This week I have been looking into the second network. I tried hard to find the network-secrets.txt hash on all of the machines I previously rooted, but found nothing. This is very important because though I can access things on the second network, the OSCP is designed so that I can only revert things on the second network if I enter the network-secrets.txt hash in the student panel. This is becoming a big problem and is holding me back. Though I have a lot of leads on machines in the second network, from experience, I learned that reverting a machine is always the first thing you should do. This upcoming week, my plan is to start from the very bottom of the network and work my way up in the public network. I suspect there is one machine in particular that may have the key, but I haven’t been able to even get user on it. I suspect it is one of the types that requires things from other boxes.
A lot of times, I find myself completely stuck and despite my initial thought, constantly looking at things doesn’t always help. Usually, I revert to playing games or browsing reddit as a break, but this week I filled it in with learning basic reverse engineering. MalwareResearcher started livestreaming some of his challenges on twitch recently, so I started catching up on those instead of playing games. Though it the content isn’t completely relatable, I think some of the concepts will come in handy some time. If I have time next week, I want to look into MalwareUnicorn’s RE101.