Friday, January 13, 2012

OSCP - My review

The truism "anything worth having doesn't come easy" is one I have often remembered when on a particularly difficult path to a goal. Never have the words rung quite so true when applied to my quest for the OSCP certification. This phrase, along with several other quotes and snips of wisdom helped to motivate me though the PWB (Penetration Testing with Backtrack) course and final 24 hour exam.

The OSCP certification is an offensive security course which teaches the attacking side of Information Security and is largely aimed at those wanting to become penetration testers. My personal motivation for taking the course and exam were to better understand the methodology, tools and techniques that attackers employ to breach networks and systems. I have been a dabbler with offensive security practices for several years, have read several books on the subject, taken courses and run my own lab of vulnerable systems to practice on. I wanted to consolidate, formalize and measure the basic knowledge I had gained though my own exercises and the PWB course seemed like a perfect way to do this.

Obtaining the OSCP certification requires taking a self-paced course "Penetration testing with Backtrack" and passing a final exam. The course materials consist of a PDF manual, a lab full of vulnerable systems and a set of videos which complement and enhance the exercises in the PDF. The student is expected to review each section of the course and in some cases complete a given exercise and document it at the end of the given module. The course starts off fairly easy with some simple scripting but soon ramps up to scanning, buffer overflows, web application hacking, client side attacks, password attacks etc. Each module in the course is well laid out and presented. The videos are voiced by the Backtrack CIO himself "Mutts" and he does a great job of explaining the material at hand. Some of the videos and modules are worth repeating to really digest the concepts being explained.

The student is expected to follow up the modules with their own research and where necessary seek answers to questions or expand on the topic which may not have been fully understood in the text or video. For example, I went through the buffer overflow section of the course twice and then practiced on some vulnerable applications to really digest and understand the subject. Eventually, after much frustration the concepts clicked and I soon found myself writing some of my own simple buffer overflow exploits. The feeling of accomplishment I got from this was tremendous and underlines the Offensive Security mantra of "Try harder".

Once I started to get comfortable with the exercises and documentation it was time to move on to the lab. The PWB lab is comprised of multiple networks and systems which contain wide range of vulnerable applications and systems spread across several networks. The student connects to the lab via a VPN connection from Backtrack. Once the student starts working in the PWB lab they are expected to document each system they manage to break into, and in the case of root or administrator access retrieve a key from the administrator's desktop as proof of compromise. Some of the systems in the lab are relatively easy to get access to, but many are not and present challenges that would frustrate a trappist monk. I spent many late nights trying harder and battling to gain access to a system, breaking one barrier only to encounter another. Applying "Try harder" often worked in these cases and forced me to think and approach problems in new and novel ways. After extended periods of study and practice I found myself able to slip into a hacker's mindset far more easily.

The PWB lab is really well designed. There are multiple ways of gaining access to many of the systems and some systems lead to other networks. For example, some systems are dual homed and have access to other networks which also contain vulnerable systems. The dual homed systems are great for practicing pivoting and attacking systems and networks though intermediary hosts. This often involves tunneling attacks through hosts you already control to circumvent firewall rules. Many of the vulnerabilities in the lab require you to download, fix and compile exploit code. Often in these cases the devil is in the very minor details and absolute focus and concentration is required to get an exploit to work the way you want it to.

After several months in the lab I managed to break into more than 35 systems. I had root or administrator access on almost all of them. As I had taken a couple of extensions generously paid for by my employer I decided to book the PWB 24 hour challenge and make an attempt at gaining the full certification. The OSCP challenge requires that the student connect to a new network containing hosts they have never seen and to compromise enough of them to gain enough points to pass. The student is given 24 hours to complete the challenge and then a further 24 hours to submit their final report for review.

I took two days off work and told my team to only call me if something was on fire or someone was dead. I started the challenge at 11 AM on Thursday morning. I spent the first couple of hours just getting a lay of the land and planning my attacks. The rest of the day was a blur, I remember my wife bringing me food a couple of times and my dogs wondering why I was still up typing furiously at 4 AM. I had made good progress throughout the day but was stuck needing 10 points to pass and my weary mind was starting to demand sleep. I considered packing it in and taking the exam again at later date when I decided to give it one final push. Sometime around 7 AM on Friday morning I was finally done, I had owned everything with the exception of one box, a box that I had user privileges on and tried so hard to elevate. I probably spent 5 hours on it alone. I stumbled into bed as my wife was getting up for work. I drifted off to sleep with a big smile on my face. I had really done it and it was over. I was both elated and sad as I had grown attached to my late night study and hacking sessions in the lab, listening to the inception soundtrack or just silence save for my typing.

Documenting each system I hacked was probably my least favorite part of the course, but absolutely necessary as part of the process. As I worked my way through the lab systems I took notes, console output and screenshots of each compromise to use later in my final report. If I had the course over again I would have documented each system completely as I rooted them, rather than waiting to near the end to compile all my notes into a cohesive report. This ended up taking me almost a week and another day for my final exam report. Counting my lab exercises my final report was 350 pages.

When I received the official word from Offensive Security that I had passed I was also given access to a discussion forum restricted to those who had also passed the PWB challenge. The forum contains war stories from the labs and solutions to some of the exam systems. I looked up the host that I had tried so hard to elevate from user to admin and found that I was extremely close the whole time, a minor change in one parameter would have done the trick. ;-)

I would highly recommend the PWB course to anyone who is serious about Information Security. More than just a hands on technical challenge, it's also a test of determination and perseverance.

Try Harder!

39 comments:

  1. I have been thinking about trying this. But i would be paying for it myself, so i am a bit more determined to be ready.

    I am very curious about the entry level for this?
    How much foreknowledge would you require to even attempt this course?

    ReplyDelete
    Replies
    1. "How much foreknowledge would you require to even attempt this course?"

      I would recommend basic to intermediate Linux skills. Understand how to move files around, set and read permissions and configure services and networking. You can pick most of this up with online tutorials or just playing around with a Linux distro.

      Some scripting experience is helpful, though not a requirement.

      Windows admin level skills are helpful, but again, not a requirement.

      I would say the only real requirement is a lot of your time, patience and determination.

      Delete
  2. How much programing and/or scripting experience do you think one needs before taking the class?

    Thanks in advance.

    ReplyDelete
    Replies
    1. "How much programing and/or scripting experience do you think one needs before taking the class?"

      Not a lot really. I had some scripting experience (mostly Windows) before starting and no programming experience at all.

      Delete
  3. Nice write up...thinking about taking this one. How well did you know the BackTrack toolset before you took the class?

    ReplyDelete
    Replies
    1. I knew the in and outs of Metasploit and nmap fairly well, but not in depth and had some familiarity with other tools (netcat, nikto, compilers etc)

      Delete
  4. This comment has been removed by the author.

    ReplyDelete
  5. Hi,
    I noticed that you mentioned that it took you a couple of months to break into 35 machines. I am contemplating purchasing 30 day subscription to the labs but after reading your comment I am having second thoughts. Please can you share your thoughts on the lab subscription length you would recommend based on your experience.
    Thanks

    ReplyDelete
    Replies
    1. Personally, I wanted more time simply because I don't have the resources to work on it as much as I would like. In a good week I was getting about 25 hours of OSCP time. If you can dedicate 8 -10 hours a day and you have some experience you could probably get it done in 30 days.

      Delete
  6. Thanks for the write up .
    I am good in programming;know basics of linux and ethical hacking;butnever worked in IT sec, a fresher;

    I have planned to do OSCP exam to enter in the IT sec world. What's your opinion? Can i achieve the oscp certification? Also How much it will helpful to get into the IT Security world?

    ReplyDelete
    Replies
    1. Hi Trenton,
      thanks for the writeup... Got here from OFFSEC page... like most ppl around here, I just need a piece of advice fom the guru :P
      I work for a leading ecommerce giant and have CEH, ECSA certifications on the IT Security side and a lil on the programming side[SCJP].
      But just considering me as a fresher, do u think one'd do good in the 30 day pack? looking forward for the suggestion from the guru.. :P

      Delete
  7. Hi Trenton,
    thanks for the writeup... Got here from OFFSEC page... like most ppl around here, I just need a piece of advice fom the guru :P
    I work for a leading ecommerce giant and have CEH, ECSA certifications on the IT Security side and a lil on the programming side[SCJP].
    But just considering me as a fresher, do u think one'd do good in the 30 day pack? looking forward for the suggestion from the guru.. :P

    ReplyDelete
  8. Brian,

    It really depends on how you learn. We all have different learning habits. Personally I took my time because I have a very demanding full time job. If I only had 30 days to do it, I would want to be putting in at least 5 hours a day 6 days a week.

    ReplyDelete
  9. Brian - Good writeup on the OSCP. I am about 70 days deep into this and in the same boat as you are except that I feel I run into a brick wall on this.

    Did you have to spend a lot of time figuring out how to tweak exploit code to get into some systems or were some tools good enough to get into some boxes.

    Also any advice can you give for someone who already is beaten up by someone who as repeatedly hit a brick wall?

    ReplyDelete
  10. I'm planning on taking this course soon. Which version of Backtrack do they require you to use? Does it matter?

    ReplyDelete
  11. i, I want to know, if in the labs the machines have firewalls and the student has to attack them....is like the real world? or the machines don't have any firewalls......

    ReplyDelete
  12. A mix of both. Just like the real world.

    ReplyDelete
  13. I been looking around and cant seem to find an answer:
    Do the lap time start as you start the course or does the 30 / 60 / 90 days start when you are ready ?

    Thanks

    ReplyDelete
  14. You can start working in the lab as soon as the course starts. I made the mistake of waiting quite a while before starting in the lab, if I had it over I would have started sooner.

    ReplyDelete
  15. Hello, I'm a Computer Science graduate, i know about programming with java,c and a bit of scripting but mostly on Windows. I'm familiar with linux but at a basic level i believe.. ( cli commands etc.. )

    I decided to try and learn more about web app and network security. I don't know if that matters at all but i began completing some hacking challenges i found online such as the ones provided in try2hack.lt,hackthissite.org,hacking-lab.com and probably more and have been succesfull in almost all. I imagine these are really easy and not irl challenges so yeah.. i'm not sure if i should give OSCP a go or wait till I learn more stuff.
    I'm going to pay for it, since i'm unemployed lol, so i have to be sure.

    What do you suggest I do?
    Also, Is this certification a good first step for becoming a Junior Pen Tester or should i try other?
    How hard is this certification compared to other out there and which are mostly recognized by HR departments?

    Thank you, George.

    ReplyDelete
  16. Hi George,

    Thanks for your comment and sorry for the late reply.

    It matters a lot. The fact that you took it upon yourself to seek out these challenges demonstrates that you have real interest in the field.

    Take a look at the vulnerable Linux distro metasploitable and the Metasploit unleashed online course. If these appeal to you you will most likely do well with and enjoy the OSCP.

    This is a very good cert to obtain to get your foot in the door as a pen tester. Unfortunately its not all that recognized by HR depts, but those who know, know. I hire information security staff and I would give immediate and preferential treatment to anyone who had the OSCP because I know first hand what its takes to get it.

    I would also recommend a lab where you can practice as well as reading everything you can get your hands on. If you really enjoy the work immerse yourself in it for a few years and work at honing your skills and finding a specialty.

    Good luck.

    ReplyDelete
  17. nice article. seeing that you have been in the security field for about 13 years and for me that i am just a year plus into the information security field, i really seem scared taking it. i have explored and did a lot of research in information security but i am still really scared of taking this course.

    But i am not motivated by fear so i am gonna just do it. any advice.
    thanks

    ReplyDelete
  18. is it for fresher's also having basic knowldge of programing and networking on windows platform or what would u suggest sir OSCP or PWB first to purse r any thing else

    ReplyDelete
  19. I found the OSCP course to be a horrible and disappointing experience. After 50 out of 60 days, I had 13 maybe 14 machines I got through and the rest, I abandoned. That is a very poor return on investment in my opinion. I have been in IT for 15 years, and have the basic knowledge that's required, but that is NOT enough. You will need to know about SQL databases, web applications vulnerabilities and how to exploit them, and much more. The videos and PDF are shit, the lessons are shit, and I walked away disappointed, frustrated, and really considered other courses.
    The annoying part is that I read from people that have passed the OSCP and they are all saying the same thing (it was amazing, it was bla bla bla). It sounded like really good, deceptive marketing.
    Bottom line, and not rushing, but it's crap and poor ROI!

    ReplyDelete
    Replies
    1. 01001000 01101001 00100000 01000001 01110100 01110100 01101001 01101100 01100001 00101100 00001101 00001010 00001101 00001010 01001101 01100001 01111001 01100010 01100101 00100000 01101111 01100110 00100000 01110011 01101111 00100000 01101101 01110101 01100011 01101000 00100000 01100110 01110010 01110101 01110011 01110100 01110010 01100001 01110100 01101001 01101111 01101110 00100000 01111001 01101111 01110101 00100000 01101000 01100001 01110110 01100101 00100000 01100010 01100101 01100101 01101110 00101110 00100000 00100000 01000010 01110101 01110100 00100000 01001001 00100000 01110100 01100101 01101100 01101100 00100000 01101111 01101110 01100101 00100000 01110100 01101000 01101001 01101110 01100111 00101100 00100000 01100100 01101111 00100000 01101110 01101111 01110100 00100000 01110101 01101110 01100100 01100101 01110010 01100101 01110011 01110100 01101001 01101101 01100001 01110100 01100101 00100000 01110100 01101000 01100101 00100000 01001111 01010011 01000011 01010000 00101110 00001101 00001010 00001101 00001010 01001001 01101110 00100000 01110100 01100101 01110010 01101101 01110011 00100000 01101111 01100110 00100000 01010010 01001111 01001001 00100000 01110100 01101000 01101001 01101110 01100111 00100000 01111001 01101111 01110101 00100000 01101000 01100001 01110110 01100101 00100000 01101101 01100101 01101110 01110100 01101001 01101111 01101110 01100101 01100100 00100000 01100101 01100001 01110010 01101100 01101001 01100101 01110010 00101100 00100000 01101001 01110100 00100000 01101001 01110011 00100000 01100001 00100000 01110111 01100101 01101100 01101100 00100000 01110000 01100001 01101001 01100100 00100000 01101111 01100110 01100110 00100000 01110100 01101111 00100000 01110100 01101000 01101111 01110011 01100101 00100000 01110111 01101000 01101111 00100000 01100001 01110100 01110100 01100001 01101001 01101110 01100101 01100100 00100000 01110100 01101000 01100101 01101101 01110011 01100101 01101100 01110110 01100101 01110011 00100000 01100110 01101111 01110010 00100000 01110100 01101000 01101001 01110011 00100000 01100011 01101000 01100001 01101100 01101100 01100101 01101110 01100111 01101001 01101110 01100111 00100000 01100101 01111000 01100001 01101101 00100000 01100011 01101111 01101101 01110000 01100001 01110010 01100101 01100100 00100000 01110100 01101111 00100000 01101111 01110100 01101000 01100101 01110010 00100000 01110011 01100101 01100011 01110101 01110010 01101001 01110100 01111001 00100000 01100011 01100101 01110010 01110100 00100000 01110111 01101000 01101001 01100011 01101000 00100000 01101001 01110011 00100000 01101101 01110101 01101100 01110100 01101001 01110000 01101100 01100101 00100000 01100011 01101000 01101111 01101001 01100011 01100101 01110011 00100000 01110111 01101001 01110100 01101000 01101111 01110101 01110100 00100000 01101000 01100001 01101110 01100100 01110011 00101101 01101111 01101110 00100000 01110100 01101111 00100000 01100100 01101111 00101110 00100000 00100000 01000001 01110100 01110100 01100001 01101001 01101110 01101001 01101110 01100111 00100000 01110100 01101000 01100101 00100000 01001111 01010011 01000011 01010000 00100000 01100001 01110010 01100101 00100000 01110000 01100101 01101111 01110000 01101100 01100101 00100000 01110111 01101000 01101111 00100000 01100001 01110010 01100101 00100000 01110111 01100101 01101100 01101100 00100000 01110011 01101011 01101001 01101100 01101100 01100101 01100100 00100000 01100010 01100001 01110011 01100101 01100100 00100000 01101111 01101110 00100000 01110100 01101000 01100101 00100000 01110010 01100101 01110001 01110101 01101001 01110010 01100101 01101101 01100101 01101110 01110100 01110011 00100000 01101110 01100101 01100101 01100100 01100101 01100100 00101110 00100000 01010100 01101000 01100101 00100000 01101111 01101110 01101100 01111001 00100000 01110111 01101111 01110010 01100100 01110011 00100000 01110010 01100101 01101101 01100001 01101001 01101110 01110011 00100000 01010100 01010010 01011001 00100000 01001000 01000001 01010010 01000100 01000101 01010010 00100001 00100001 00100001

      Delete
    2. why would a fox even want grapes?

      Delete
  20. www.crezybrain.net/category/kali-linux/

    ReplyDelete
  21. Being a victim of scam can be devastating and horrible, you were given empty promises before investing and once you invested they usually stop replying their emails, calls and text. That shows they’ve achieved their aim to scam and hurt you. I have been there too as I was too ambitious and wanted financial security which made me invest a $50,000 of my life’s savings. I never thought I would be getting back to my feet by getting back my stolen funds as I already lost hope until I found a recovery team and contacted them which was a leap of faith as I wasn’t going to go down without a fight for my money,hacklordjody@gmail.com is the fund recovery expert that helped me retrieve a significant sum of my investment back. Do not brood alone, make a move too and send a mail to this great team via hacklordjody @ gmail . com or send them a message on Whatsapp +1 (908) 991‑6649

    ReplyDelete
    Replies

    1. Yeah Erica, hacklordjody @ gmail . com, a wonderful team, they helped me recover my lost money from scammers, I had just lost my husband at the time I was scammed ,I felt like it was over for me, I was depressed and almost committed suicide buy thanks to hacklordjody @ gmail . com for coming to my rescue, deep thanks to hacklordjody @ gmail . com for the good work, you guys are the best

      Delete
  22. The really amazing deal about contacting Jody Hacklord is that the Hack done by him can’t get traced to you, as every Hacking job he does is strongly protected by his Firewall. It’s like saying if anyone tries to trace the Hack,
    it will lead them to him and he blocks whatever actions they are doing.
    He has been Invisible to Authorities for almost a decade now.
    Another Amazing thing to you benefit from Hiring Jody Hacklord is that you get a Legit and the best Hacking service, As he provides you with Professional Hacking service.
    We perform every Hack there is, using special Hacking tools we get from the dark web.

    Some list of Hacking Services he provides are-:
    ▪️Phone Hacking & Cloning ✅
    ▪️Computer Hacking ✅
    ▪️Emails & Social Media Account Hacking✅
    ▪️Recovering Deleted Files✅
    ▪️Tracking & Finding People ✅
    ▪️Hunting Down Scammers✅
    ▪️Hack detecting ✅
    ▪️Stealing/Copying Files & Documents From Restricted Networks and Servers ✅

    OTHER SPECIAL HACKING SERVICES

    ▪️Binary Option Recovery ✅
    ▪️Scam Money Recovery✅
    ▪️Bitcoin Multiplication✅
    ▪️Change Of Grades In Universities/Colleges ✅
    ▪️Phone Calls Monitoring✅
    ▪️keyLogging Installation✅
    ▪️Remote Access Trojan (RAT) installation ✅
    ▪️Cyber Security Upgrade✅
    ▪️And lots more...........

    Whatever Hacking service you require, just give him an Email using the Email Address or whatsapp number provided below.
    hacklordjody @ gmail . com
    +1 (908) 991‑6649

    ReplyDelete
  23. I was frustrated and disturbed when i suspect my partner was cheating on me. i couldn’t confront him because he’ll always lie about it. i went for counseling and a came in contact with schwartzsoftwarehackingprogram@gmail.com ,i never buy the idea after a few process, he did a data dive into my partner mobile and he did it,
    he provide me with all the evidence i need, starting from the emails, calls, WhatsApp chat and lot more, it was a shocking moment was not happy about what i saw. it wasn’t easy to move on, but am now free from all his lies, there services are cheap and affordable i never believed this until i saw the evidence, we all need to be free and live happily…
    He offer services which includes:
    He specializes in the following services :
    *Spy on Cheating Partners
    *Identification of Cheating Partner or Employee, Mole in a system.
    *Keeping Tabs on Employees or Doing Online Background Checks
    *Gaining Full Access To Any Mobile Device, WhatsApp, Email, Gps, Snapchat, Instagram, Facebook ,Kik, hangout ,Viber And Any Other Social Media Accounts
    *Accessing University Portals or Any Website of your choice . reach out to them on

    Email : schwartzsoftwarehackingprogram@gmail.com
    Contact detail :+1 704-313-9661

    ReplyDelete
  24. BITCOIN RECOVERY IS REAL!!! ( MorrisGray830 At gmail Dot Com, is the man for the job )
    This man is dedicated to his work and you can trust him more than yourself. I contacted him a year and a half Ago and he didn't succeed. when i got ripped of $491,000 worth of bitcoins by scammers, I tried several recovery programs with no success too. I kept on. And now after so much time Mr Morris Gray contacted me with a success, and the reward he took was small because obviously he is doing this because he wants to help idiots like me who fell for crypto scam, and love his job. Of course he could have taken all the coins and not tell me , I was not syncing this wallet for a year, but he didn't.
    He is the MAN guys , He is! If you have been a victim of crypto scam before you can trust Morris Gray 10000000%. I thought there were no such good genuine guys anymore on earth, but Mr Morris Gray brought my trust to humanity again. GOD bless you sir...you can reach him via ( MORRIS GRAY 830 at Gmaill dot com ) or Whatsapp +1 (607)698-0239..

    ReplyDelete
  25. I want to share my story of how I became a victim of a cryptocurrency and romance scam that went on for several months, I was swindled of everything I have ever owned and went into depression. I thought all hope was lost until I came across an article about Wardrivers Cyber Service and how they can help me recover all that I lost. Wardrivers cyber service was able to recover everything after hacking into their server. You can contact them too if you've had similar encounter in the past.
    EMAIL ( wardriverscyberservice@techie. com ) WhatsApp at +1 (616) 898-7285 and TELEGRAM ID:@wardriverscyberservice

    ReplyDelete
  26. Good day everyone, I was ashamed to share this but I thought I should as it will be beneficial to someone out there considering the different scams that are happening over the internet, I met this guy online and we started talking, he was very sweet and I never imagined he was going to scam me of my hard-earned money, I sent him a total of $235,000.00 through Bitcoin and bank account, this was going on for weeks and after he took everything from home, he blocked me and stopped picking my calls. I thought all hope was lost until I saw an article on Facebook about a hacker who could help me recover all that I had lost without breaking a sweat, I was not very convinced about it considering I was just scammed but I thought of it and said this couldn’t go wrong than it already did, and to my surprise Cyberwallfire@techie .com was able to recover all my money after I contacted them. This should be a lesson to everyone out there to be aware of internet scams and if you have been scammed of your hard-earned money before then go ahead and contact cyberwallfire@techie.com to help you with the recovery of your money

    ReplyDelete
  27. I INVESTED OVER £465,211 IN CRYPTOCURRENCY ABOUT TWO MONTHS AGO

    I found an opportunity to invest in cryptocurrency about two months ago and I took my chance. I contacted a broker who I saw videos on YouTube and I invested a huge sum of money around £465,211 which was deposited using Bitcoin with hopes to gain massive returns on my investment. I kept tracking my portfolio and it was increasing daily on the website. It made me excited and confident. Fast forward to 30 Days after, which was supposed to be my payout date, I tried to make a withdrawal as I needed money to foot my bills and buy my new house, but the broker insisted that I continue to invest or will have to pay some fees to withdraw my funds. That was very disappointing to hear, because it was all going smooth when I deposited the funds. Eventually, I paid the fees which was about £42,400. I was desperate because according to my portfolio, I had made about £1,021,400. Now you see why I was willing to pay the fees. It turned out it was a scheme to keep asking me for more money for one thing or the other, like Taxes, miner fees and so many others. I declined, and instead I won’t pay more. They locked my account for several weeks. A month after, I saw a post on Quora about LEGAL247RECOVERY which stated they were capable of getting my money recovered. With the little faith in me, I contacted them immediately, and discussed my situation, sent all information I had.
    In less than a week, I was able to recoup my BTC. I praise the universe for sending them my way. I wish to recommend them to everyone out there. Here you go LEGAL247RECOVERY,COM OR legal247recovery@gmail.com

    ReplyDelete
  28. The Best Cryptocurrency Recovery Hacker I've ever known are Recovery Masters

    Lack of good information is very bad, i'll like to share my experience about crypto theft here and how I got my money recovered. One faithful evening I was going through the internet and I saw a lot of ads about this investment website. I tried to give them a try to gain financial freedom after giving me their contract agreement and all. Along the line they kept their promise until I made a huge deposit to get massive profit. I discovered the website crashed and their support team is not responding to their mails. I was devastated and came on this forum then I found reviews about (Recoverymasters@email.cz) I gave this fund recovery hackers a try because I never imagined crypto could be retrieved and they did get my lost funds back completely. I urge you to write to them for help on their email or WhatsAp +1(551) 202-23-35 them

    ReplyDelete
  29. ARE YOU LOOKING FOR AN ONLINE HACKERS, FRIENDS DARE. IF YOU NEED GENUINE AND PROFESSIONAL HACKING SERVICES CONTACT : GEO COORDINATES HACKER
    They are professional hackers. They are the best hackers and software developers to penetrate any website, all other hackers get in touch with them to get the best Algorithm software. Their services are 100% guaranteed. Thank God for directing me to Geo Coordinates Hacker. Nothing is worse than losing access to your bitcoin wallet. Just the thought of knowing my whole life savings was gone I went into depression. I felt my life was over and just when I thought all hope was lost, was a friend of mine who introduced me to Geo Coordinates Hacker. I was able to gain access to my wallet in just a matter of days, if you are going through a similar situation or any hacking trouble, don't lose hope with an amazing hacker like Geo Coordinates Hacker. You are sure of 100% recovery, he is reliable and very timely, you will never regret any of their services. Here is the contact info if any one also needs his help. Email: geocoordinateshacker@proton.me.

    ReplyDelete