Live Support and the Orders Department are available 24/7.
If you would like to see what time it is currently in GMT, you can do so at: https://greenwichmeantime.com/
If you would like to see the GMT times converted to your local time you can do so at: http://www.timezoneconverter.com/cgi-bin/tzc.tzc
Penetration Testing with Kali Linux is a foundational course, but still requires students to have certain knowledge prior to attending the online class. A solid understanding of TCP/IP, networking, and reasonable Linux skills are required. Familiarity with Bash scripting along with basic Perl or Python is considered a plus.
Offsec has strict rules regarding lab pauses. You can view additional details here.
The Personal Clients are for each student to work through their PWK course materials. They can be used for any additional activities a student sees fit, but are only guaranteed to work with the exercises explicitly mentioned in the PWK guide. Note, for the 'passing the hash' attack exercise there are active targets in the labs that you can practice with.
Students who have purchased or upgraded to the new version of PWK are assigned to three Personal Clients; a Windows 10 Client, a Debian Client, and a Windows 2016 Server.
If you have passed your OSCP exam, you may qualify for 40 CPE points, which you must submit yourself via the ISC² members site. If you have not passed the exam, or opted not to take it, you must submit your lab documentation in the form of a penetration test report to "challenges AT offensive-security DOT com" for review to qualify for the CPE points. In case of an ISC² audit, we will provide you with a formal letter of attendance.
No. The machines in the lab are there to give you as much experience as possible before you take the exam in order to better prepare you.
The Offensive Security lab is a shared environment and it's possible that another student could have left the machine in an altered state. We recommend reverting the target machine via your student control panel before attempting to scan, exploit, or connect to it, as this is the only way to make sure the machine is in its original working state.
We have an active community chat platform where you can connect, communicate, and collaborate with other students, staff, and members of the infosec community. For more information on our community platform, check out our quick guide at: Community Chat User Guide.