<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Offensive Security on System Overlord</title><link>https://systemoverlord.com/tags/offensive-security.html</link><description>Recent content in Offensive Security on System Overlord</description><generator>Hugo</generator><language>en-us</language><managingEditor>david@systemoverlord.com (David Tomaschik)</managingEditor><webMaster>david@systemoverlord.com (David Tomaschik)</webMaster><lastBuildDate>Mon, 28 Mar 2016 00:00:00 +0000</lastBuildDate><atom:link href="https://systemoverlord.com/tags/offensive-security/index.xml" rel="self" type="application/rss+xml"/><item><title>Another Milestone: Offensive Security Certified Expert</title><link>https://systemoverlord.com/2016/03/28/another-milestone-offensive-security-certified-expert.html</link><pubDate>Mon, 28 Mar 2016 00:00:00 +0000</pubDate><author>david@systemoverlord.com (David Tomaschik)</author><guid>https://systemoverlord.com/2016/03/28/another-milestone-offensive-security-certified-expert.html</guid><description>&lt;p&gt;This weekend, I attempted what might possibly be my hardest academic feat ever:
to pass the Offensive Security Certified Expert exam, the culmination of
OffSec&amp;rsquo;s Cracking the Perimeter course. 48 hours of being pushed
to my limits, followed by 24 hours of time to write a report detailing my
exploits. I expected quite a challenge, but it really pushed me to my limits.
The worst part of all, however, was the 50 hours or so that passed between the
time I submitted my exam report and the time I got my response.&lt;/p&gt;</description></item></channel></rss>