Engin Demirbilek
  • Intro
  • [Pinned] Community
  • OSWE Review
  • Code Pieces
    • C++: Shellcode Launcher
    • C++: Dynamic DLL Usage
    • C++: Sendin HTTP GET Request
    • C++: Sandbox Detection via Registry
    • C++: Enumerating Environment
    • C++: Dll Injection
    • VBA: HTTP File Dropper
    • Environment Enumeration via Pshell & Cmd
  • Projects
    • Reverse Shell Exploit chain With AV Bypass
    • Execute Shellcode Launcher with Dll Injection
    • Bypassing AVs with simple XOR
    • Bypassing Defender with Exclusion List
  • Vulnerability Research
    • [TR] Centreon 19.10.8 Remote Code Execution
    • [TR] rConfig 3.94 Remote Code Execution
    • [TR] PANDORAFMS 7.0 REMOTE CODE EXECUTION x4
  • Pentest Notes
  • An Uncommon OSINT way to Juicy Files
  • GraphQL Testing Tips
  • Server Side Request Forgery (SSRF)
Powered by GitBook
On this page

Was this helpful?

OSWE Review

Quick OSWE review 2021.

Previous[Pinned] CommunityNextC++: Shellcode Launcher

Last updated 3 years ago

Was this helpful?

There are already plenty of OSWE reviews in article format so i will keep it short.

  • Was it hard ? Yes, indeed.

  • Is it begginer friendly ? No. no. Hands on experience is needed for this course.

  • Does coding required ? Ofcourse. You need to write fully working single exploit.

  • Is python enough ? You may also need to write some codes in Java or PHP.

  • Do I need to know every coding Language used in course ? Nope, but you need to be able to read it.

  • Any other hacking skill required other than web ? Ofcourse, you need to be at least at OSCP level.

  • How many machines in exam ? 2.

  • Any suggestion for preparation ? Not really. Watch official videos, read your official pdf and do exercises thats all.

  • Do i need to take coding courses before awae ? I dont think so. At least i did not.

  • What not to expect ? Obvious vulnerabilities.