Watch this video for a quick overview on the exam process, from scheduling to submitting your exam report.
This video was current as of October 2022. As we continue to improve the Training Library, slight modifications in the interface or functionality may appear.
Have more questions? Check the frequently asked questions below.
There are three network scenarios available to attack.
You will only pass the exam if you are able to complete and obtain proof.txt on two network scenarios. One of the scenarios will be mandatory to complete, more information will be provided in the exam control panel once your exam starts.
Everything that you need to retrieve the wireless keys is included in the exam system.
You will have 3 hours and 45 minutes to complete the challenge itself and a further 24 hours to send your documentation to the Offensive Security Challenges department.
Your exam documentation must include the wireless network keys, the commands you used to obtain them and complete commands to connect to the target Access Point to gain the proof.txt. The report must be submitted in PDF format.
You will be provided an exam VPN connectivity pack once your scheduled exam starts. You are assigned a Kali Linux machine with a card that you are to use for the attacks.
The provided Kali Linux machine should also include any dictionaries required for the attacks.
To learn how to schedule an exam, how to see the amount of time you have left before your exam attempt expires or understand how rescheduling an exam works, please visit our Important information about exam scheduling in the Training Library article.
We do not release the number of people that hold our certifications or the success rate of completion for them. The exam-taking experience and perceived difficulty is different for everyone and we don't want to needlessly discourage or encourage students with numbers based on success or failure.
Still have questions?