm. Minim\u00e1lny po\u010det bodov, ktor\u00fd bolo potrebn\u00e9 dosiahnu\u0165 pre zlo\u017eenie sk\u00fa\u0161ky je 70 bodov. Na za\u010diatku som mal mierne obavy, lebo som nevedel, ak\u00fa n\u00e1ro\u010dnos\u0165 o\u010dak\u00e1va\u0165 a vybral som si ako prv\u00fd server, ktor\u00fd sa mi ani po hodine nepodarilo hackn\u00fa\u0165. Postupoval som v\u0161ak na \u010fal\u0161ie \u00falohy a po 6 hodin\u00e1ch vr\u00e1tane prest\u00e1vok na jedlo som \u00faspe\u0161ne kompromitoval 4 servery za 75 bodov. N\u00e1sledne som sa vr\u00e1til k prv\u00e9mu serveru a tentokr\u00e1t u\u017e bez \u0165a\u017ekost\u00ed z\u00edskal aj na tomto serveri \u00fa\u010det Administr\u00e1tor, dokon\u010dil potrebn\u00fd report a r\u00e1no ho odoslal na vyhodnotenie.<\/p>\n<p>R\u00e1d by som spomenul aj m\u00f4jho kamar\u00e1ta, ktor\u00fd realizoval tento test inak. Po zaplaten\u00ed labu sa mu podarilo hackn\u00fa\u0165 2-3 najjednoduch\u0161ie servery a rovno sa zap\u00edsal na sk\u00fa\u0161ku. O nieko\u013eko dn\u00ed sa mu podarilo prejs\u0165 sk\u00fa\u0161kou za p\u00e1r hod\u00edn. Je to jeden z mo\u017en\u00fdch pr\u00edstupov, v\u0161etko z\u00e1vis\u00ed len na tom, ko\u013eko si toho chcete z kurzu odnies\u0165.<\/p>\n<p>Osobne si nemysl\u00edm, \u017ee ak\u00fdko\u013evek certifik\u00e1t objekt\u00edvne prezentuje schopnosti \u010dloveka a aj napriek svojej reput\u00e1cii mi pripadal OSCP celkom jednoduch\u00fd. Tak\u017ee ak si ho chcete spravi\u0165, malo by to by\u0165 pod\u013ea m\u0148a hlavne z d\u00f4vodu, \u017ee v\u00e1s bav\u00ed rie\u0161enie podobn\u00fdch \u201epuzzle\u201c, ak\u00e9 n\u00e1jdete na spom\u00ednanom vulnhub-e. Pre m\u0148a bol lab ve\u013emi z\u00e1bavn\u00fd a nemysl\u00edm, \u017ee sa ho oplat\u00ed presko\u010di\u0165. Vzh\u013eadom k popularite kurzu vytvorili dokonca Offensive Security pesni\u010dku, ktor\u00fa si m\u00f4\u017eete vypo\u010du\u0165 <a href=\"https:\/\/www.youtube.com\/watch?v=Z66bhGJ4Ons\">tu<\/a>.<\/p>\n<p>Nako\u013eko PWK predstavuje \u00favodn\u00fd kurz, trochu mi ch\u00fdbali n\u00e1ro\u010dnej\u0161ie v\u00fdzvy a mo\u017enos\u0165 \u00eds\u0165 viac do h\u013abky. Ako pr\u00edklad, buffer overflow sekcia bola extr\u00e9mne zjednodu\u0161en\u00e1. \u0160lo len o to sa nau\u010di\u0165 najtrivi\u00e1lnej\u0161ie pr\u00edpady (<a href=\"http:\/\/phrack.org\/issues\/49\/14.html\">1996, Smashing The Stack For Fun And Profit<\/a>), bez ak\u00fdchko\u013evek ochr\u00e1n a opatren\u00ed, kde to \u017eia\u013e aj skon\u010dilo. V najbli\u017e\u0161ej dobe za\u010d\u00ednam s CTP\/OSCE, ktor\u00fd by mal by\u0165 n\u00e1ro\u010dnej\u0161\u00ed a na z\u00e1klade niektor\u00fdch recenzi\u00ed aj v\u00e4\u010d\u0161ou <a href=\"http:\/\/www.networkadminsecrets.com\/2011\/05\/offensive-security-certified-expert.html\">v\u00fdzvou<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Medzin\u00e1rodn\u00e1 bezpe\u010dnostn\u00e1 spolo\u010dnos\u0165 Offensive Security pon\u00faka v s\u00fa\u010dasnosti nieko\u013eko druhov \u0161kolen\u00ed a certifik\u00e1tov. Ku kurzom, ktor\u00e9 je mo\u017en\u00e9 realizova\u0165 na dia\u013eku patria Penetration Testing with Kali (OSCP), Wireless Attacks (OSWP) a Cracking the Perimeter (OSCE). \u010eal\u0161ie \u0161kolenia Advanced Windows Exploitation (OSEE) a Advanced Web Attacks and Exploitation (AWAE), ktor\u00e9 je nutn\u00e9 absolvova\u0165 na prest\u00ed\u017enych konferenci\u00e1ch ako Black Hat USA, boli u\u017e za\u010diatkom roka 2015 vypredan\u00e9. Certifik\u00e1t OSCP som si chcel spravi\u0165 u\u017e pred p\u00e1r rokmi&#8230;<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[13],"tags":[899,900,898,893,894,896,901,897],"class_list":["post-1592","post","type-post","status-publish","format-standard","hentry","category-uncategorized-sk","tag-fc4","tag-gh0st","tag-humble","tag-offensive-security-sk","tag-oscp-sk","tag-pain","tag-pwk","tag-sufference"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>OSCP review - Nethemba<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nethemba.com\/sk\/oscp-review\/\" \/>\n<meta property=\"og:locale\" content=\"sk_SK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"OSCP review - Nethemba\" \/>\n<meta property=\"og:description\" content=\"Medzin\u00e1rodn\u00e1 bezpe\u010dnostn\u00e1 spolo\u010dnos\u0165 Offensive Security pon\u00faka v s\u00fa\u010dasnosti nieko\u013eko druhov \u0161kolen\u00ed a certifik\u00e1tov. Ku kurzom, ktor\u00e9 je mo\u017en\u00e9 realizova\u0165 na dia\u013eku patria Penetration Testing with Kali (OSCP), Wireless Attacks (OSWP) a Cracking the Perimeter (OSCE). \u010eal\u0161ie \u0161kolenia Advanced Windows Exploitation (OSEE) a Advanced Web Attacks and Exploitation (AWAE), ktor\u00e9 je nutn\u00e9 absolvova\u0165 na prest\u00ed\u017enych konferenci\u00e1ch ako Black Hat USA, boli u\u017e za\u010diatkom roka 2015 vypredan\u00e9. Certifik\u00e1t OSCP som si chcel spravi\u0165 u\u017e pred p\u00e1r rokmi...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nethemba.com\/sk\/oscp-review\/\" \/>\n<meta property=\"og:site_name\" content=\"Nethemba\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/nethemba\" \/>\n<meta property=\"article:published_time\" content=\"2016-02-16T10:58:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-02-18T11:01:58+00:00\" \/>\n<meta name=\"author\" content=\"Pavol Lupt\u00e1k\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@nethemba\" \/>\n<meta name=\"twitter:site\" content=\"@nethemba\" \/>\n<meta name=\"twitter:label1\" content=\"Autor\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pavol Lupt\u00e1k\" \/>\n\t<meta name=\"twitter:label2\" content=\"Predpokladan\u00fd \u010das \u010d\u00edtania\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 min\u00fat\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nethemba.com\\\/sk\\\/oscp-review\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nethemba.com\\\/sk\\\/oscp-review\\\/\"},\"author\":{\"name\":\"Pavol Lupt\u00e1k\",\"@id\":\"https:\\\/\\\/nethemba.com\\\/de\\\/#\\\/schema\\\/person\\\/5f4ba68c8e1a2013d30e0804245b8234\"},\"headline\":\"OSCP review\",\"datePublished\":\"2016-02-16T10:58:44+00:00\",\"dateModified\":\"2016-02-18T11:01:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nethemba.com\\\/sk\\\/oscp-review\\\/\"},\"wordCount\":1128,\"commentCount\":0,\"keywords\":[\"fc4\",\"gh0st\",\"humble\",\"Offensive Security\",\"OSCP\",\"pain\",\"PWK\",\"sufference\"],\"articleSection\":[\"Uncategorized @sk\"],\"inLanguage\":\"sk-SK\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nethemba.com\\\/sk\\\/oscp-review\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nethemba.com\\\/sk\\\/oscp-review\\\/\",\"url\":\"https:\\\/\\\/nethemba.com\\\/sk\\\/oscp-review\\\/\",\"name\":\"OSCP review - Nethemba\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nethemba.com\\\/de\\\/#website\"},\"datePublished\":\"2016-02-16T10:58:44+00:00\",\"dateModified\":\"2016-02-18T11:01:58+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/nethemba.com\\\/de\\\/#\\\/schema\\\/person\\\/5f4ba68c8e1a2013d30e0804245b8234\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nethemba.com\\\/sk\\\/oscp-review\\\/#breadcrumb\"},\"inLanguage\":\"sk-SK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nethemba.com\\\/sk\\\/oscp-review\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nethemba.com\\\/sk\\\/oscp-review\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nethemba.com\\\/sk\\\/domov\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"OSCP review\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nethemba.com\\\/de\\\/#website\",\"url\":\"https:\\\/\\\/nethemba.com\\\/de\\\/\",\"name\":\"Nethemba\",\"description\":\"We care about your security\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nethemba.com\\\/de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sk-SK\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nethemba.com\\\/de\\\/#\\\/schema\\\/person\\\/5f4ba68c8e1a2013d30e0804245b8234\",\"name\":\"Pavol Lupt\u00e1k\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sk-SK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/978b23022518d076eaa243b375d2e0272af4f00dd502ce79cc357276d9bc2495?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/978b23022518d076eaa243b375d2e0272af4f00dd502ce79cc357276d9bc2495?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/978b23022518d076eaa243b375d2e0272af4f00dd502ce79cc357276d9bc2495?s=96&d=mm&r=g\",\"caption\":\"Pavol Lupt\u00e1k\"},\"sameAs\":[\"https:\\\/\\\/www.nethemba.com\\\/\"],\"url\":\"https:\\\/\\\/nethemba.com\\\/sk\\\/author\\\/nethemba-admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"OSCP review - Nethemba","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nethemba.com\/sk\/oscp-review\/","og_locale":"sk_SK","og_type":"article","og_title":"OSCP review - Nethemba","og_description":"Medzin\u00e1rodn\u00e1 bezpe\u010dnostn\u00e1 spolo\u010dnos\u0165 Offensive Security pon\u00faka v s\u00fa\u010dasnosti nieko\u013eko druhov \u0161kolen\u00ed a certifik\u00e1tov. Ku kurzom, ktor\u00e9 je mo\u017en\u00e9 realizova\u0165 na dia\u013eku patria Penetration Testing with Kali (OSCP), Wireless Attacks (OSWP) a Cracking the Perimeter (OSCE). \u010eal\u0161ie \u0161kolenia Advanced Windows Exploitation (OSEE) a Advanced Web Attacks and Exploitation (AWAE), ktor\u00e9 je nutn\u00e9 absolvova\u0165 na prest\u00ed\u017enych konferenci\u00e1ch ako Black Hat USA, boli u\u017e za\u010diatkom roka 2015 vypredan\u00e9. Certifik\u00e1t OSCP som si chcel spravi\u0165 u\u017e pred p\u00e1r rokmi...","og_url":"https:\/\/nethemba.com\/sk\/oscp-review\/","og_site_name":"Nethemba","article_publisher":"https:\/\/www.facebook.com\/nethemba","article_published_time":"2016-02-16T10:58:44+00:00","article_modified_time":"2016-02-18T11:01:58+00:00","author":"Pavol Lupt\u00e1k","twitter_card":"summary_large_image","twitter_creator":"@nethemba","twitter_site":"@nethemba","twitter_misc":{"Autor":"Pavol Lupt\u00e1k","Predpokladan\u00fd \u010das \u010d\u00edtania":"6 min\u00fat"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nethemba.com\/sk\/oscp-review\/#article","isPartOf":{"@id":"https:\/\/nethemba.com\/sk\/oscp-review\/"},"author":{"name":"Pavol Lupt\u00e1k","@id":"https:\/\/nethemba.com\/de\/#\/schema\/person\/5f4ba68c8e1a2013d30e0804245b8234"},"headline":"OSCP review","datePublished":"2016-02-16T10:58:44+00:00","dateModified":"2016-02-18T11:01:58+00:00","mainEntityOfPage":{"@id":"https:\/\/nethemba.com\/sk\/oscp-review\/"},"wordCount":1128,"commentCount":0,"keywords":["fc4","gh0st","humble","Offensive Security","OSCP","pain","PWK","sufference"],"articleSection":["Uncategorized @sk"],"inLanguage":"sk-SK","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nethemba.com\/sk\/oscp-review\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nethemba.com\/sk\/oscp-review\/","url":"https:\/\/nethemba.com\/sk\/oscp-review\/","name":"OSCP review - Nethemba","isPartOf":{"@id":"https:\/\/nethemba.com\/de\/#website"},"datePublished":"2016-02-16T10:58:44+00:00","dateModified":"2016-02-18T11:01:58+00:00","author":{"@id":"https:\/\/nethemba.com\/de\/#\/schema\/person\/5f4ba68c8e1a2013d30e0804245b8234"},"breadcrumb":{"@id":"https:\/\/nethemba.com\/sk\/oscp-review\/#breadcrumb"},"inLanguage":"sk-SK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nethemba.com\/sk\/oscp-review\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/nethemba.com\/sk\/oscp-review\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nethemba.com\/sk\/domov\/"},{"@type":"ListItem","position":2,"name":"OSCP review"}]},{"@type":"WebSite","@id":"https:\/\/nethemba.com\/de\/#website","url":"https:\/\/nethemba.com\/de\/","name":"Nethemba","description":"We care about your security","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nethemba.com\/de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sk-SK"},{"@type":"Person","@id":"https:\/\/nethemba.com\/de\/#\/schema\/person\/5f4ba68c8e1a2013d30e0804245b8234","name":"Pavol Lupt\u00e1k","image":{"@type":"ImageObject","inLanguage":"sk-SK","@id":"https:\/\/secure.gravatar.com\/avatar\/978b23022518d076eaa243b375d2e0272af4f00dd502ce79cc357276d9bc2495?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/978b23022518d076eaa243b375d2e0272af4f00dd502ce79cc357276d9bc2495?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/978b23022518d076eaa243b375d2e0272af4f00dd502ce79cc357276d9bc2495?s=96&d=mm&r=g","caption":"Pavol Lupt\u00e1k"},"sameAs":["https:\/\/www.nethemba.com\/"],"url":"https:\/\/nethemba.com\/sk\/author\/nethemba-admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nethemba.com\/sk\/wp-json\/wp\/v2\/posts\/1592","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nethemba.com\/sk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nethemba.com\/sk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nethemba.com\/sk\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/nethemba.com\/sk\/wp-json\/wp\/v2\/comments?post=1592"}],"version-history":[{"count":0,"href":"https:\/\/nethemba.com\/sk\/wp-json\/wp\/v2\/posts\/1592\/revisions"}],"wp:attachment":[{"href":"https:\/\/nethemba.com\/sk\/wp-json\/wp\/v2\/media?parent=1592"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nethemba.com\/sk\/wp-json\/wp\/v2\/categories?post=1592"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nethemba.com\/sk\/wp-json\/wp\/v2\/tags?post=1592"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}