Training Program
This page documents my main approach for OSCP preparation, meaning 2 to 6 months before registering for PWK. The three-pronged approach would be: Coding/Scripting + Learning Theory + Machines Practice
Last updated
This page documents my main approach for OSCP preparation, meaning 2 to 6 months before registering for PWK. The three-pronged approach would be: Coding/Scripting + Learning Theory + Machines Practice
Last updated
TJNULL Comprehensive Links -
Focus on Python & Bash scripting (Javascript to help web exploits for freetime)
For learning Python3/Javascript -
For practicing Python 3 or Bash or Java Script -
SQL Language - Codecademy
These sites with machines or challenges are listed from what an absolute beginner should start with, to the end, right before signing up for the PWK labs. An estimated total of 300 to 400 hours cracking machines along this route is a good target before attempting PWK labs, from what I've gathered from other cybersec community contributors like TCM, TJnull and others.
Over the wire (Linux system)
TryHackme (Beginner)
Vulnhub (Huge numbers of machines with walkthroughs)
root-me.org
HackTheBox + IppSec videos + Walkthroughs (Definitely not easy, even for those "easy" difficulties)
TJNulls HTB list to complete (Absolute essential to go through the boxes in this list)
PWK Proving Grounds (Practice and Play)
OSCP PWK Labs 90 days (Final)
Do entire PDF (800pages) + exercises (2 weeks to 1 month)
Lab writeup (free 5 points)
Do writeup for every machine you root
AD machines - must be good with windows
4 topics: Enumeration, Initial exploitation, Privilege Escalation (Windows & Linux), Buffer Overflow
Enumerate every gap ( etc. go buster on found directory leads to new directories --> recursive gobuster)
enumerate in background only
Check version service + vulnerability
ExploitDB, Github, Searchsploit, Blogs, google
Source code, netcat, enumeration tools
SQL Injection
Directory Transversal
LFI/RFI
PayloadAlltheThings
Pentest Monkey
Nishang
MSFVenom
Elevate from unprivileged to priv users
start off enumeration again: scripts to test possible weaknesses, kernel exploits
know how to run scripts and read output ***
Get familiar with immunity debugger
Process to get ingrained (6-10 steps)***
start with buffer overflow, mass scan the rest
keep good notes (cherrytree or obsidian)
take breaks
enumerate 100%
backup notes and machine in case VM breaks
Repo of public sample reports