Ansh Bhawnani Profile picture
Information Security Researcher and a student.
Aug 25, 2022 5 tweets 2 min read
LEARNING OSCP: Day #8
Initial Access tips #1
1. Don't rely on a single wordlist. I had instances where I couldn't find a hidden directory with dirbuster list, I got it when I ran with the dirb big.txt.
2. Don't forget to add extensions to directories: php, txt, html, etc.
#oscp 3. Try default passwords on every login function, ftp, ssh, mysql, smb, webdav, pop, etc. Search for the default creds for a specific web software and try to apply an educated guess if the original ones don't work.
4. Always check the source code, for usernames, passwords, etc.
Jul 30, 2022 9 tweets 4 min read
LEARNING OSCP: Day #7

Rooted a whole AD domain.

I will share my methodology. There are multiple paths and ways to gain access and move laterally, multiple tools and techniques will work.

I must say the AD in OSCP is pretty easy and straightforward.

#oscp #infosec For initial access:
1. Start with the box having a web server, it is the most common path.
2. Use revshells.com for powershell payloads, I prefer the base64 one
3. Just remember Windows prefers '\' rather than '/', don't mess up the syntax. (C:\Users and not C:/Users)
Jun 28, 2022 13 tweets 3 min read
LEARNING OSCP: Day #2

Finished watching all the course videos. Took me 10 days, with about an hour a day, at 2x speed.

It starts from the basics, but elevates real fast. You'll learn about using Kali Linux, and the bash environment (a complete module for that).

#oscp #infosec It will teach you about connection tools like netcat/socat/PowerShell/Powercat, and using them practically for file transfers, reverse/bind listeners, and channelizing I/O.

We also learn to make simple bash scripts for automation. You'll have practical exercises for each module.