OSED Review - Offensive Security Exploit Developer

54,380
0
Published 2021-06-20
If you would like to support the channel and I, check out Kite! Kite is a coding assistant that helps you code faster, on any IDE offer smart completions and documentation. www.kite.com/get-kite/?utm_medium=referral&utm_sou… (disclaimer, affiliate link) My "ROP Ripper" Python script: gist.github.com/JohnHammond/23d04ed8614192453e80f9…
My "Stack String" Python script: gist.github.com/JohnHammond/f78a9d878585bad232cba0…

00:00 Introduction
00:27 What is OSED?
02:30 OSED is newest in the OSCE(3) trio
04:49 What I'll do in this video
05:48 My course timeline
07:38 I was really nervous for the exam
08:19 Clip from the OffSec AMA Webinar
11:09 OSCE(3) Email
12:18 Thoughts on the Course
13:50 Amp up WinDbg
14:45 Take notes (Showcasing my notes)
15:13 Stage and prepare your tools
17:15 Automate the simple stuff
18:30 Join the Offensive Security Discord
19:02 Exam time / Thoughts on the Exam
20:52 The exam report
22:58 Starting questions that you asked me
24:22 "What automation, if any, did you use?"
25:26 "Were the challenges enough to prepare you for the exam?"
26:07 "Any tips/tricks for finding ROP gadgets with Mona?"
28:40 "How is this in comparison to other courses?"
31:30 "Is cert ABC worth it, or should I jump to cert XYZ??"
32:40 "How approachable is this for someone with moderate experience?"
35:20 "What can we do prepare for OSED?"
36:51 "How in-depth is the shellcoding section?"
38:58 "Were there exploits that were already public/known?"
39:30 "What are some recommendations for practicing?"
41:38 "What would you consider to be the most difficult in OSCE(3)?"
43:55 "Can a student fresh out of college do this?"
44:30 "What did you feel was the most challenging?"
47:12 "What was the main thing that kept you running for this?"
50:27 "How good is the content from a learning perspective compared to OSEP?"
52:36 "What would be a pathway from OSCP to OSEP?"
52:50 "Why did you choose to do this course?"
55:49 Outro

For more content, subscribe on Twitch! twitch.tv/johnhammond010
If you would like to support me, please like, comment & subscribe, and check me out on Patreon: patreon.com/johnhammond010
PayPal: paypal.me/johnhammond010
E-mail: [email protected]
Discord: johnhammond.org/discord
Twitter: twitter.com/_johnhammond
GitHub: github.com/JohnHammond

All Comments (21)
  • @andyli
    congrats John, OSCE3 would be the dream πŸ˜€

    I got into the offensive security stuff in part because of your videos, thanks for all the value you put out.
  • Congratulations John πŸŽ‰πŸŽ‰ and thank you for sharing your thoughts and experience ❀️❀️
  • @user-uq5qw1fk3d
    Thanks for the awesome review of this John. It sounds like a great course. Congratulations on passing!
  • @romel6958
    Hey Congrats John, for the OSCE3, Thank you very much, I start the course OSED on July 31, this video is gold
  • @Westar.
    Thanks so much for the tips! I'm hoping to get OSCE3 by the end of the year!
  • @abhishek_k7
    Congratulations and thanks for sharing your experience with us
  • @4ag2
    Yessir πŸ™Œ thanks John
  • @sinwolf5539
    Congratulations John , You are an inspiration !!!
  • @_CryptoCat
    congrats!! im itching to do some more offsec courses πŸ˜†
  • @HuyNguyen-hw5eh
    Hey John, great review on OSED and congrats on OSC3. Do you have any plans on reviewing OSWE? I'd definitely recommend a review on that course if you are looking for the next video idea. Thanks sharing your experience.
  • @cactusjuice9709
    I miss the question about how usefull the OSED knowledge is in real world
  • Hi John! I'm a big fan. I have my OSCP, and was wondering if the OSED course covered reverse engineering protocols and using fuzzers. Congrats on getting the OSCE3! πŸ™‚
  • @edoardottt
    Congratulations πŸŽ‰πŸŽ‰πŸŽ‰πŸŽ‰πŸ‘πŸΌ
  • @bbowling619
    keep doing what you are doing dude!
    You are super special. :)
    Every time i look around these days... everyone is looking for blue team.
    I assume that is that starting point John ?
  • HI, and congratulations. I have a late question. My problem is finding the vuln with reverse engineering. You mention that that the chapter is kind of "rushing trough", and i agree. Im in the spot that i understand and done the course, exploit wise im quite comfortable but it takes to long to find the vulns with IDA and how they teach it doesnt make me comfortable or fast enough (spent 2 days to find the vuln on one of the challanges). Any advice on how to train so i would spot the vuln on the exam?