Blog
News and updates from OffSec

May 13, 2019
3 min read
AWAE Exam for OSWE Certification now Available with Online Course
In March we released the online version of Advanced Web Attacks and Exploitations (AWAE) to amazing customer response. Thank you to everyone that has taken the course! We really appreciate the kind words and reviews. Today, we are very pleased to announce the availability of the Offensive Security Web Expert (OSWE) certification.

Exploit Development
Development of a new Windows 10 KASLR Bypass (in One WinDBG Command)
by Morten Schenk Windows 10 1809 Kernel ASLR Bypass Evolution When it is well-implemented, Kernel Address Space Layout Randomization (KASLR) makes Windows kernel exploitation extremely difficult by making it impractical to obtain the base address of a kernel driver directly. In an attempt to bypass this, researchers have historically focussed on kernel address leaks to
Mar 19, 2019
10 min read

Exploit Development
AWAE Now Available Anywhere, Anytime
Our Advanced Web Attacks and Exploitation (AWAE) live training course has been one of the fastest-selling classes at various industry events for years. The Black Hat classes perennially sell out in a matter of minutes, and every year we’re snowed under by demand from security professionals wondering when we’ll offer it online. For this reason, today we’re excited to announce AWAE is now available online…
Mar 18, 2019
2 min read

Insights
Cheating Attempts and the OSCP
Last week, an individual started to release solutions to certain challenges in the OSCP certification exam. This led to some discussion on Twitter and made it clear to us that there is a fair amount of misunderstanding about what’s on the exam, how we catch cheaters, how many people attempt to cheat, and what happens when they are discovered. In this post, we would like to shine some light on our certification process.
Jan 31, 2019
1 min read

OffSec News
Offensive Security Appoints Ning Wang as CEO to Lead Organization’s Next Stage of Growth
Today we all constantly read about data breaches that could have been prevented if the impacted organization had just done what they were supposed to do. The unfortunate reality is that cyberattacks are now a matter of ‘when’ and not ‘if’ for the average enterprise. Yet the landscape is changing and protecting your environment is actually getting more challenging not less.Cyber adversaries are more organized and talented than ever, so an effective cyber defense now requires more than just following the right processes. Today’s enterprises need defenders who perform their jobs with an adversarial mindset. While this need is becoming more acute every day, we are also presently in the midst of an enormous cybersecurity skills shortage. These two forces are diametrically opposed and there is only one way toward resolution – practical security training.This being the case, I couldn’t be happier to join Offensive Security as the company’s next CEO.
Jan 15, 2019
3 min read

OffSec News
Exploit Database Redesign
Offensive Security is delighted to announce the complete redesign of The Exploit Database (EDB), making it easier and faster than ever to find the data you need and presenting it to you in a responsive dashboard layout.
Nov 26, 2018
1 min read

OffSec News
A New Partnership
It’s been a busy few months for us here, and for good reason. Today we are proud to announce our new partners at Offensive Security – Spectrum Equity.
Sep 4, 2018
2 min read

Insights
Offensive Security Online Exam Proctoring
When we started out with our online training courses over 12 years ago, we made hard choices about the nature of our courses and certifications. We went against the grain, against the common certification standards, and came up with a unique certification model in the field – “Hands-on, practical certification”. Twelve years later, these choices have paid off. The industry as a whole has realized that most of the multiple choice, technical certifications do not necessarily guarantee a candidate’s technical level…and for many in the offensive security field, the OSCP has turned into a golden industry standard. This has been wonderful for certification holders as they find themselves actively recruited by employers due to the fact that they have proven themselves as being able to stand up to the stress of a hard, 24-hour exam – and still deliver a quality report.
Jul 26, 2018
6 min read

Penetration Testing
The Synology Improbability
Recently, my manager purchased a Synology NAS device for me to do some backups. Since quite a few people I know use this particular NAS (including myself now), I decided to do a quick audit on it before integrating it into my lab environment. In this blog post, I will cover two different vulnerabilities patched by Synology.
Jan 16, 2018
10 min read

Insights
Auditing the Auditor
Some time ago, we noticed some security researchers looking for critical vulnerabilities affecting “security” based products (such as antivirus) that can have a damaging impact to enterprise and desktop users. Take a stroll through the Google Project Zero bug tracker to see what we mean.
Jul 5, 2017
12 min read

Exploit Development
Fldbg, a Pykd script to debug FlashPlayer
A few months ago, we decided to make a new module for our Advanced Windows Exploitation class. After evaluating a few options we chose to work with an Adobe Flash 1day vulnerability originally discovered by the Google Project Zero team. Since we did not have any previous experience with Flash internals, we expected a pretty steep learning curve.
Nov 29, 2016
19 min read

Penetration Testing
Hacking WPA Enterprise with Kali Linux
Admittedly, somewhat of a click-bait blog post title – but bear with us, it’s for a good reason. Lots of work goes on behind the scenes of Kali Linux, tools get updated every day and interesting new features are added constantly. Most of these tool updates and feature additions go unannounced, and are then discovered by inquisitive users – however this time, we had to make an exception.
Nov 21, 2016
3 min read

OffSec News
A Decade of Exploit Database Data
Managing the Exploit Database is one of those ongoing tasks that ends up taking a significant amount of time and often, we don’t take the time to step back and look at the trends as they occur over time. Have there been more exploits over the years? Perhaps fewer? Is there a shift in platforms being targeted? Has the bar for exploits indeed been raised with the increase in more secure operating system protections?
May 2, 2016
1 min read
Join the OffSec Community!
Our community members connect, communicate and collaborate on all things cybersecurity.