portal.offensive-security.com
Open in
urlscan Pro
2606:4700:10::6816:31dc
Public Scan
URL:
https://portal.offensive-security.com/
Submission: On October 06 via api from VN — Scanned from DE
Submission: On October 06 via api from VN — Scanned from DE
Form analysis
0 forms found in the DOMText Content
THIS WEBSITE USES COOKIES We use cookies to personalise content and ads, to provide social media features and to analyse our traffic. We also share information about your use of our site with our social media, advertising and analytics partners who may combine it with other information that you’ve provided to them or that they’ve collected from your use of their services. You consent to our cookies if you continue to use our website. [#OOI_PERSONAL_INFORMATION#] Use necessary cookies only Allow all cookies Show details OK Use necessary cookies only Allow selection Allow all cookies Necessary Preferences Statistics Marketing Show details Cookie declaration [#IABV2SETTINGS#] About Necessary (11) Preferences (0) Statistics (4) Marketing (0) Unclassified (5) Necessary cookies help make a website usable by enabling basic functions like page navigation and access to secure areas of the website. The website cannot function properly without these cookies. NameProviderPurposeExpiryTyperc::aGoogleThis cookie is used to distinguish between humans and bots. This is beneficial for the website, in order to make valid reports on the use of their website.PersistentHTMLrc::cGoogleThis cookie is used to distinguish between humans and bots. SessionHTMLmStripeDetermines the device used to access the website. This allows the website to be formatted accordingly. 2 yearsHTTPJSESSIONIDNew RelicPreserves users states across page requests.SessionHTTP__stripe_midStripeThis cookie is necessary for making credit card transactions on the website. The service is provided by Stripe.com which allows online transactions without storing any credit card information.1 yearHTTP__stripe_sidStripeThis cookie is necessary for making credit card transactions on the website. The service is provided by Stripe.com which allows online transactions without storing any credit card information.1 dayHTTPCookieConsentCookiebotStores the user's cookie consent state for the current domain1 yearHTTPcsrftokenportal.offensive-security.comHelps prevent Cross-Site Request Forgery (CSRF) attacks.1 yearHTTPpa_enabledSolarwindsDetermines the device used to access the website. This allows the website to be formatted accordingly. PersistentHTMLpersist:rootUserguidingThis cookie stores visitor credentials in an encrypted cookie in order to allow the visitor to stay logged in on reentry, if the visitor has accepted the 'stay logged in'-button.PersistentHTML__cf_bmVimeoThis cookie is used to distinguish between humans and bots. This is beneficial for the website, in order to make valid reports on the use of their website.1 dayHTTP Preference cookies enable a website to remember information that changes the way the website behaves or looks, like your preferred language or the region that you are in. We do not use cookies of this type. Statistic cookies help website owners to understand how visitors interact with websites by collecting and reporting information anonymously. NameProviderPurposeExpiryTypeevents/1/#New RelicUsed to monitor website performance for statistical purposes.SessionPixeljserrors/1/#New RelicPendingSessionPixelpaSolarwindsRegisters the website's speed and performance. This function can be used in context with statistics and load-balancing.PersistentHTMLvuidVimeoCollects data on the user's visits to the website, such as which pages have been read.2 yearsHTTP Marketing cookies are used to track visitors across websites. The intention is to display ads that are relevant and engaging for the individual user and thereby more valuable for publishers and third party advertisers. We do not use cookies of this type. Unclassified cookies are cookies that we are in the process of classifying, together with the providers of individual cookies. NameProviderPurposeExpiryType___ug___UserguidingPendingPersistentHTML__UGS__uidUserguidingPendingPersistentHTMLdarkModeportal.offensive-security.comPendingPersistentHTMLOSFamiliesportal.offensive-security.comPendingPersistentHTMLug-guide-eventsUserguidingPendingPersistentHTML [#IABV2_LABEL_PURPOSES#] [#IABV2_LABEL_FEATURES#] [#IABV2_LABEL_PARTNERS#] [#IABV2_BODY_PURPOSES#] [#IABV2_BODY_FEATURES#] [#IABV2_BODY_PARTNERS#] Cookies are small text files that can be used by websites to make a user's experience more efficient. The law states that we can store cookies on your device if they are strictly necessary for the operation of this site. For all other types of cookies we need your permission. This site uses different types of cookies. Some cookies are placed by third party services that appear on our pages. You can at any time change or withdraw your consent from the Cookie Declaration on our website. Learn more about who we are, how you can contact us and how we process personal data in our Privacy Policy. Cookie declaration last updated on 20.09.22 by Cookiebot We're sorry but the Offensive Security Platform doesn't work properly without JavaScript enabled. Please enable it to continue. Library Courses Sign in Register OFFENSIVE SECURITY TRAINING LIBRARY * All * Labs * Skills * Job Roles * Courses * FILTERS LEVEL 100 200 300 SKILLS Cloud Security Exploit Development Penetration Testing Security Operations Web Application Attacks JOB ROLES Back-end Developers Cloud Architects Cloud Engineers Cloud Pentesters DevSecOps Show all COURSES EXP-100 EXP-301 EXP-312 PEN-100 PEN-103 Show all NEW RELEASES View more View all TOPIC INTRODUCTION TO CYBERSECURITY This Topic provides a high level overview of the cybersecurity landscape. It includes information on... Level 4h TOPIC This Topic provides a high level overview of the cybersecurity landscape. It includes information on how cybersecurity is practiced, threat actor classifications, the CIA triad, cybersecurity principles and controls, cybersecurity laws, regulations and stanadards, as well as various career opportunities within the cybersecurity industry. INTRODUCTION TO CYBERSECURITY IS PART OF Level 100 New Releases New Releases Job Roles Network Penetration Testers, Exploit Developers, SOC Analysts, Malware Analysts, System Administrators (System Hardeners), Cloud Architects, Cloud Pentesters, Site Reliability Engineers, DevSecOps, Cloud Engineers, Front-end Developers, Back-end Developers, Fullstack Developers, Web Application Testers, Digital Forensics Analysts, Incident Responders, Threat Hunters, Vulnerability Researchers TOPIC INTRODUCTION TO NETWORK FIREWALLS Introduction to Network based firewalls including iptables, egress rules, pfsense rules... Level 5h TOPIC Introduction to Network based firewalls including iptables, egress rules, pfsense rules INTRODUCTION TO NETWORK FIREWALLS IS PART OF Skills Security Operations Level 100 New Releases New Releases TOPIC UNDERSTANDING DIRECTORY TRAVERSAL Introduction to directory traversal, including relative and absolute pathing, Apache Web Service, in... Level 6h TOPIC Introduction to directory traversal, including relative and absolute pathing, Apache Web Service, interesting system files, and directory listing. UNDERSTANDING DIRECTORY TRAVERSAL IS PART OF Skills Web Application Attacks Level 100 Operating Systems Linux/Windows New Releases New Releases Job Roles Site Reliability Engineers, Front-end Developers, Back-end Developers, Fullstack Developers, Web Application Testers, Threat Hunters LABS PLAY 50 MACHINES PROVING GROUNDS PLAY Dedicated access to the VulnHub community generated Linux machines.... Level PROVING GROUNDS PLAY Dedicated access to the VulnHub community generated Linux machines. PRACTICE 111 MACHINES PROVING GROUNDS PRACTICE Includes all the features of PG Play plus additional Windows and Linux machines developed by OffSec ... Level PROVING GROUNDS PRACTICE Includes all the features of PG Play plus additional Windows and Linux machines developed by OffSec experts with unlimited time on any targets. SKILLS View more View all CLOUD SECURITY Defending cloud data, connectivity, infrastructure, and functionality against threats.... Level 1d 21h CLOUD SECURITY Defending cloud data, connectivity, infrastructure, and functionality against threats. EXPLOIT DEVELOPMENT Research into how programs work and how they might be manipulated to perform unintended and dangerou... Levels 26d 6h EXPLOIT DEVELOPMENT Research into how programs work and how they might be manipulated to perform unintended and dangerous functions. PENETRATION TESTING The act of performing ongoing cycles of research and attack against a target or boundary.... Levels 1mo 14d 11h PENETRATION TESTING The act of performing ongoing cycles of research and attack against a target or boundary. JOB ROLES View more View all BACK-END DEVELOPERS Software engineers who code solutions for the server-side of a web application.... Levels 11d 15h BACK-END DEVELOPERS Software engineers who code solutions for the server-side of a web application. CLOUD ARCHITECTS IT professionals who design and manage cloud-based architecture to address business, security, and e... Levels 4d 1h CLOUD ARCHITECTS IT professionals who design and manage cloud-based architecture to address business, security, and efficiency objectives. CLOUD ENGINEERS IT professionals who design, manage, maintain, and support cloud-based solutions.... Levels 1d 22h CLOUD ENGINEERS IT professionals who design, manage, maintain, and support cloud-based solutions. COURSES View more View all EXP-100 An introductory survey of tools and technologies required for learning exploit development. Includes... EXP-100 An introductory survey of tools and technologies required for learning exploit development. Includes reading and writing assembly for Intel and ARM processors, the usage of various debuggers and disassemblers, and other Topics. EXP-301 | OSED CERTIFICATION EXP-301 An intermediate-level course which teaches students the fundamentals of modern exploit development. ... Level 12d 6h EXP-301 An intermediate-level course which teaches students the fundamentals of modern exploit development. It starts with basic buffer overflow attacks and builds into learning the skills needed to crack the critical security mitigations protecting enterprises. EXP-312 | OSMR CERTIFICATION EXP-312 An advanced course that teaches the skills necessary to bypass security controls implemented by macO... Level 8d 18h EXP-312 An advanced course that teaches the skills necessary to bypass security controls implemented by macOS, and exploit logic vulnerabilities to perform privilege escalation on macOS systems. OFFSEC LIVE OSA - PEN - 200 OFFSEC ACADEMY - PEN-200 OffSec Live: PEN-200 is a scheduled and open streaming offering that includes a learning journey des... OFFSEC ACADEMY - PEN-200 OffSec Live: PEN-200 is a scheduled and open streaming offering that includes a learning journey designed for OffSec students currently enrolled in PEN-200. * © 2022 Offensive Security | * Privacy | * Terms of service