, 19 tweets, 9 min read
My Authors
Read all threads
OSCP Review, Resources, and Tips

Hy Guys, I have got lots DMs relates review and preparation. So now I'll try to cover important points in this short OSCP review.

P.S: I'm noob and this review is based on my experience and methodology in OSCP.
(1/18)
#oscp #offsec
(2/18)
I have encountered lot of people who told me that "I'll first learn all the aspects/skills required for OSCP and when i feels that I'm ready, Then I'll purchase the lab".
When I have purchased lab, I was also Not Ready. But this lines from Dr. Strange Movie motivated me.
(3/18)
If you have solved enough machines of Vulnhub and HackTheBox, You don't have to worry about anything.
Just Go for It.

OSCP related Vulnhub and HackTheBox Machines share by @TJ_Null in his blog:
(4/18)
For Web Application Pentest, Focus more on OWASP 2013's Server-side Vulnerabilities.
In Below image, I have listed few Web Application top attacks/vulnerabilities which i think you have to more focus on.
(5/18)
Book I preferred when I started solving machines and building pentest methodology:

"Penetration Testing: A Hands-On Introduction to Hacking by @georgiaweidman "

amazon.com/Penetration-Te…
(6/18)
Below are the top blogs I followed for Priv Esc during OSCP Journey :-
Linux/Windows Enumeration blog by @GuifreRuiz :

guif.re/linuxeop
guif.re/windowseop

Linux Privilege Escalation blog by @payatulabs :
payatu.com/guide-linux-pr…
(7/18)
Windows Privilege Escalation blog by @FuzzySec :
fuzzysecurity.com/tutorials/16.h…
(8/18)
Now come to Python for scripting/automation😍:
Videos: "Complete Python Bootcamp: Go from zero to hero in Python 3"
udemy.com/course/complet…

Book: "Think Python - How to Think Like a Computer Scientist"
greenteapress.com/wp/think-pytho…
(9/18)
Pivoting/Port Tunneling
"PWK Notes: Tunneling and Pivoting" by @0xdf_
0xdf.gitlab.io/2019/01/28/pwk…

"Explore Hidden Networks With Double Pivoting" by @m3karadag
pentest.blog/explore-hidden…
(10/18)
And the last but not least, To whom most of people feared, but trust me its so much easy. Its like @offsectraining is giving you 25 points free😉 - Win32 BUFFER OVERFLOW😐 :-
(11/18)
I have followed Chapter No. 16 & 17 of "Penetration Testing - A hands-on introduction to Hacking" to better understand Buffer Overflow concepts.
But in above book of @georgiaweidman , Finding Bad Characters is not covered,
(12/18)
Now you can go through her blog for "Finding Bad Characters with Immunity Debugger and Mona.py"
bulbsecurity.com/finding-bad-ch…
(13/18)
Although I have also written blog on Win32 Buffer Overflow i.e "10 Easy Steps to Exploit Basic Stack-Based Buffer Overflow"
medium.com/@loopspell/10-…
(14/18)
Daily read at least 2-3 vulnerable machines walkthrough.
You can go through blog of @0xdf_ :
0xdf.gitlab.io

And for video, i would suggest Youtube channel of @ippsec :
youtube.com/channel/UCa6eh…
(15/18)
Tips
1) Its an Always easy, if you solved enough machines of Lab then focus on what you already know. Don't make things over-complicated.
2) Try to solve Lab machines more than one way.
3) Use mona.py for Finding Bad Characters, it will save lot of time.
(16/18)
4) Start enumeration with top 5 services first.
5) Read and watch OSCP Course Material carefully.
6) Take break every 2 hour during exam and drink lots of water (I got sick during exam😬)
7) Enumerate well if stuck, start again from basics.
(17/18)
And below is the blog that I have followed to set every day target during Lab time:
arvandy.com/category/oscp/

That All from my side.
Reply to this thread if you want to add something.
If you face any problem relates to Resources😉 then DM me.
(18/18)
Remember one line:
"OSCP is the Journey, not a Destination"
Try Harder

#loopspell1
Tip 8) Keep yourself update with latest linux privilege escalation technique/exploit
Missing some Tweet in this thread? You can try to force a refresh.

Enjoying this thread?

Keep Current with loopspell

Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

Twitter may remove this content at anytime, convert it as a PDF, save and print for later use!

Try unrolling a thread yourself!

how to unroll video

1) Follow Thread Reader App on Twitter so you can easily mention us!

2) Go to a Twitter thread (series of Tweets by the same owner) and mention us with a keyword "unroll" @threadreaderapp unroll

You can practice here first or read more on our help page!

Follow Us on Twitter!

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just three indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3.00/month or $30.00/year) and get exclusive features!

Become Premium

Too expensive? Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal Become our Patreon

Thank you for your support!