Pentest Notes
  • 🏠/home/x3m1Sec/.pt-notes
  • 📝Pentest Notes
    • 🔍Information Gathering
    • 📜Protocols and Services
      • DNS
      • FTP
      • IMAP
      • IPMI
      • MSSQL
      • MySQL
      • NFS
      • Oracle TNS
      • POP3
      • RDP
      • SMB
      • SMTP
      • SNMP
    • 🕸️Web Applications
      • Web Attacks
        • Cross Site Scripting (XSS)
        • SQL Injection (SQLi)
        • File Upload Vulnerabilities
        • Insecure Direct Object References (IDOR)
        • OS Command Injection
        • Local File Inclusion (LFI)
        • Remote File Inclusion (RFI)
        • XML External Entities (XXE)
        • HTTP Verb Tampering
      • Web Technologies
        • Tomcat
        • CGI Applications
        • WordPress
        • SAP Netweaver
        • Joomla
        • Drupal
        • Gitlab
        • Jenkins
        • Microsoft IIS
        • osTicket
        • PRTG Network Monitor
        • Splunk
      • Fuzzing
    • 📂Active Directory
      • Initial Access
      • Internal Enumeration & Lateral Movement
      • Privilege Escalation to Domain Admin using Known Exploits
      • Domain Trusts
    • 🐧Linux Privilege Escalation
      • Enumerating Attack Vectors
      • Privileged Groups
      • Environment Variables Abuse
      • Capabilities Abuse
      • Programs, Jobs and Services
      • Miscellaneous Techniques
      • Recent CVEs
    • 🪟Windows Privilege Escalation
      • Enumerating Attack Vectors
      • Excessive User Rights Abuse
      • Built-in Groups Abuse
      • File System ACLs
      • Services Hijacking
      • User Account Control (UAC) Bypass
      • Living off the Land
    • 🐛Bug Bounty Hunting
      • Bug Bounty Tools
    • 👾Utilities, Scripts and Payloads
      • Shells and Payloads
      • Metasploit Framework
      • File Transfers
      • Pivoting, Tunneling, Port Forwarding
      • Password Attacks
      • Spawn TTY Shells
  • 🎮CTFs
    • 🟩Hack The Box
      • Busqueda
      • Help
      • Sau
      • Updown
      • Broker
      • Monitored
      • Sea
      • Nibbles
    • 🔴TryHackMe
  • 🎓Road to certification
    • eJPTv2
      • My review
    • CPTS
      • CheatSheet
    • OSCP
      • OSCP Preparation
      • Cheatsheets
Powered by GitBook
On this page
  • 🏆 OSCP Preparation
  • OSCP+ Certification Exam Guide
  • 📑 Introduction
  • 🔧 Exam Structure
  • 📝 Exam Requirements
  • 💻 Exam Connection
  • 🛠️ Exam Control Panel
  • 📃 Report Submission
  • Results
  • 🎯 Machines List
  1. Road to certification
  2. OSCP

OSCP Preparation

🏆 OSCP Preparation

  1. 📝 OSCP Guide

    1. Introduction

    2. Exam Structure

    3. Exam Requirements

      1. Documentation

      2. Exploit Code

      3. Documentation Rules

      4. Exam Restrictions

    4. Exam Connection

    5. Exam Control Panel

    6. Report Submission

    7. Results

OSCP+ Certification Exam Guide

📑 Introduction

The OSCP+ exam simulates a real network inside a private VPN with several vulnerable machines. You have 23 hours and 45 minutes to complete the exam. After that, you'll have another 24 hours to upload your documentation.

All exams are proctored. Review the proctoring manual and FAQ here: https://help.offsec.com/hc/en-us/sections/360008126631-Proctored-Exams

🔧 Exam Structure

Total Score: 100 points (minimum 70 to pass)

  1. 3 standalone machines (60 points total)

    • 20 points per machine:

      • 10 points for initial access

      • 10 points for privilege escalation

  2. 1 Active Directory (AD) set with 3 machines (40 points total)

    • You are given an initial user and password, simulating a breach scenario.

    • Scoring:

      • 10 points for machine 1

      • 10 points for machine 2

      • 20 points for machine 3

Examples of passing combinations:

  • 40 points in AD + 3 local.txt flags (70 points)

  • 40 points in AD + 2 local.txt + 1 proof.txt (70 points)

  • 20 points in AD + 3 local.txt + 2 proof.txt (70 points)

  • 10 points in AD + 3 fully compromised standalone machines (70 points)

🔄 Evaluation Order: The order in which you document machines in your report determines their evaluation order.

📝 Exam Requirements

📚 Documentation

You must write a professional report detailing the exploitation process for each target.

Must include:

  • All executed commands

  • Screenshots showing local.txt and proof.txt

  • Shell output showing the target IP address

  • Step-by-step instructions that can be replicated

📋 Exploit Code

If you used an unmodified exploit, only provide the URL. If modified, include:

  • The modified code

  • Original exploit URL

  • Shellcode generation commands (if applicable)

  • Explanation of the changes

🎨 Documentation Rules

  • All local.txt and proof.txt flags must be shown in screenshots with the IP visible

  • Use an interactive shell (cat or type) to display flags

  • In Windows, you must be SYSTEM, Administrator, or an administrator-level user

  • In Linux, you must be root

🔒 Exam Restrictions

Not allowed:

  • Automated exploitation tools (SQLmap, Nessus, Metasploit Pro, etc.)

  • Spoofing (ARP, DNS, NBNS, etc.)

  • AI or chatbots (ChatGPT, OffSec KAI, etc.)

  • Downloading files from the exam environment

Metasploit can only be used on one machine, and not for pivoting.

Allowed tools: Nmap, Nikto, Burp Free, DirBuster, among others.

💻 Exam Connection

  1. Download the connection pack from the link in your exam email

  2. Extract the files:

    tar xvfj exam-connection.tar.bz2
  3. Connect to the VPN with OpenVPN:

    sudo openvpn OS-XXXXXX-OSCP.ovpn
  4. Enter the username and password provided in the email

🛠️ Exam Control Panel

From the panel, you can:

  • Submit flags

  • Revert machines (up to 24 reverts, resettable once)

  • View each machine's specific objectives

📃 Report Submission

Submission checklist:

  • PDF format named OSCP-OS-XXXXX-Exam-Report.pdf

  • Compressed .7z archive without password: OSCP-OS-XXXXX-Exam-Report.7z

  • Maximum size: 200MB

  • Verify MD5 hash after uploading

Commands to generate and verify:

sudo 7z a OSCP-OS-XXXXX-Exam-Report.7z OSCP-OS-XXXXX-Exam-Report.pdf
md5sum OSCP-OS-XXXXX-Exam-Report.7z

Results

You will receive your results via email within 10 business days.

If additional info is required, you must provide it within 24 hours of the request. For technical issues during the exam, contact: Live Chat: https://chat.offsec.com

Email: help@offsec.com

🎯 Machines List

https://docs.google.com/spreadsheets/u/1/d/1dwSMIAPIam0PuRBkCiDI88pU3yzrqqHkDtBngUHNCw8/htmlview?pli=1# https://docs.google.com/spreadsheets/u/0/d/18weuz_Eeynr6sXFQ87Cd5F0slOj9Z6rt/htmlview#

PreviousOSCPNextCheatsheets

Last updated 11 days ago

Upload at:

🎓
https://upload.offsec.com