My OCSP and PNPT journey from the beginning, during and I hope “the end”. @TCMSecurity @thecybermentor @offsectraining #PEN-100 #PEN-103 #PEN-200 #PEN-203 #WEB-100 #SOC-100 #PNPT #OSCP @joplinapp @reconmap @BHinfoSecurity @ActiveCmeasures @WWHackinFest @strandjs #hacking #pentesting


Hi all!

My plan is that under 2022 to take OSCP and PNPT exam. To get the full picture we start from the beginning. Why do I post this? Share knowledge is the simple answer, and I am getting old so I need to document everything I do. I think this is a good way to do it. And I do not want to wait 1 year to share my stuff. So my plan is that I do updates know and then when something happens. Think if I do not pass any of the exam, so what. The sun will come up tomorrow anyway, I hope!

The outcome of somethings can change, I write as I go. But after a journey like this, things can change.

And I hope I get in contact with someone that are in the same boat as me. Create a team on Try Hack Me or Hack The Box? I am open to almost anything! πŸ™‚

I have a ordinary day job that not always include in security stuff, so a lot of evenings and nights are behind what I am today.

I could create 2 post one for each exam path, sure. I do not want to “compare” who has the best product, but for me it is just that the goal here is to pass them both in the same time frame and also get some tips and tricks out there if someone plan to choose one of these exams.


This is the first course that I have taken from Offensive Security, and I hope not the last. Support for the course is done thru Discord. Any troubles with labs in PEN-200 and exam can be done thru I did put in some questions in discord, sometimes the community answer fast sometimes not so fast. I am a person that like to do things in order, but in this case if you are stuck on a questions. Put in a questions in Discord and move one. You can do that question later.


I have done TCM courses before he opened his own academy. But my plan is to go thru them again. There are some new stuff like OSINT and Pentest playbook.

Also between everything else, I listen to a lot of security podocast. So I want to fill my life with security to get in 100% in this. Eat, Drink, Sleep, Shit Security!
Some of my podcast that I listen to.

Special thanx to they are great! Special thanks to John Strand, not the model for being such an inspiration.
Below what got me on fire!

The arrangement on this post is like this

  • Steps that I am taking
  • Course information
  • Try HackMe rooms for PNPT and PEN-200
  • Timeschedule of the course
  • Finnsihing note on the course
  • Exam thoughts if I ever pass
  • Diary
  • Spreadsheet of my time

Have a great 2022!

Steps to get the PNPT and OSCP (I hope this is enough)

PNPT – Practical Ethical Hacking
PNPT – Windows Privilege Escalation for Beginners
PNPT – Linux Privilege Escalation for Beginners
PNPT – Open-Source Intelligence (OSINT) Fundamentals
PNPT – External Pentest Playbook
EXTRA – Python Python 101

Timeline 1994-2022

To get some idea behind how I came to this place, here is my timeline. Security is in everything. But I started my real journey in security in 2018.

Here is also a reference about my journey, all the courses and certification along the way.



This was pure joy to go thru TCM Security course! I would recommend this to any in IT. The delivery of the course is great and have nothing to complain about.


  • Practical Ethical Hacking – The Complete Course 25 hours.
    • Beginner and do all the labs 30-100 hours
  • Windows Privilege Escalation for Beginners 7 hours.
    • Beginner and do all the labs 7 – 40 hours
  • Linux Privilege Escalation for Beginners 7h.
    • Beginner and do all the labs 7 – 40 hours
  • Open-Source Intelligence (OSINT) Fundamentals
    • Beginner and do all the labs 9-15 hours
  • External Pentest Playbook 3-5 hours
    • Beginner and do all the labs hour

Try Hack Me Rooms for PNPT

Windows PrivEsc Arena
Linux PrivEsc Arena
Attacktive Directory
Mr Robot CTF

Finished PNPT Course 2022-01-12

Perfect course for beginners or advanced IT people. A must to get started or get refreshed in knowledge.


Coming….I hope


Because I did buy 1 year of subscription I also got access to this.
This is Linux / Windows / Networking fundamentals education with labs. If you know Linux / Windows before this will be an easy one, but it is always good with repetition. So I will go thru that first.

After a couple of weeks into pen-100 I read something on the discord that everybody schould know.

From discord

Thanks for reaching out, I know that trying to solve something that you don’t know how to solve yet can be frustrating. Let me preface this with saying that there may indeed be material that we can clarify or add to make some of the exercises more evident, and to the extent that we need to do so we will – we use the rate of submission on questions to help us determine what new content we need to add, where to add hints and where to make wording less ambiguous – so we greatly appreciate your
That all said, let’s dive into the question a little bit. Part of the purpose of the PEN-100 material is to quickly become more comfortable with the “I dont know what to do next” feeling. As you elegantly point out, shooting an azimuth is hard and its frustrating not knowing what to do. Unfortunately (of fortunately depending on your perspective) security (and especially offensive/red/attacking security) is, in our view always an exercise in uncertainty. There will always be something that you don’t know, because if there weren’t then security would be easy and there’d be no need for pentesters in the first place! (This is a bit of a straw man and I can delve deeper into what I mean here if you wish.) For now I just want to make the points that a) dealing with uncertainty is a necessity, and b) making it easier or at least more palatable is part of the point of PEN-100 in particular and 100 level content in general.



I think the hours have been calculated if you are a beginner.
So total time in this PEN-100 is 151 hours or 8 hours per day in 19 days.

Update 2022-03-10

Add more 10 hours for the new chapter nr 17 Proxy!

Introduction to PEN-100 3h
Linux Basics I 10 h
Linux Basics II 11 h
Windows Basics I 8 h
Windows Basics II 11 h
Networking Fundamentals 11 h
Introduction to Scripting 11 h
Linux Networking and Services I 16,5 h
Linux Networking and Services II 11 h
Windows Networking and Services 10 h
Network Scripting 11 h
Troubleshooting 9,5 h
Cryptography 11 h
Web Applications 11 h
Introduction to Active Directory 6 h
Introduction to Proxies 10 h

Finished PEN-100 2022-02-27

Really nice course, some parts for me was hard and some part was easy. The coding part was for me really hard, because I suck at coding. But I learned alot and I can recommend this to everyone.

Exam thoughts

No exam for this course


I have been waiting to do this one. But some chapters are the same as in PEN-100, so you will get some for “free”.
Do not think the course really holds the level I want. But I also understand that it is difficult to teach this as a web fundamental course. Since 40-50% was already ready when you had done PEN-100 was probably less good. Since I’m a noob at this, one would like explanations of things. But that’s probably the thing, find out for yourself. Try Harder πŸ™‚


So total time in this WEB-100 is 81 hours or 8 hours per day in 8 days. But as I said before some chapters are the same as PEN-100. So if you have done PEN-100 before then you “only” have 28,5 hours.

Linux Basics I 10 h
Linux Basics II 11 h
Networking Fundamentals 11 h
Web Applications 11 h
Troubleshooting 9,5 h
Web Attacker Methodology 11 h
Introduction to Web Secure Coding 4 h
Input Validation 4 h
JavaScript Basics 4,5 h
Introduction to XSS 5 h

Almost Finished WEB-100 2022-03-04

I really thoght that this part would be better. But as I write more about this further down I will says this. This is hard and it will be easier if you have coding experince. Some of the questions are “stupid” and so is the answer. Sometimes, it will not take the correct answer (bug). It will get frustrated, but just move on. I will do the few questions left in this part soon. But knowledge is knowledge. Just go thru with it and take notes.

Exam thoughts

No exam for this course


Same as WEB-100 some chapters are the same as in PEN-100, so you will get some for “free”. Below is the different Chapters. And it is alot of reading in this course!


So total time in this WEB-100 is 141,4 hours or 8 hours per day in 17 days. But as I said before some chapters are the same as PEN-100. So if you have done PEN-100 before then you “only” 37,5 hours to burn infront of a screen.

Linux Basics I 10 h
Linux Basics II 11 h
Windows Basics I 8 h
Windows Basics II 11 h
Networking Fundamentals 11 h
Linux Networking and Services I 16,5 h
Linux Networking and Services II 11 h
Windows Networking and Services 10 h
Enterprise Network Architecture 3,5 h
SOC Management Processes 4,5 h
Toubleshooting 9,5 h
Windows Registry 9,5 h
Introduction to Active Directory 6 h
Introduction to Incident Response 6h
Windows Logging 10 h
Introduction to Vulnerability Tracking 4 h

Finished SOC-100 2022-03-08

This was alot of reading, a lot. The information in this course was very extensive. I would love to be able to download this and use it as a reference. I learned alot in this course, how shall we implement a real SOC from beginning to end. Really nice, even if it has really nothing to do with PEN-200 (OSCP). But knowledge is easy to have on our schoulder. πŸ™‚

Exam thoughts

No exam for this course


This course is free to do. Below is the different Chapters. This will be alot of reading in this course also. There is no question to answer here. But if you are new to Kali Linux this is a realy good beginners guide to Kali Linux. Lets dig in!
Even if I have used Linux as workstation for many years there is new information in this course for everyone I think. The bad thing here is that I can not download and print out, you need to access this online and read it. You can also get the book and print this out.


I do not have a timeline in this course. First there is no approx time schedule in the course and second I have not finnished it yet. So I will put in the hours here when I am done.

Finished PEN-103 2022–


Exam thoughts

Coming i hope….


Now on to some wireless hacking. I really do not know if this can be applied in 2022, but either way it is good to know history before the future (newer technology). This course is really technical and have text and Video. It is higly recommended to have a Kali laptop and try the stuff that are in the course. It make me learn faster anyway. Below is the different chapters in the course. This course can not be downloaded and read offline. So I did copy and past in to joplin, so I can read it offline, this will take around 6 hours to do that at least for me it did. No I am not allowed to share that, do not even ask πŸ™‚


I do not have a timeline in this course. First there is no approx time schedule in the course and second I have not finnished it yet. So I will put in the hours here when I am done.

Exam thoughts

Coming i hope….


To get this certification is one of the goals in 2022. This course is the last step in my journey this time. The exam for this course is 24 hours, so you need to get prepaired for this. In the course there is a alot of information to get in shape for this. Read it!

I also plan to get physical in parallell with this course. Do some PDF/Video and hacking some machines. I can not wait. πŸ™‚

Try Hack Me Rooms for PEN-200

Brainpan 1
Windows PrivEsc Arena
Linux PrivEsc Arena
Attacktive Directory
IgniteMr Robot CTF

Read all the documentation on the help pages.
Here is the answers to all you questions regarding labs and exam and everything else you need to know!


If you have the money, sign up for TryHackme and HackTheBox
Of you don’t have the money, do not sign up for these do the free stuff on these plattforms.

The plan for learning this can be explained in words. Read, Listen, Exercises, Labs and Finally exam. This picture is taken from the Offensive Security site. But I will apply this in any test that I will take.

Create your own pentest machine that you will operate from. So you get in the right mod when doing the stuff. Then you will know where the tools are and how they are configured. I use a virtual machine so I can take backups on regular basis.

You can download the content 1 time and one time only. That was decided from Offensive Security, before there was no download at all.

There are 3 parts in this course, Reading, Video and Labs.

I did not find any time schedule in this course but here is the different topics.

Modules PDF / Online Reading

Penetration Testing with Kali Linux: General Course Information
Getting Comfortable with Kali Linux
Command Line Fun
Practical Tools
Bash Scripting
Passive Information Gathering
Active Information Gathering
Vulnerability Scanning
Web Application Attacks
Introduction to Buffer Overflows
Windows Buffer Overflows
Linux Buffer Overflows
Client-Side Attacks
Locating Public Exploits
Fixing Exploits
File Transfers
Antivirus Evasion
Privilege Escalation
Password Attacks
Port Redirection and Tunneling
Active Directory Attacks
The Metasploit Framework
PowerShell Empire
Assembling the Pieces: Penetration Test Breakdown
Trying Harder: The Labs

Modules Video

Booting Up Kali Linux
The Kali Menu
Kali Documentation
Finding Your Way Around Kali
Managing Kali Linux Services
Searching, Installing, and Removing Tools
Wrapping Up
The Bash Environment
Piping and Redirection
Text Searching and Manipulation
Editing Files from the Command Line
Comparing Files
Managing Processes
File and Command Monitoring
Downloading Files
Customizing the Bash Environment
Wrapping Up
PowerShell and Powercat
Intro to Bash Scripting
If, Else, Elif Statements
Boolean Logical Operations
Practical Examples
Website Recon
Whois Enumeration
Google Hacking
Open-Source Code
Security Headers Scanner
SSL Server Test
User Information Gathering
Social Media Tools
Stack Overflow
Information Gathering Frameworks
Wrapping Up
DNS Enumeration
Port Scanning
SMB Enumeration
NFS Enumeration
SMTP Enumeration
SNMP Enumeration
Wrapping Up
Vulnerability Scanning Overview and Considerations
Vulnerability Scanning with Nessus
Vulnerability Scanning with Nmap
Wrapping Up
Web Application Assessment Methodology
Web Application Enumeration
Web Application Assessment Tools
Exploiting Web-based Vulnerabilities
Exploiting Admin Consoles
Cross-Site Scripting (XSS)
Directory Traversal Vulnerabilities
File Inclusion Vulnerabilities
SQL Injection
Wrapping Up
Introduction to the x86 Architecture
Buffer Overflow Walkthrough
iscovering the Vulnerability
Win32 Buffer Overflow Exploitation
Wrapping Up
About DEP, ASLR, and Canaries
Replicating the Crash
Controlling EIP
Locating Space for Our Shellcode
Checking for Bad Characters
Finding a Return Address
Getting a Shell
Wrapping Up
Know Your Target
Leveraging HTML Applications
Exploiting Microsoft Office
Wrapping Up
A Word of Caution
Searching for Exploits
Putting It All Together
Wrapping Up
Fixing Memory Corruption Exploits
Fixing Web Exploits
Wrapping Up
Considerations and Preparations
Transferring Files with Windows Hosts
Wrapping Up
What is Antivirus Software
Methods of Detecting Malicious Code
Bypassing Antivirus Detection
Wrapping Up
Information Gathering
Windows Privilege Escalation Examples
Linux Privilege Escalation Examples
Wrapping Up
Brute Force Wordlists
Common Network Service Attack Methods
Leveraging Password Hashes
Wrapping Up
Port Forwarding
SSH Tunneling
HTTPTunnel-ing Through Deep Packet Inspection
Wrapping Up
Active Directory Theory
Active Directory Enumeration
Active Directory Authentication
Active Directory Lateral Movement
Active Directory Persistence
Wrapping Up
Metasploit User Interfaces and Setup
Exploit Modules
Metasploit Payloads
Building Our Own MSF Module
Post-Exploitation with Metasploit
Metasploit Automation
Wrapping Up
Installation, Setup, and Usage
PowerShell Modules
Switching Between Empire and Metasploit
Wrapping Up
Public Network Enumeration
Targeting the Web Application
Targeting the Database
Deeper Enumeration of the Web Application Server
Targeting the Database Again
Targeting Poultry
Internal Network Enumeration
Targeting the Jenkins Server
Targeting the Domain Controller
Wrapping Up


Finished PEN-200 2022–


Exam thoughts

Coming i hope….


We start with the setup.

Using Kali as the main machine (vm).

What do I take notes with = Using Joplin

What am I using for pentesting management platform = Reconmap

Set it up:


Because I want to, and it is free.


I registered at Offensive Security Site for 1 year off PEN-200 access. The price at the moment was 1999$ for 1 year.


Received confirmation of payment


I also registered for the PNTP exam. The price for that at the moment was 399$. It was really easy to register here and get account.


Because of holiday I waited 2 days to receive below email. To verify my identity.


The start of this blogg post and some rest. I will begin the hard work on 2021-01-03


We start the day with videos from TCM. And at the same time I got email from Offensive Security to access my stuff.

Received email from Offensive Security that I can now start my education!

Because I bought the 1 year PEN-200 I also did get PEN-100, WEB-100 and SOC-100

This was a long day almost went thru Practical Ethical Hacking – The Complete Course…Only OWASP left.

I have done this course before, so some chapter I could skip. But still it was 15 hour day. Normal this takes more than 25 hours.


Today I also joined the Offensive Security Discord channel. Went thru the pages to see what I needed to know regarding the OSCP Labs and exam.

But also completed the Practical Ethical Hacking – The Complete Course!


Today I went thru the Windows Privilege Escalation for Beginners. I did not do the labs. I have done this courses before when these were on udemy.


Today I went thru the Linux Privilege Escalation for Beginners. I did not do the labs. I have done this courses before when these were on udemy. I also stared the OSINT course, this one was new for me! It is time for some wine now peace out!

Open-Source Intelligence (OSINT) Fundamentals


I think I will start with an hangover…..but we will see…. πŸ™‚

Today was a “small” day” only 30% of the osint course, Back to the beers!


Free today. Party time! Just some OSINT in the bottle.


Corona time in the family, so now it is lockdown. But did some hours in the OSINT course.


Finished the OSINT course and started the External Pentest playbook from TCM-SEC.


Today it is time to do the Network Threat Hunting Training from ACTIVE COUNTERMEASURES, 6 hours long.


Today I finished The PNPT training bundle. This is really good and is fair with the price. TCM-Security as done a really good job with the platform. Resume the course when your PC hangs. Simple login tog the plattform. I have done the three first courses before, but it is always good with repetition.

After TCM-Security is finished now it’s off to Offensive security courses. Since I bought 1 year with Offensive Security, I also get access to the PEN-100 WEB-100 SOC-100. So why not start with them?

I know that I need to schedule the PNPT exam….But lets go thru the Offensive Security courses first.


It was a couple of hours PEN-100 only. Had a long day at work.


Today it was all PEN-100 for 2 hours. As I said before Covid in family……SUCK!


Mental preparation….Free today


6 hours of PEN-100 today. Did the Linux and first part of Windows. Even if you are heavy user of Linux and Windows you will learn something new, I promise.


Need to put the PEN-100 aside for a couple of days. Something Santa brought this weekend from TCM Security was that you can get 7 day free trial on All-Access Pass. So I did sign up on that and started with Movement, Pivoting and Persistence. In this course you will see C2 like covenant, Metasploit, Phishing, Privilege Escalation and Password Spraying and a lot of more stuff. The first part of this course is about setting your own lab up and running. Great content from TCM Security and The Mayor! I did the course , but no labs. As I said before I will do the practical later.

After this it is time for some Python 101. I hope I will have time to do Python 101 and Python 201 during this week. But I will come back on that.


I am so bad at this. Even 26 years in IT I was never a programmer and never will be. I feel like I am a newbie, and I am. Fuck Fuck Fuck…..36% of the course only. It is gonna be a long week! If I would do my childhood all over again I would start programming when I was 10.


To much work today only 30 min of python today. Did also 2 1 hour webinars. One webinar was from Wild West Hackin’ Fest and going thru BurpSuite here is a link Little tired, I hope for more energy tomorrow!

2022-01-20 -2022-01-23

Python Python 101 are finally finished! It has been a pain in the as this one. I am and never will be a coder, that is a fact! But this course did help me understand the basics and how much I admire coders. This course is 5,5 hours but it took me 9,5 hours to get thru! The teacher in this course was Riley Kidd also know as @247CTF


Back to Offensive Security. Even if this is fundamental stuff it is a reminder that you can forget and you do not know everything.


Work all Day and evening, then a webcast from @RedSiege. The best about these webcast from USA is the time difference….You can work all day and the webcast starts at 20.00 or 21.00.


Today is was also alot of work, but I did manage to attend a Webinar today A master class om Offensive MSBuilld with Chris Truncer & Joe Leon. I also did 2 hours of PEN-100, Windows processes, Libaries and Registry. You can think it is basic, but a alot of stuff here you never always do. So it is a god course with labs.


2 Hours of PEN-100 today finishing of Windows stuff. No off to networking stuff. I like the labs I learn faster when I can use my keyboard. I really long to complete these trainings theoretically so I can start with the real hands on labs.


Finally I got use of my old CNE certification and Novell Netware course “Networking Technologies”. You can still find books about this

OSI is the shit!

Almost all done at the Networking stuff:

2022-01-29 and 2022-01-30

This weekend I did not have to many hours behind the computer, but I manage to get thru most of scripting module. Powershell I hope I finnish on Monday!


No hacking today private shit


No hacking today private shit


I have now done the scripting part and now of to the the more “fun” stuff




More beer


Even more beer




2 hours today and did the first networking part.


3 Hours of PEN-100. Linux networking and got starter with Windows Networking.


No hacking to today but two webinars that was really good.


And from @WWHackinfest


Needed to work today….and tired






No hacking today. But osint 50 pages of this really nice book


Worst day in my path…python coding. 4,5 hours pure hell. I need to turn back the time 20 years and start coding. And still after 4,5 hour not done. This is gonna end bad.


Today I FINALLY got thru the Networking Script part of PEN-100, and I must admit…I used BurpSuite for some exersices. I must go thru the hard school of coding. But I do not see the time for it right now. Solve the problem ahead coding or not. 6 hours with this. I am gonna dream of python tonight

Today it was also a 2 hour CTF challange from

I got 265 points of 265 points. I was not first, but I was not last either. πŸ™‚


Today was a webinar called “How Certifications Help You Find Great People for Your Security Team” from Wild West Hackin’ Fest. You can watch this on youtube if you like.

And I also did 4 hours of PEN-100 and almost finnished chapter 12 only 1 question left, yes you where right, pyhton coding… god. So I jumped over that question and did all other and the spent more time on the python script.


Hi all, today I was home late from work so today no hacking, but I was able to attend a webinar from BlackHills. After watching that I decided to shutdown my computer(s) for today.

How to Burn Out in Infosec (and what to do next) with Corey Ham and Others


Taking a free day






Mental preperation πŸ™‚


After a weekend off free time of computer I did the troubleshooting,nmap and 30% of the cryptography. These chapters was more my cup of tea! I can see the light in the tunnel! 6 hours…..


Today i went thru the Cryptography module of PEN-100. Realy nice chapter.
If you have done HTB or Tryhackme this chapter would not take 11 hours. But for a first timer it will take this time. This is not easy to understand if you have not seen this before.


Work all day and evening, sorry my hacker heart! But still I had time to go to the webinar WWHF | So, You Want to Build a Community in InfoSec  ( )


Not so much of PEN-100 today but some hours. Web Applications is really fun. I really enjoy this part. I am really impressive by people that are coding and creating web application. You really need to think about security everywhere.

I also did a webinar from Blackhills How to Detect and Repsond to Business Email.


Beer time…


No computer today. I hope I have the power to do anything on Sunday!


YEEEEAAAA, The PEN-100 course is done. The Web Application part was really fun. Active Directory part was really a beginners level. But not everyone has Active Directory knowledge.

Now time to jump in the WEB-100 there are some cross chapters from PEN-100 so I already have done some of the WEB-100


Today was a fun day, loved this chapter with Web Attacker Methodogy. If I have the time I will also do the course and I do not think it is a bad thing when taking this journey. I also manage to do chapter 7 today. As I use to say, not a bad day today!


This chapter was hard, a big remminder that scripting knowledge is important. I manage to do around 50% of this chapter today. 2 hours of work is better than 0. Need to sleep and empty regex strings out of my head!


Long day at work and some ordinary work when I came home, but I did manage to enter a webinar from Active Countermeasures (Malware of The Day). Nice stuff as always.

I also manage to do some questions in the section Input Validation. But yeah I know I am not a coder, but some questions are stupid, or I am. I have not made up my mind yet.
ex. Microsoft Word and Excel files (.docx and .xlsx) are examples of what file format?


Hard day today (in my world at least regarding my path). These chapters was hard for me.

But I did manage to do most of the question. I have some questions left that I will solve soon I think. As I said before coding is my achilles heel. But as I normally say, you need to learn how to crawl before running.


Got really tired of myself today, I am bad at coding javascript. Javascript is eating my head! So I will go head and start the SOC-100 instead. It is the same with this course. Did you do the PEN-100 more than 50% is already done!

I manage to go thru 1, 5 chapter on this. If you compare PEN-100 or WEB-100 this is alot more reading to do. I like more hands on. But knowledge is knowledge!


Beer time!


Mental healthday!


Did a few chapters on SOC-100 today so only 2 chapters left! Windows logging and vuln tracking left.


Finishing SOC-100 puhhhh. In SOC-100 you learn to read English text. It is alot to read and go thru. Sure it was alot of reading, but you will learn alot in this course!

Also did some reading of PEN-103 course, the first 5 chapters.


Today I started on PEN-103 and the first thing I did was to copy and past the material to Joplin so I can read it offline. So not so much hands on in security today. But I did 4 hour of Azure Workshop and 1 hour of webinar with Wild West Hackin Cast Side Channel Attack: Influencing Causality via Exploitation of the Choice Vendor | Ed Miro ( )

Offensive Security also updated the courses today 2 more chapter to do!


Today it was a webinar with VMware vExpert and the content was Security EDR, NDR, NSX and much more. VMware has a great portfolio in the security space if you choose to go that way! Carbon Black is really nice. I did some updates in the documentation in Joplin for the Offensive Security journey!

I could not sleep so I did the new PEN-100 chapter 17 Proxy! Nice chapter, not so advanced. But as always everything is easy if you know it!

2022-03-10 Proxy


Today it was alot of “ordinary” work so I only did the new chapter in SOC-100 “Snort” . I little tired today. Sleep and take on the hacking tomorrow!


Beer time and Melodifestivalen. You can google that!


Day off! No computer


4 hours of going thru WEB-100, and documenting stuff from that course.


Today I did a couple of hours in PEN-103, as I said before alot of reading.
And I started also a new course (not normal) but this was really nice, even if it not in my ballpark. I started GRC Analys Master Class
A Cybersecurity Primer
Compliance and Audit Work
Security Awareness Work
Cybersecurity Risk Work
Information Security Governance Work
Getting a GRC Analyst Job

I also did an 1 hour webinar from Active Countermeasures @ActiveCmeasures

R.I.T.A. (Real Intelligence Threat Analytics) is an open-source framework for detecting command and control communication through network traffic analysis. But how exactly does RITA work? How is RITA able to find beacons and account for jitter?


Today it was a webinar from WWHF | Hackin’ Cast | It’s Groundhog Day Again – The Cybersecurity Loop | Stephen Spence.

Did also finnsihed the GRC Analys Master Class course also.


Today was a realy nice webinar from BHIS. Watch it on youtube tip of the day!


Beer time!


Mental recovery


Mental recovery


PEN-103 for 4 hours today. Not much to say, a lot of reading and documenting the course.

And also 1 hour webinar with Black Hills Information Security


My day job work took overhand and no study today!


Strange evening today, I sleept for 10 hours I must be tired. But I did manage to stay awake for Wild West Hackin Cast webinar on Burpsuite


Recover time.


Recover time.


Recover time.


Recover time. And some work.


Today I did make a decision to start the PEN-200 course. So we say goodbye to PEN-100,SOC-100, SOC-100, PEN-103 and PEN-203 for now. I has been almost 200 hours with alot of reading and get in the mood for PEN-200. But now the the real stuff begins. I have now almost 9 month left for study for the PNPT and PEN-200 exam! I hope this will be enough.

I will start to go thru the video. Then then the PDF with the labs. So I manage to do 3 chapters of video today only 22 left!


No hacking today, needed to attend my homelab today. Setting up gophish and some other web services.


Today It was workagain, and no hacking. But I manage to attend 2 webinars today.
One from Wild West Hackin cast: It’s Always Something: Creating a Strategic Vulnerability Response Plan with Joe Pierini, Daniel Brown, and Patrick

The other one was from Active Countermeasures: Applying The Threat Hunter’s Runbook With the great Chris Brenton!

2022-03-31 – 2022-04-10

Work – Life – Work – Life and some beers!


This evening it was cloud 100% 8 hours of AWS training and 8 hours of work a long day.

I hope I can go back to some hacking soon!


Work, Work, Work and no hacking!


Work, Work, Work and no hacking!


Finally got started again! Did 5 hours of training PEN-200. So I manage to get thru below chapters of videos. Next chapter after this day is Buffer Overflows. I can not wait. πŸ™‚


Basic knowledge of Buffer Overflow chapter is done. Here we went thru how,why a application can be abused by an attacker. Also intriduction to step by steb to abuse an application with ImmunityDebuger. The PEN-200 course is good, but this is hard if you never worked with this before. There are easier way to learn this, for example The Cyber Mentor free stuff on youtube!


Mental Recovery πŸ™‚


Mental Recovery πŸ™‚


Mental Recovery πŸ™‚


After this weekend I manage to add 2 hours of PEN-100. “Only” ten chapters left of video. Then off to PDF and reading. I hope I can start the labs in june, so I have 6 month of labs and hands on!


Today as always a-lot of work but manage to do 2 nice webinars. And 1 hour of PEN-200. The first weibinar was from Hackinfest and the second was from Spectorops and was about Bloodhound Enterprise. I did 1,5 chapter of the PEN-200, file transfer and halv Antivirus evasion. Need some sleep. I have 2 days of realy long workdays!


Mental Recovery πŸ™‚


Mental Recovery πŸ™‚


Mental Recovery πŸ™‚


Mental Recovery πŸ™‚


A really long day today. 6 hours of PEN-200 today! Soon I will be done with the video and will start the labs. I can not wait. Almost 5 full chapters was watched today.


Today I booked the PNPT exam in August. I hope I have time to go thru the courses 1 more time before the exam. I also manage to end the video part of the PEN-200 around 3 hours. So finally the begining of the labs and after 4 month of preperation and alot of reading and video it is time to get my hands dirty! After the Webinar I manage to do 1,5 chapter of execsices. Nice day!

Also manage to watch a webinar from Microsoft. Microsoft Defender for Cloud!


Work and tired!


5 Hours of PEN-200, report writing from the labs that I did. I manage to almost end chapter 3 with labs and questions. I plan also to hand in the lab report, in hope I get 10 points. And I need to practies to write the report fast.


Mental Recovery πŸ™‚


Mental Recovery πŸ™‚


Mental Recovery πŸ™‚


Work…no hacking


I got 3 hours of PEN-200 tonight. So I am now staring with chapter 4 next time I open my computer!
Reporting is fun πŸ™‚ And if you going on discord in the PEN-200 channels. There are not just me that is confused πŸ™‚
If you will go for the lab report and get the extra 10 points. Read the the infromation from Offesive Security.
Some sentences you need to know and understand:

To be performed on your own Kali and Windows 10 lab client machines – Reporting is not required for these exercises

To be performed with the Topic Exercises VMs under “Resources” – Reporting is not required for these exercises

To be performed on your own Kali and Windows 10 lab client machines – Reporting is required for these exercises

To be performed with the Topic Exercises VMs under “Resources” – Reporting is not required for these exercises

Lets start with practical tools! But not today. Now sleep.


Mental Recovery πŸ™‚


Mental Recovery πŸ™‚


Mental Recovery πŸ™‚


Mental Recovery πŸ™‚


Mental Recovery πŸ™‚


Mental Recovery πŸ™‚


Mental Recovery πŸ™‚


Today it was time to listen to BHIS and Troy Wojewoda the conent was How DNS can be abused for Command & Control. Really nice webinar that you can watch on yotube.


No hacking today but 5 hours of Vmware education. This time it was ondemand traning, also the first time trying thins from VMware. Optimize and Scale [V7]  is the course name and the goal here is to get the VCP 2022.


Mental Recovery πŸ™‚


Mental Recovery πŸ™‚


5 hours of Vmware education today.


3 hours of Vmware education today.


Mental Recovery πŸ™‚


4 hours of Vmware education today.


Mental Recovery πŸ™‚


Mental Recovery πŸ™‚


Today (Sunday) it was time after a week of study for VCP 7 or VCP-DCV 2022.

And I passed!

Somee history regarding VMware certification

2022 Vmware Certified Professional 7
2017 VMware Certified Professional 6.5 – Data Center Virtualization
2016 VMware Certified Professional 6 – Data Center Virtualization
2011 VMware Certified Professional 5 – Data Center Virtualization
2010 VMware Certified Professional 4 – Data Center Virtualization
2010 VMware Certified Professional 3

vExpert 2022
vExpert 2021
vExpert 2020
vExpert 2019


After a couple of weeks off hacking for different reasons I am back! We start of today with updating my pc with the VMs. This did take some time. But now my VM:s are up to date!

Kali-Org = Template
Kali-Hack = My machine that I do the labs from
Kali-Darknet = When I need to get information from strange sites πŸ™‚
Kali-Nessus = If I need nessus sometimes I use this
Tailis = When I need to be anonymous πŸ™‚
Osint = This greate machine is from book! Really nice stuff from Mr. Bazzell.

2022-05-24 – 2022-06-27

For different reasons I had a brake from this.


Today after almost 2 month of hands of security training it is high time to begin.

We started slow with TCM live PNPT

First week is now done on this PNPT Live.

2022-06-27 —-> 2022-07-03

No hacking these days!


Hi, back again!

Today I went thru PEN103 again, there was some new chapters there. I spent around 4 hours on this today! Bash and started Python…


There is some new stuff that will help you passing the PEN-200 test. That is PWK-LIVE. It is live streaming on twitch but also accessible thru the Offensive portal.

So today I did first chapter in Pyhton Scripting, PEN-100 (new) and also went thru 4 streaming from the live event.


Work today.


12 hours of PEN-100, WEB-100 and SOC-100 to go thru new new content of these cources!


Today it was time to test my PEN-100 skills 5 hour assessment. I need to say, I must work on my python skills! Thats for sure!

But never the less! I passed!


Party time!


Not so much work today, except patchning a lot of servers.


Long day today 14 hours of PEN-103, wirless hacking. A new blogpost around wireless hacking is in progress.

Also did the PWK Live and TCM Live today


8 hours of PEN-210 today. This is fun! I have now gone thru the material. This summer is gonna be alot of reading and go thru the material again!

2022-07-13 -2022-08-05

Vaccation and almost no computer at all.


Today I spent 6 hours on CLD-100. The new course for Cloud Security Foundations. Docker, Podman and Kubernetes. This will be fun. I did almost 2 chapters. But stuck on two questions.


Big day today! I have one week left of my vaccation. So I planned to do the OSWP exam today. πŸ™‚

So the report for the exam is now in the cyberspace (Offensive-Security) and I hope I will retreive an answer in 10 working days.

If I manage to pass I will write a post what to think about and what I struggled with.


Really fast, Offensive-Security says that it take up to 10 days to get the result. But I got it today. I am pleased to say that I passed! OSWP is done!

2022-08-09 – 2022-08-14

Last week of vaccation no computer.


Today 6 hours of Offensive Security CLD-100. Great cource if you new to Docker and Kubernetes. The cource name is Cloud Security Foundation and is includen in my 1 yesr subscriotion on PEN-200.


Today I registered to TCM cource Practical Malware Analysis & Triage. I have only done 30% of the cource today. But It seems great! I will write an update when it is done. I also finnsihed the CLD-100 cource. Shoutout to the teacher @HuskyHacksMK . Greate speed, voice and are really good to explain stuff.
Links from the teacher.
GitHub –
Twitter –
YouTube –
Blog –


Today it was 5 hour with Practical Malware Analysis & Triage. Almost done now.


Today it was only 1,5 hour with Practical Malware Analysis & Triage. The I needed to work in the evning. Strange the goal was to do OSCP but when I read thru this I do anything else but that. That need to change!


Nice, today I finished Practical Malware Analysis & Triage and even wrote a report that was a last task in that course. This course was great. And I do not want to have this undon. I learned alot! Great work @TCMSecurity and @HuskyHacksMK for this!




Today TCM-Security release another traning for a couple dollars. Nice! So now I ended up spending 10 hours on this Sunday with web apps! Web application security and testing!


Today I finished the Practical Web Application Security and Testing. Really great course to get into pen testing of web application. Recommend this and it is cheap.


After Practical Web Application Security and Testing there is a capstone (final task). Do a web penetrationtest and send in the report and get that graded by the course teacher @mttaggart. 4 hours on the pentest and report writning.


Got some tips and tricks on the report that I needed to modify! Just waitning for @mtaggart for the final words.1 hour today on the report and template. I do not love reporting πŸ™‚


Report writning today also, spend a couple of hours trying to please @mtaggart πŸ™‚ . His course is amazing. And the effort he putting in this are out of this world..

Also did 4 hours of PEN-LIVE and PNPT-LIVE

And 1 hour of Cyber Deception from Active Countermeasures! Great Stuff!


Report writing for Mr. @mttaggart that is the teacher in Practical Web Application Security and Testing course. 1 hours on reporting.


4 hours of report writing. This needs to be perfect for the customer. It is important part of vulnerability assessment or penetration test. Tips is to get report from the web and read them. Find a good one or combine different reports and find your structure. This is hard and it is easier if you can talk so someone that is good at this and you can ask question or send him/she your report for grading.


50% of this book today. Really nice to have in your arsenal of tools. Can recommend this highly.
I always thought in this line of work RTFM meant Read The Fucking Manual but in this case it is Red Team Field Manual

I would love to have this in PDF or any digital format. But as always. Better to create one for your self and have this as reference. Go and get a copy for your self.



PNPT-Live and PEN-LIVE Today 2,5 hours. Tired…need sleep now!


Today it was time to Active Information Gathering from PEN-200 Course. Need to finish this fast. So I can begin the labs. But gut stuck for 5 hours on this one….Strange problems sometimes. Lets continue tomorrow!


Hard day today. 7 hours of PEN-200, but troubleshooting for 5 hours. My fault but as I always say, do not give up! I was lucky today, wife was on a trip so I had all night for me, myself and PEN-200. πŸ™‚

2 chapters done, could have been 4….


5 hours of web today in PEN-200. Web is really fun. Used both Burp and ZAP


No hacking today.


Beer time


Free day!


Today it was time to get into PEN-200 again. Need to hurry this up. I think I am about 6-8 weeks behind my schedule. I thought I was having Aug-Dec to do the labs. But no no….What takes time is the reporting of the exercise. I can just do the flag stuff, but I think I learn more if I do the report and solve all the questions. I did manage to put in 5 hours in the course today. Stuck at web application attacks!


7 hours of PEN-200. Finnsihed the Web part and started with Buffer Overflow. This I think gonna take some time. There is a lot of text to go thru. I would recommend other sites to learn Basic Buffer Overflow also. In the text part of PEN-200 it can be to much information, so nice to see someone talking about it.






5 hours of buffer overflow…my god what am I doing!


10 hours of buffer overflow today. I can see the light in the tunnel, I think.


No hacking today.




Went up 03:00 and drove to Stockholm. It is time for SEC-T and some education.

The first two days it is education time. Hacking Enterprises from in security. Two great guys from UK. They also do Password cracking 101 please watch this amazing course.  And do not forget to follow Will Hunt @Stealthsploit and Owen Shearing @rebootuser.

This course fits like a glove!


Second day and sorry to say last day of Hacking Enterprises. This course will get 10 of 10. If you have the opportunity to attend this one do not miss this, you will not be disappointed. The lab environment is up to date, even Windows 11. I also got access to the lab for 2 weeks and access to a ctf environment. 

Also it was 1 hour of Offensive Security Academy live stream this time.


SEC-T First Day. This is a security conference in Stockholm. You can read all about it on there web page 

Trammell Hudson
 Hacking your dishwasher, or cloudless Home Connect appliances

Nicklas Keijser & Mattias WΓ₯hlen
Russian Cyber Warfare in Ukraine

Jonathan Leitschuh
 Scaling the Security Researcher to Eliminate OSS Vulnerabilities Once and For All

Eric Michaud & Tom Smith
Crypto Vuln Cornucopia From the archives of Team Kairos Enhanced Edition

Lucas Lundgren
Four Horsemen of Cyberwarfare: 4) Pestilence A Informational Vulnerability Turned into a Weapon of Mass Destruction.

Edwin van Andel
Popopizza How to break the Dutch police bodycams for fun and pizza

Olle Segerdahl
 Why you dont need a Red Team test

Alve BjΓΆrk
SEC-T Badge 2018 solution

Mikhail Shcherbakov
CodeQL in the hands of Bug Hunters

Tomas Rzepka
I C(M) what you got there

I will not buy this attendee list, it is scratched

Lets fix the missing step in the academy to industry job pipeline


SEC-T Second Day.

Martin Herfurt
Project TEMPA Demystifying Teslas Bluetooth Passive Entry System

Joseph Katsioloudes
Secure your code like NASA with Security as Code (SaC)

Yossi Sassi
When SysAdmin and Hacker unite: 21 One-Liners to make you convert from bash to Powershell

Anastasios Pingios
Nation-state actors No, its not all about phishing

Richard Johnson
eBPF ELFs JMPing Through the Windows

Mikko HyppΓΆnen
Thinking About The Unthinkable Closing Keynote

2022-09-16 – 2022-09-18

Beer, Octoberfest


1 hour of preparations, Preparing for the OSCP Exam with AD. All people out there this webinar is a must for doing OSCP!


Buffer Overflow for 3 hours

And also 2 hours with In.Security and there free Catch Me If You Can – Seeing Red Through Blue


1 hour off Offensive Security PEN-200


2 hours of Cyber awareness from In Security. Great presentation, very important to get knowledge out there.Here is the link:

And it is free!






Report writing for the PNTP Exam. This was fun. I have sent in the 65 pages long report. Waiting to get feedback if I will pass and schedule a debriefing. If I do not get forward I hope for a nice feedback on why and what I can do better! Cross your fingers!


Work today!


PNPT Debreif today. I Passed! Read my review:


No hacking today.


2 hours of OSA – PEN – 200 today.


No hacking today! Other studies hardware vendor stuff.


I feel like I am 1,5 month behind my schedule. I think it is gonna be hard to pass OSCP in December. To little time. But we will see, Never Give Up can take you far on your journey.

Today it is gonna be some vendor stuff. Need to take a cert for the company.


Vendor exam, FAILED…. You have to fail to succeed.


Family time, my little princess turned 20! No hacking today!


Vendor study….no hacking 😦


Vendor study….no hacking 😦


Vendor study….no hacking 😦


Vendor study….no hacking 😦


Party πŸ™‚


Party πŸ™‚


Vendor study….no hacking 😦


Exam day for HPE0-V15….PASS PUHHH Now back to hacking PLEASE!


Working…..Not with security 😦










Finally some security

Priv Esc * 4

2022-10-18 -2022-10-31

Work No hacking!


2 hours of video. Privilege Escalation and Password Attack! Finally.

2022-11-01 2022-11-05

Work, Work

2022-11-05 – 2022-11-11

Vmware Exolorer 2022 in Barcelona!


Work and some rest

2022-11-13 – 2022-12-15

Work…..This is not good for OSCP exam this December! 😦


Fixing my laptop, update vm:s and so on. Because it is time for OSCP on Saturday!

This is not gonna work, but I need to try, and my subscriptions ends in Decemeber. Not one lab machine is done and not even the full course. But I can not throw away the exam voucher.


PEN-200 or OSCP exam today. Was able to use my work place for the test. I was schedule to start 10:00 CET, but there was some issue with the login portal for me, so I got started 15 min late. No problem for me….

As I told you before, I am not planing to pass the first time. To little study for that.


24 hours later, without any sleep and infront of the computer all the time. 10 min in total for toilett πŸ™‚

I did the AD stuff = 40 points
I did 1 independent machine = 20 point
50% of the time I was stuck on the 2 independent machines. Did not get anything from them, FUCK!

So in total 60 points and I needed 70, so only if I had done the labs and excersises I would be home.

But we need someting to do in 2023, right? πŸ™‚

This is not an excuse, just the facts.

Course only 55%

Labs 0%


You got mail!

2022-12-20 – 2022-12-31

Work and some free time.


This years goals for me is OSCP in some way….




Because my Offensive Security 1 year subscription ended today. I was planing to do the web100 assesment but when I logged in to the site I was to late. No access! Need to speak to my boss to buy 1 more year πŸ™‚

But I schedule the KLCP exam for today and failed that also, this is not good. Can I have to much going on, need to focus more? No, lets burn some braincells and do Pentester Academy instead πŸ™‚

Started today after work for 3 hours of Web Application course, did manage to go thru 35 videos in this course. There are 82 videos in this course. When I have done a little bit more work with this I can post what I think about Pentester Academy.


Work today


Work today


Today is holiday so it is time for some bootcamp from PentesterAcademy

6 hours of webapp bootcamp

Here are some of the stuff that is in the bootcamp today


Free from IT


Free from IT


Time to end this bootcamp!

Today it was 4 hours of traning including


I started the Pentetser Academy Webapplication course 2023-01-03 now do some more videos.


The end of the Web Application Pentesting course from Pentester Academy there was alot of content here and I have put some more infromation in my little hacker head. In this security world there is so many things you wanna know, is there a limit?

The content was like this:

HTTP Basics
Netcat Lab for HTTP 1.1 and 1.0
HTTP Methods and Verb Tampering
HTTP Method Testing with Nmap and Metasploit
HTTP Verb Tampering Demo
HTTP Verb Tampering Lab Exercise
HTTP Basic Authentication
Attacking HTTP Basic Authentication with Nmap and Metasploit
HTTP Digest Authentication RFC 2069
HTTP Digest Auth Hashing (RFC 2069)
HTTP Digest Authentication (RFC 2617)
HTTP Statelessness and Cookies
HTTP Set-Cookie with HTTPCookie
Session ID
SSL – Transport Layer Protection
SSL MITM using Proxies
File Extraction from HTTP Traffic
HTML Injection Basics
HTML Injection in Tag Parameters
HTML Injection using 3rd Party Data Source
HTML Injection – Bypass Filters Cgi.Escape
Command Injection
Command Injection – Filters
Web to Shell on the Server
Web Shell: PHP Meterpreter
Web Shell: Netcat Reverse Connects
Web Shell: Using Python, PHP etc.
Getting Beyond Alert(XSS)
Javascript for Pentesters: Introduction and Hello World
XSS: Cross Site Scripting
Javascript for Pentesters: Variables
Types of XSS
Javascript for Pentesters: Operators
XSS via Event Handler Attributes
Javascript for Pentesters: Conditionals
Javascript for Pentesters: Loops
Javascript for Pentesters: Functions
Javascript for Pentesters: Data Types
Javascript for Pentesters: Enumerating Object Properties
Javascript for Pentesters: HTML DOM
Javascript for Pentesters: Event Handlers
Javascript for Pentesters: Cookies
Javascript for Pentesters: Stealing Cookies
Javascript for Pentesters: Exceptions
Javascript for Pentesters: Advanced Forms Manipulation
Javascript for Pentesters: XMLHttpRequest Basics
Javascript for Pentesters: XHR and HTML Parsing
Javascript for Pentesters: XHR and JSON Parsing
Javascript for Pentesters: XHR and XML Parsing
File Upload Vulnerability Basics
Beating Content-Type Check in File Uploads
Bypassing Blacklists in File Upload
Bypassing Blacklists using PHPx
Bypassing Whitelists using Double Extensions in File Uploads
Defeating Getimagesize() Checks in File Uploads
Null Byte Injection in File Uploads
Exploiting File Uploads to get Meterpreter
Remote File Inclusion Vulnerability Basics
Exploiting RFI with Forced Extensions
RFI to Meterpreter
LFI Basics
LFI with Directory Prepends
Remote Code Execution with LFI and File Upload Vulnerability
LFI with File Extension Appended – Null Byte Injection
Remote Code Execution with LFI and Apache Log Poisoning
Remote Code Execution with LFI and SSH Log Poisoning
Unvalidated Redirects
Encoding Redirect Params
Open Redirects: Base64 Encoded Params
Open Redirects: Beating Hash Checking
Open Redirects: Hashing with Salt
Securing Open Redirects
Cross Site Request Forgery Basics
Cross Site Request Forgery Trigger Tags
CSRF Multi-Step Operation Handling
Mitigating CSRF with Tokens
CSRF Token Bypass with Hidden Iframes
Insecure Direct Object Reference
Insecure Direct Object Reference (Burp Demo)


No hackiing today, just work! πŸ™‚

2023-01-13 – 2023-01-15

Alomost hacking today. Got my new laptop today. I am moving from Dell XPS 13 to Dell XPS 17 with nvidia 3060

Need to move all data from my old one to new. Install new vm:s. Even if I am runing Linux it is alot of work.

Installed Nvidia Drivers and CUDA and got this on hashcat

Not to bad….


Work today and 100 pages of PEN-200 pdf. As I said before my 1 year subscription is in the past so now pdf reading. Also started a very interesting API course AND it is free.

Please check out:


New PC on the way. Need to install som stuff!


Work and hospital with dog, no hacking


Work and hospital with dog, no hacking. But I made 1 hour of webinar at least…

2023-01-20 – 2023-01-24

Work, Work Work


2 hours of web education from INE…Not so advanced, but repetition is the key right?

2023-01-26 – 2023-01-30

Work and work, and some free time. And manage a webinar from blackhills


To much work but I manage to get 1,5 hour of API hacking

2023-01-31 – 2023-02-01

Work, Work


Today webcats time, another great one from BlackHills


Work, Work


00.00 Time for OSCP attempt nr 2. This time I think it went better, and I did send in ~70 pages report. The exam day for me was 19,5 hours with the reporting part included. Lets hope I can start a new chapter and after 511 hours of traning Let It Be Done!


Tired today, I do not know why? I am only 48 and still going strong….



Spreadsheet of my time

Will be a link to a real one, when I am done!

I am not done, but here is the link for below time list


7 thoughts on “My OCSP and PNPT journey from the beginning, during and I hope “the end”. @TCMSecurity @thecybermentor @offsectraining #PEN-100 #PEN-103 #PEN-200 #PEN-203 #WEB-100 #SOC-100 #PNPT #OSCP @joplinapp @reconmap @BHinfoSecurity @ActiveCmeasures @WWHackinFest @strandjs #hacking #pentesting

Add yours

  1. Wow this is some mission you are on with all these certs is a particular order! Hopefully you attain the OSCP eventually.

    I’m currently working through the PWK labs. Started studying in January. My path was:

    3 months THM – Beginner, Web & Offensive Paths
    3 months PG – Worked through all TJ Nulls boxes on Proving Grounds Practice
    3 months PWK – Where I currently am in the middle of it.

    Exam in September probably.


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Blog at

Up ↑

%d bloggers like this: