I read the following books hands-on in preparation for the oscp:

· Metasploit — The Penetration Testers Guide

https://www.amazon.de/Metasploit-Penetration-Testers-David-Kennedy/dp/159327288X/ref=sr_1_2?__mk_de_DE=%C3%85M%C3%85%C5%BD%C3%95%C3%91&keywords=Metasploit+-+The+Penetration+Testers+Guide&qid=1566070989&s=books-intl-de&sr=1-2

· Penetration Testing a Hands-On Introduction to Hacking

https://www.amazon.de/Penetration-Testing-Hands-Introduction-Hacking/dp/1593275641

· Hacking the art of exploitation

https://www.amazon.de/Hacking-Art-Exploitation-Jon-Erickson/dp/1593271441

· The Web Application Hackers Handbook

https://www.amazon.de/Web-Application-Hackers-Handbook-Exploiting/dp/1118026470

PRE PWK LAB

I spent some time watching Ippsec videos and taking notes, hacking my way into some HTB retired boxes and Vulnhub machines

Here is a list of some of the retired HTB and Vulnhub boxes I had practiced with:

PWK LAB

I purchased the 90 days lab and in four days I rooted 4 boxes with the aid of Metasploit and I was having my yeah “I could smash this” feeling, next 2 weeks 6 boxes I was being humbled real time and doubts began to creep in while my graduate program winter semester exams was in less than a month. I knew if i had lost myself at that point I was going to sink and my only option was to TRY HARDER. I joined the OSCP study group where they often share some useful oscp resources, i began to research more but my first 30 days in the lab was really about getting to find my feet in the lab, during this period i was going through the course pdf material, videos and took good notes.

ENUMERATION IS KEY

The amount of time and research that the OSCP requires cannot be overstated, enumeration is always the key. At day 60 I rooted almost 30 boxes in the lab unlocked the Admin, Dev and IT network and at the end of lab period I rooted more than 45 boxes in the lab including all public network boxes.

EXAM ATTEMPTS 1–5

My first exam attempt I didn’t get enough points 2 root 2 user shells (25,10,10,10) and FAILED 55 POINTS, exam attempt 2 same points and I didn’t send in report FAILED 55 POINTS, EXAM attempts 3 and 4 same points sent in report.

I took some time out to research and practice more on HTB and Vulnhub. My 5th attempt 3 root shell (20,10,25) and user shell on 25 point box I FAILED WITH 65 POINTS because i did not send in my lab report but there was still a gap in my knowledge and i was really down for 10 weeks researching and practicing until my next attempt.

LAST ATTEMPT 6

This time I didn’t jump straight into the exams again because I knew I was so close to passing on my previous attempt and I needed to guarantee that I’d pass so instead i extended the lab for 15 day period so I could complete my lab report and obtain those valuable 5 points. I spent days doing the lab exercises and lab report i completed all the exercises and report in less than 10 days and i reviewed every page until I was satisfied with my documentation, I scheduled my exams 2 days after.

MY EXAM PLAN AS USUAL WAS:

· Start with the BOF machine while scanning other machines using Autorecon tool

· Take break whenever i need to, go for the 10 points machine then 20 points machine

· Finally 25 points and 20 points machine

TIME MANAGEMENT PLAN

From my previous attempts/experience i understood that the exam can sometimes be fuzzy if you do not have proper time management plan, so i developed mine just like many others have, i spent the maximum of 3 hours on a machine or atleast 2 hours before moving to the next (i took notes so i could easily refer to where exactly i left off previously).

After 23 hours of the exam I had rooted 4 out 5 exams machines (25 point, 10 point, 20 point, 25 point) with 80 points I already knew I had enough points to pass, I arranged my screen shots and documentation on my kali cherrytree app. I spent the next 24 hours carefully documenting my exam report, did the necessary proof reading and sent in my exam report and lab report.

THE PAINFUL AND ANXIOUS WAIT FOR THE EXAM RESULT

With the offsec team at DEFCON 27 and I had to wait longer than 10 days working days for my result to come in and oh boy the wait?! it is what it is lol.

Waiting! Waiting!! Waiting!!! Waiting!!!!

Finally i recieved the email and that i’ve have passed my oscp. YESSSSS!!!

What’s next for me?

For me with oscp off my list the journey has just began, I’ll be preparing for the AWAE and OSCE next.

HERE ARE SOME USEFUL OSCP RESOURCES:

https://vulp3cula.gitbook.io/hackers-grimoire/post-exploitation/privesc-linux

https://recipeforroot.com/page/2/?utm_source=share&utm_medium=ios_app

https://toshellandback.com/2015/11/24/ms-priv-esc/

http://www.fuzzysecurity.com/tutorials/16.html

https://vulp3cula.gitbook.io/hackers-grimoire/post-exploitation/privesc-linux

http://pwnwiki.io/#!privesc/linux/index.md

https://in.security/lin-security-walkthrough/

https://www.absolomb.com/2018-01-26-Windows-Privilege-Escalation-Guide/

https://rastating.github.io/how-i-hacked-bobby/

https://payatu.com/guide-linux-privilege-escalation/

https://github.com/krouser/pen_test_tools_script_resources