Viewing a single comment thread. View all comments

itspeterj t1_iux3fhg wrote

Hi Gage, I'm a big fan of the Offensive Security training materials you put out there, but they can be very difficult to figure out in terms of what to do for labs and the proving grounds. I know the OffSec motto is "try harder" and I'm a big believer in that, but has there been any discussion about making some of the lab boxes a bit more straight forward?

2

Offsec_Community OP t1_iux64ex wrote

I do not work on the team that does the Proving grounds work so I am not sure if they are having that discussion. The offsec discord is a great place to bring those issues up and get some answers. I will can also pass that message along to them and if you have some more specific input on that let me know and I will pass that along.

I will say that for proving grounds I think the idea is to not have much to go on. Just like in the real world for a hacker. They do not get any inside tips or help most of the time. They might just start with a web site or an IP address just like in proving grounds and from there they work on finding out as much as they can about what services are running, vulnerabilities, etc.

If the issue is not that and something else then we are always open to making the student experience better any way we can.

2