VulnableOne
  • 🧘‍♂️About Me
  • Offensive Treasure
    • 🧌Penetration Testing
      • Reconnaissance
        • Identify Ports/Hosts/Data
      • Enumeration
        • Service Ports
          • FTP (21)
          • SSH (22)
          • SMTP (25)
          • DNS (53)
          • TFTP (69/udp)
          • Finger (79)
          • SaMBa (139/445)
          • RPC/NFS (111/135)
          • SNMP (161/udp)
          • LDAP (389)
          • isakmp (500/udp)
          • Java (1099)
          • MS-SQL (1433)
          • MySQL (3306)
          • Distcc (3622)
          • PostgreSQL (5437)
          • Redis (6379)
      • Password Attack
        • Wordlist
        • Brute-Force
        • Crack Hash
      • File Transfer
        • Linux
        • Window
      • Misc
      • Theory
        • Nmap
        • Wireless
        • OSI Model - TCP/IP
        • R* Service
        • Hash
        • Solaris
        • SIP
        • Cisco Password Encryption
        • Time to Live
        • Windows
          • WMIC
          • IIS Version
          • Windows Version
          • Active Directory
        • Linux
        • Database
          • Page 7
          • MSSQL
          • PostgreSQL
          • MySQL
        • Asymmetric Encryption
        • Symmetric Encryption
        • Tools
        • ICMP
        • IP Address
        • VLAN
        • Acronyms
        • HTTP Status
        • HTTP Method
        • Protocol
        • Common Ports
    • 🧙‍♂️AD Attack
      • Domain Enumeration
        • PowerView
        • AD-Module
        • Bloodhound
      • Abuse ACLs
        • GenericAll
        • GenericWrite
        • WriteDACL
        • ForceChangePassword
      • Kerberos Attack
        • Kerberoasting
        • ASREPRoasting
        • Unconstrained Delegation
        • Constrained Delegation
        • Resource Based Constrained Delegation
      • LAPs
      • MS SQL Servers
        • PowerUpSQL
        • SQL Server Management
        • Impacket-MSSQL
    • 🥷Red Team
      • Reconnaissance
        • Active Scanning
          • Scanning IP Blocks
          • Vulnerability Scanning
          • Wordlist Scanning
        • Gather Victim Host Information
          • Software
        • Gather Victim Identity Information
          • Credentials
          • Email Addresses
        • Search Open Websites/Domains
          • Social Media
          • Search Engines
          • Code Repositories
        • Search Victim-Owned Websites
      • Resource Development
        • C2 Infrastructure
        • Metasploit
      • Execution
        • Bash - Reverse Shell
        • HTA
        • JScript Dropper
        • Macro
        • Metasploit
        • Network Tools
        • Powershell
        • Python
        • VBA
        • Web Shell
        • WSH
      • Persistence
        • Logon Script
        • Startup Folder
        • WinLogon (Elevated)
        • Run / RunOnce (Elevated)
        • Scheduled Tasks (Elevated )
      • Privilege Escalation
        • Windows
          • SeBackup / SeRestore
          • SeTakeOwnership
          • SeImpersonate / SeAssignPrimaryToken
          • UAC Bypass
          • AutoInstall Elevate
          • Unquoted Service Paths
          • Weak Service Permissions
          • Weak Service Binary Permissions
        • Linux
          • Escalation
      • Defense Evasion
        • Bypassing AV
          • Pack Shellcode
        • Security Control
          • CLM
          • AppLocker
        • Use Alternate Authentication Material
          • Pass The Hash
          • Over Pass The Hash
          • Extract Tickets
          • Pass The Ticket
        • Impersonate
      • Credential Access
        • Adversary-in-the-Middle
          • LLMNR/NBT-NS/MDNS Poisoning
          • Evil SSDP
        • OS Credential Dumping
          • Protected LSASS
          • Invoke-Mimikatz
          • Mimikatz.exe
          • Secretsdump
          • Meterpreter Kiwi
          • Registry
          • Shadow Copy
          • DCSync
        • Steal or Forge Kerberos Tickets
          • Silver Ticket
          • Golden Ticket
        • Steal Web Session Cookie
      • Lateral Movement
        • Remote Access
        • Pivoting
          • Linux
          • Window
    • Web Application
      • Basic Recon
  • Blog
    • 📝Empty!!!
  • Course Review
    • 👨‍🎓Cyber Security Courses Journey
      • PNPT Journey
      • OSCP Journey
        • 🚩CTF
          • Hack The Box
            • Linux Boxes
              • ✅Admirer (Easy)
              • ✅Bashed (Easy)
              • ✅Beep (Easy)
              • ✅Blocky (Easy)
              • ✅FriendZone (Easy)
              • ✅Irked (Easy)
              • ✅Lame (Easy)
              • ✅Mirai (Easy)
              • ✅Networked (Easy)
              • ✅Nibbles (Easy)
              • ✅OpenAdmin (Easy)
              • ✅Sense (Easy)
              • ✅Shocker (Easy)
              • ✅Sunday (Easy)
              • ✅Tabby (Easy)
              • ✅Traverxec (Easy)
              • ✅Valentine (Easy)
              • ✅Cronos (Medium)
              • ✅Haircut (Medium)
              • ✅Jarvis (Medium)
              • ✅Magic (Medium)
              • ✅Nineveh (Medium)
              • ✅Node (Medium)
              • ✅Poison (Medium)
              • ✅SolidState (Medium)
              • ✅TartarSauce (Medium)
            • Window Boxes
              • ✅Arctic (Easy)
              • ✅Active (Easy)
              • ✅Blue (Easy)
              • ✅Bounty (Easy)
              • ✅Devel (Easy)
              • ✅Forest (Easy)
              • ✅Granny (Easy)
              • ✅Granpa (Easy)
              • ✅Jerry (Easy)
              • ✅Legacy (Easy)
              • ✅Optimum (Easy)
              • ✅Bastard (Medium)
              • ✅Silo (Medium)
          • Buffer Overflow
            • BOF - Tib3rius
            • BOF - TCM
              • 1- Spiking
              • 2- Fuzzing
              • 3- Finding Offset
              • 4- Overwriting EIP
              • 5- Finding Bad Characters
              • 6- Finding the Right Module
              • 7- Generating Shellcode
Powered by GitBook
On this page
  • Introduction
  • Resource for Preparation
  • Contents
  • My Progress and Some Tips
  • #1 Attempted Failure
  • #2 Attempted Success
  • Conclusion
  1. Course Review
  2. Cyber Security Courses Journey

OSCP Journey

PreviousPNPT JourneyNextCTF

Last updated 7 months ago

Introduction

I want to share my journey while taking with Active Directory Environment. This post is described my journey while studying for OSCP. Everyone will have their own way or experience with Network / Web Application / SystemAdmin skills. So, the preparation and learning path will be various from one to other. I just want to share some resource that could be helpful for other which has no idea what to do before registering for OSCP.

You will never be ready. Start doing it Now.

Resource for Preparation

Before enrolling in the OSCP, I played a lot of machines which are the CTF machine's style.

  • - Subscribe 14$/Month

  • - Free (daily 3 hours per day)

  • - Subscribe 20$/Month

  • - Free

  • - Free

Contents

Yes, you're right. You can not crack all of those machines on that platform and you can not go without any information as well. You can check out the below resource:

  1. list of the machines you can work on before jumping into OSCP. He will categorize some of the machines for you. You can copy it to your own excel file and list down which machine you have done so far.

  2. , everyone mostly starts learning by watching IppSec's videos. He didn't just simply show you how to compromise the machine, but he shows you the mistake while compromising the machine. That's really good to know. He always brings new techniques to us.

    There is also a website by IppSec, which could allow you to search for abusing techniques and it will show you the video reference to that.

  3. and blog post on how to compromise those machines which also really help for me to learn different ways to compromise that box. Rana Khalil: 0xdf:

  4. 's course for and provided you with a solid understanding of how to find misconfigured on the system by automating tools and manually.

  5. Buffer Overflow is a really interesting topic. You can check out the content below from TCM Security and provided you with the walkthrough and explained clearly easy steps. TCM Security: Trib3rius:

  6. CheatSheet for an initial scan, enumerate, exploit, and privilege escalation. HackTricks: PayloadAllTheThings:

  7. The last one will be the walkthrough from Offensive Security (S1REN!). I really enjoy the way she compromised the box. Especially, the way she shares the tips and note-taking while enumerating the machines. Youtube:

You can go through all of the above contents first before enrolling in OSCP if you're not ready. Otherwise, you could register for OSCP directly if you are familiar with that topic.

If you have finished the OSCP course material and labs, but still do not yet feel ready, you can go through the above contents for practice.

No one could tell which way is better for you. Only you yourself to decide.

Stay in your lane. Run your own race.

My Progress and Some Tips

I am familiar with the command line on both Linux and Windows by learning day by day by learning from the IppSec video and compromised hack the box machine. Especially, I have already passed the PNPT certificate and that taught me a lot related to the Active Directory concept.

Once I feel ready, I have enrolled in OSCP (2months subscription) by the end of February. I would suggest going through all the course material along with the video. If you do not understand the concept from the text, you can watch it on video. Of course, the lab is important. There are a lot of machines in the lab environment and those machines contain different types of vulnerability which enabled us to learn of various attack paths.

Don't miss that PWK lab. Of course the Active Directory Part. Due to an exam, you have to encounter the Active Directory environment which will be 40 Points (Fully compromised). If you can't compromise that AD environment, you will have less chance to pass.

Why Active Directory part is important?

I will share this information to calculate your points for a passing score of 70/100.

* Bonus 10 Points

If you have completed the exercise above, you will learn a lot from that exercise and lab machines and of course, you will get 10 points bonus in advance.

As you can see, option number 4 will be the best one for us. You just need to compromise the AD environment in the exam and root 1 of the machines, you will secure your 70 points.

No need to be rushed, otherwise you will miss a lot of techniques that have been taught in PWK material and Labs.

While compromising each of the machines, I suggest writing down the attack path with an explanation like you're doing reporting. Yes right, it will take time. But it will help you a lot on exams, you will not miss your screenshot or feel nervous about the reporting part.

Report is the critical part of penetration testing process. It provides detailed information about the security issue and remediation part as well for Executive and Technical person.

You can check out my HackTheBox walkthrough. No need to follow my path, just get some ideas and generate your style of reporting.

HackTheBox Walkthrough:

#1 Attempted Failure

I have to spend around 6 hours (12 AM) to enumerate the Active directory but still not getting the right path to foothold. I decided to sleep (feeling given up already). I wake up at 6 AM to freshen up and start enumerating again. Suddenly I found the foothold right in front of me. "I'm thinking way too far".

I wrote down the attack path and pause for having breakfast and a cup of Café to boost my energy. By coming back, I can perform the lateral movement to the compromised full Active Directory.

For stand-alone machines, I could gain only 1 foothold on the machines. I could not perform privilege escalation on the machine.

Till the time rut out, I only compromised the full Active directory with (40 Points) and foothold on the machine (10 Points) plus my bonus 10 points. Totally, I just got 60 points which are really close to the passing score.

#2 Attempted Success

By my first attempt, I realized I was so rushed for the exam. I just started the exam once I completed my Lab time. So that my attack path will be less. I decide to subscribe to Proving Ground for 1 month and watch and learn from S1REN! walkthrough from Offensive Security. I realized that I have missed a lot of information such as note-keeping and techniques for quick calling commands to run and enumeration.

Again unplanned exam, after learning for the whole month, I think nothing is left for me to do. By just buying the voucher for another attempt, suddenly I saw scheduled on Saturday at 10 AM which is a free time slot. I decided to book the exam immediately.

For my first stand-alone machines, it just took me a few hours in order to fully compromise the machine. Now I have secured 60 points.

Unfortunately, I could not compromise the remaining machine. I decided to stop that and collect Proof of Concept for my reporting due to it just 2hours left for my exam time.

Once I've done my report part, I decided to revert those remaining machines. Then, my exploit worked !!! I realized that maybe my scanning process or I might have done something wrong to cause the machine error. Now, I have a secure passing score of 70 points.

I would suggest not to thinking way too far. You have limit of 24 reverts on exam environment. Make sure to use it if you feeling you're going on the right path.

Conclusion

You just started not ended !!!

By completing this course, you could have a lot of techniques for Penetration Testing when encountering Strange Service or Strange Environment, you will find a way to test it manually. You have concepts on how to find a vulnerability and smell the chain of attack once you see the misconfiguration.

Keep learning and Sharing back to the newcomer and the community.

Make sure to read the Exam Guide:

I failed my first attempt as I was confused about the Time Zone. I have booked at 11 AM, but actually, my exam time should be 6 PM. It really messes up my preparation feeling . Make sure you check your Time Zone and exam Time Zone properly.

On my 2nd attempt, it just got harder than my first time Again feeling like giving up By Trying Harder, I spent more than 10 hours in order to find a foothold in Active Directory Environment. This time I decide not to sleep. I go straight from a foothold and lateral movement to compromise the full Active Directory.

Finally, I have submitted my report. It just took 1days to get my results back.

👨‍🎓
😂
😂
😂
🎉
😍
🎉
https://help.offensive-security.com/hc/en-us/articles/360040165632-OSCP-Exam-Guide
Offensive Security Certified Professional (OSCP)
HackTheBox
Proving Ground Play
Proving Ground Practice
TryHackMe
Vulnhub
TJ_Null's
https://docs.google.com/spreadsheets/d/1dwSMIAPIam0PuRBkCiDI88pU3yzrqqHkDtBngUHNCw8/edit#gid=0
IppSec
https://www.youtube.com/@ippsec/featured
https://ippsec.rocks/?#
Rana Khalil
0xdf
https://rana-khalil.gitbook.io/hack-the-box-oscp-preparation/
https://0xdf.gitlab.io/
TCM security
Windows privilege escalation
Linux privilege escalation
Tib3rius
https://www.youtube.com/watch?v=qSnPayW6F7U&list=PLLKT__MCUeix3O0DPbmuaRuR_4Hxo4m3G
https://tryhackme.com/room/bufferoverflowprep
https://book.hacktricks.xyz/welcome/readme
https://github.com/swisskyrepo/PayloadsAllTheThings
https://www.youtube.com/watch?v=NQ6jbKqkJ0s&list=PLJrSyRNlZ2EeqkJa12Tu-Ezun9kXvHufN
https://vulnableone.gitbook.io/vulnableone/course-review/cyber-security-courses-journey/oscp-journey/ctf/hack-the-box/vulnableone.gitbook.io