1 00:00:00,600 --> 00:00:01,320 Hello, everybody. 2 00:00:01,350 --> 00:00:03,270 Welcome back to Basics but development. 3 00:00:03,510 --> 00:00:05,880 Before we continue, small 5.5. 4 00:00:05,880 --> 00:00:09,990 I know all of you guys are excited to explore your second application. 5 00:00:10,380 --> 00:00:13,350 I just want to share a few a forward on the OCP exam. 6 00:00:14,520 --> 00:00:20,480 So this section is going to be the most important part of the class, especially if you're pursuing 7 00:00:20,490 --> 00:00:22,890 the sense of security certified professional certification. 8 00:00:23,520 --> 00:00:29,160 Now, you definitely need to familiarize yourself with that chapter analysis and eliminations. 9 00:00:29,730 --> 00:00:34,050 The executable app to exploit is actually a custom compiler program. 10 00:00:34,620 --> 00:00:36,480 You're given two machines to hack into. 11 00:00:36,600 --> 00:00:44,770 One is a Windows 732 bit exploit testing box, and the other exam box is the actual flag to grab after 12 00:00:44,770 --> 00:00:45,390 be exploited. 13 00:00:45,930 --> 00:00:48,750 In my first attempt, I identified 12 bad characters. 14 00:00:49,110 --> 00:00:54,900 Unlike the three bad characters that you will find out within the section of the course, the exam machines 15 00:00:54,900 --> 00:00:58,170 do not interact with each other like they do in the student lab environment. 16 00:01:00,220 --> 00:01:04,720 So basically the buffer overflow box is actually the easiest box. 17 00:01:04,989 --> 00:01:09,550 It shouldn't take you more than 30 minutes to an hour to route the buffer overflow box and grab the 18 00:01:09,550 --> 00:01:09,970 flag. 19 00:01:10,600 --> 00:01:14,950 I would suggest going for the temp point box right after using search play. 20 00:01:15,190 --> 00:01:17,020 It's very easily excludable. 21 00:01:17,800 --> 00:01:22,720 It is advised to merely begin scanning prior to you working on the buffer overflow box. 22 00:01:23,260 --> 00:01:25,150 The next three boxes, in example. 23 00:01:25,270 --> 00:01:31,030 Specifically harder they are also are randomized between Linux and Windows operating systems with different 24 00:01:31,030 --> 00:01:32,410 exploitable applications. 25 00:01:32,860 --> 00:01:38,020 You need to pass exam with a score of 70 out of 100, plus a wall written exam report.