LEARNING OSCP: Day #8
Initial Access tips #1 1. Don't rely on a single wordlist. I had instances where I couldn't find a hidden directory with dirbuster list, I got it when I ran with the dirb big.txt. 2. Don't forget to add extensions to directories: php, txt, html, etc. #oscp3. Try default passwords on every login function, ftp, ssh, mysql, smb, webdav, pop, etc. Search for the default creds for a specific web software and try to apply an educated guess if the original ones don't work. 4. Always check the source code, for usernames, passwords, etc.
Jul 30, 2022 • 9 tweets • 4 min read
LEARNING OSCP: Day #7
Rooted a whole AD domain.
I will share my methodology. There are multiple paths and ways to gain access and move laterally, multiple tools and techniques will work.
I must say the AD in OSCP is pretty easy and straightforward.
#oscp#infosec
For initial access: 1. Start with the box having a web server, it is the most common path. 2. Use revshells.com for powershell payloads, I prefer the base64 one 3. Just remember Windows prefers '\' rather than '/', don't mess up the syntax. (C:\Users and not C:/Users)
Jun 28, 2022 • 13 tweets • 3 min read
LEARNING OSCP: Day #2
Finished watching all the course videos. Took me 10 days, with about an hour a day, at 2x speed.
It starts from the basics, but elevates real fast. You'll learn about using Kali Linux, and the bash environment (a complete module for that).
#oscp#infosec
It will teach you about connection tools like netcat/socat/PowerShell/Powercat, and using them practically for file transfers, reverse/bind listeners, and channelizing I/O.
We also learn to make simple bash scripts for automation. You'll have practical exercises for each module.