- Notifications
You must be signed in to change notification settings - Fork224
My own OSCP guide
six2dez/OSCP-Human-Guide
Folders and files
Name | Name | Last commit message | Last commit date | |
---|---|---|---|---|
Repository files navigation
EditI'm currently moving all the OSCP stuff and other things to my "pentest-book". This repository will not have more updates. Sorry for the inconvenience.
This page is the jouney with some tips, the real guide isHERE
My own OSCP guide with some presents, my owncraftedguide and my Cherrytreetemplate, enjoy and feel free to contribute :)
- OSCP-Human-Guide
It was an incredible help to me, I have it on the throne of pentesting basis, litte outdated:https://nostarch.com/pentesting, there is some info to get all the exercises with updated resources here:https://github.com/PollyP/Notes-on-Penetration-Testing-A-Hands-On-Guide-to-Hacking/blob/master/README.md
Repeat this mantra:Sleep, rest, calm down you will get it
This is a must:Use only the VM provided for this course, not the Kali latest ISOI did it with the PWK VM upgrading only MSF, Nmap, Nikto and the basics, butnot upgrade the entire OS.
- Open CherryTree template to take screenshots and paste outputs.
- Run simple nmap and then the slower.
- Check first results (webs, ssh, ftp) from the first fast nmap scan.
- Review slower nmap scan.
- Always go for the easiest port (SMB, FTP, HTTP...).
- Depend on each port do the appropiate enumeration techniches.
- Time to find exploits and try them.
- In case webpage is your target, look the source code, ever, will find software versions, for example.
- When you get the exploit and you have tweaked it for your target and purpose you should be inside as low user.
- Simple enumeration such as OS version, users, permissions, files in home, compilers, available tools.
- In case of Windows, with
systeminfo
is enough for mehttps://github.com/GDSSecurity/Windows-Exploit-Suggester
- In case of Windows, with
- Find out how to upload files.
- Upload your privilege escalation script.
- In case of Linux I always used LinEnum and linux-exploit-suggester
- Check services running and check the strange ones ingtfobins orlolbas andexploit-db
- Run your exploit and get root, collect proofs, passwords, review root paths and home paths for interesting files for other machines.
I did 4 exam mockups in 2 weeks, yes, 24 hours for 5 machines. Main resource to choose machines:NetSecFocus Trophy Room
- LazySysadminVulnHub
- Metasploitable3_ubuntuGitHub
- MrRobotVulnHub
- Pinky's Palace v1VulnHub
- Own crafted Windows XP machine with SLMail, Minishare, DoStackOverflowGood, VulnServer and WarFTPD.
- Session recorded with OBStudio, two screens without sound at 10 fps in mkv format, about 25GB.
Failed, 6 hours in the first BOF, all went bad due my extreme nervous :(
After this last month this was my result: IT Network unlocked, 32 machines rooted in Public Network, that's all. No exam mockups.
- Session recorded with OBStudio, two screens without sound at 10 fps in mkv format, about 25GB.
- After 8 hours 4 machines rooted. After 20 hours 5 machines rooted, with 5 slept.
- This is the template used for my exam report.
- Report done in 4 hours.