Pentest Notes
  • 🏠/home/x3m1Sec/.pt-notes
  • 📝Pentest Notes
    • 🔍Information Gathering
    • 📜Protocols and Services
      • DNS
      • FTP
      • IMAP
      • IPMI
      • MSSQL
      • MySQL
      • NFS
      • Oracle TNS
      • POP3
      • RDP
      • SMB
      • SMTP
      • SNMP
    • 🕸️Web Applications
      • Web Attacks
        • Cross Site Scripting (XSS)
        • SQL Injection (SQLi)
        • File Upload Vulnerabilities
        • Insecure Direct Object References (IDOR)
        • OS Command Injection
        • Local File Inclusion (LFI)
        • Remote File Inclusion (RFI)
        • XML External Entities (XXE)
        • HTTP Verb Tampering
      • Web Technologies
        • Tomcat
        • CGI Applications
        • WordPress
        • SAP Netweaver
        • Joomla
        • Drupal
        • Gitlab
        • Jenkins
        • Microsoft IIS
        • osTicket
        • PRTG Network Monitor
        • Splunk
      • Fuzzing
    • 📂Active Directory
      • Initial Access
      • Internal Enumeration & Lateral Movement
      • Privilege Escalation to Domain Admin using Known Exploits
      • Domain Trusts
    • 🐧Linux Privilege Escalation
      • Enumerating Attack Vectors
      • Privileged Groups
      • Environment Variables Abuse
      • Capabilities Abuse
      • Programs, Jobs and Services
      • Miscellaneous Techniques
      • Recent CVEs
    • 🪟Windows Privilege Escalation
      • Enumerating Attack Vectors
      • Excessive User Rights Abuse
      • Built-in Groups Abuse
      • File System ACLs
      • Services Hijacking
      • User Account Control (UAC) Bypass
      • Living off the Land
    • 🐛Bug Bounty Hunting
      • Bug Bounty Tools
    • 👾Utilities, Scripts and Payloads
      • Shells and Payloads
      • Metasploit Framework
      • File Transfers
      • Pivoting, Tunneling, Port Forwarding
      • Password Attacks
      • Spawn TTY Shells
  • 🎮CTFs
    • 🟩Hack The Box
      • Busqueda
      • Help
      • Sau
      • Updown
      • Broker
      • Monitored
      • Sea
      • Nibbles
    • 🔴TryHackMe
  • 🎓Road to certification
    • eJPTv2
      • My review
    • CPTS
      • CheatSheet
    • OSCP
      • OSCP Preparation
      • Cheatsheets
Powered by GitBook
On this page
  • Overview
  • Certification Details
  • Skills Validated
  • Penetration Testing Methodology
  • Exploitation
  • Post-Exploitation
  • Scripting and Tooling
  • Reporting
  • Preparation Resources
  • Official
  • Community & Practice Platforms
  • Exam Tips
  • Career Benefits
  • My Certification Journey
  • Study Plan
  • Tools & Scripts
  • Notes
  1. Road to certification

OSCP

Overview

The Offensive Security Certified Professional (OSCP) is a well-respected and challenging certification offered by Offensive Security. It validates a candidate's ability to perform penetration tests in real-world scenarios through a fully hands-on exam. The OSCP is widely recognized in the industry as a benchmark for practical offensive security skills.


Certification Details

  • Issuing Organization: Offensive Security

  • Difficulty Level: Intermediate to Advanced

  • Exam Format: 24-hour hands-on practical exam + 24 hours for report submission

  • Exam Environment: VPN-based isolated lab with multiple machines and networks

  • Exam Requirements: Minimum 70 points out of 100 (including a full report)

  • Prerequisites: Strong foundation in networking, Linux/Windows systems, and basic scripting

  • Validity: Lifetime certification


Skills Validated

The OSCP certifies the ability to perform the following:

Penetration Testing Methodology

  • Information gathering

  • Enumeration and service analysis

  • Attack surface mapping

Exploitation

  • Manual and automated exploitation of vulnerabilities

  • Buffer overflow exploitation (custom 32-bit Windows BOF)

  • Privilege escalation in Linux and Windows environments

  • Client-side attacks and file transfer techniques

Post-Exploitation

  • Lateral movement

  • Pivoting and tunneling using tools like SSH, ProxyChains, or Chisel

  • Cleanup and operational security

Scripting and Tooling

  • Bash and Python scripting for automation

  • Custom payload crafting

  • Use of standard tools like Nmap, Netcat, Metasploit (limited), and CrackMapExec

Reporting

  • Clear, structured documentation of findings

  • Full walkthroughs for each compromised machine

  • Proof of exploitation and remediation recommendations


Preparation Resources

Official

  • PWK Lab Machines and Exercises

  • OS-Check tool for exam readiness

  • OffSec forums and Discord

Community & Practice Platforms

  • Hack The Box (TJNull’s OSCP-like list)

  • TryHackMe: "Offensive Pentesting", "Buffer Overflow Prep"

  • Proving Grounds (Play & Practice)

  • VulnHub: Machines like Brainpan, Mr. Robot, Beelzebub

  • PortSwigger Web Security Academy


Exam Tips

  • Enumeration is key: Thorough recon often reveals the attack path.

  • Time Management: Plan your 24 hours; avoid rabbit holes.

  • Stick to the Methodology: Follow the OffSec-provided approach.

  • Documentation: Take screenshots, note commands, and generate the report in real time.

  • Don't panic: Stay calm and structured — persistence wins.


Career Benefits

The OSCP provides major advantages in the cybersecurity field:

  • Recognized proof of real-world offensive skills

  • Boosts employability for roles like Pentester, Red Team Operator, Security Consultant

  • Strong addition to resumes, especially for consulting firms and MSSPs

  • Opens doors for further certs (OSWA, OSEP, OSED, etc.)

  • Builds confidence in ethical hacking methodologies and tools


My Certification Journey

This section will be updated after completing the certification.

  • Start Date: [Insert Date]

  • Goal Exam Date: [Insert Date]

  • Status: 📘 Studying PWK | 🔬 Lab Practice 📝 Report Practice


Study Plan

  • ✅ Complete all PWK modules and exercises

  • 🔄 Root at least 40+ PWK lab machines

  • 🔁 Weekly HTB machines from OSCP-like list

  • 🧠 Daily Buffer Overflow practice

  • 📑 Develop and refine reporting template

  • 📅 Simulate 24h mock exams at least twice

  • 🛠 Improve scripting skills (Bash, Python)

  • 🔒 Review OpSec and cleanup techniques


Tools & Scripts

  • Nmap, Gobuster, Feroxbuster

  • LinPEAS / WinPEAS

  • Chisel, ProxyChains, Impacket

  • CrackMapExec, BloodHound, Evil-WinRM

  • Custom Python and Bash enumeration scripts


Notes

  • Avoid overusing Metasploit — limit to one machine during the exam

  • Use keepnote, CherryTree, or Obsidian to organize documentation

  • Always validate proof.txt flags and take screenshots

  • Respect OffSec’s code of conduct and exam rules

PreviousCheatSheetNextOSCP Preparation

Last updated 10 days ago

Read and follow the closely

🎓
OffSec PEN-200 Course (PWK: Penetration Testing with Kali)
Exam Guide