Skip to content
lethanhtung01011980 edited this page Dec 30, 2019 · 13 revisions

Exam guide

Ref:

We restrict the use of Metasploit on some of the exam challenges, and require documentation of your attack. You will be sent exam instructions with details on which challenges permit metasploit use.

  • Using Metasploit to generate shellcode, or using the msf handler is NOT considered "using Metasploit".
  • You can use any payload you wish on any of the exam machines, including meterpreter.
  • You may only use 'getsystem' or similar privilege escalation commands inside meterpreter on machines which do not explicitly forbid Metasploit usage.

Restriction clarification

  • Multi-handler is totally free for use on as many machines as you fancy. Meterpreter payload is not.
  • All modules under exploit (EXCEPT multi-handler), post and auxiliary go under the same restriction as the meterpreter payload.

Btw, if you use staged payload and multi-handler, don't forget to specify the needed shell payload or it may give you meterpreter by default.

Am I allowed to use Nessus or similar scanners in the Exam ?

  • Nessus, NeXpose, OpenVAS, or any other mass vulnerability scanners may NOT be used in the OSCP exam. This includes commercial exploit packs such as Metasploit Pro, Canvas, and Core Impact. We also prohibit the use of sqlmap, sqlninja, or any other similar tools.
  • Single-target scanners such as DirBuster, Nikto or Metasploit's auxiliary modules are permitted to be used in the exam.

Exam experience 1

Exam experience 2

The OSCP Exam consists of 5 machines. You, the student, are provided with objectives and point values for each machine.

  • 25 point buffer overflow machine
  • 25 point behemoth riddled with rabbit holes
  • 2 x 20 point machines
  • 10 point machine

You are provided a 6th machine to perform your debugging for the buffer overflow:

What the Exam Machines are like

  • 1x10 pointer: this is easy boot to root machine. There will be a lot of ports open similar to Metasploitable but look for the unique service in a unique port. This took me 10 mins.
  • 2x20 pointer: These will be similar to HTB machines such as October, Popcorn, Shocker, Beep.
  • 2x25 pointer: One is Buffer Overflow and the other is a slightly harder, rabbit holed filled machine. Maybe Giddy, Jeeves.

Virtual lab

Sidebar

0. COMMON exploits

1. Scan Info

1.2 Passive Gathering

1.3 Active Gathering

2. Pre-attack

2.2 File transfer

3. Get Reverse Shell

4. Exploits

4.2 Windows Exploits

4.3 Linux Exploits

4.4 Password crack

4.5 Buffer Overflow

4.6 Web attacks

6. Escalate Privilege

6.1 Escalate in Windows

6.2 Escalate in Linux

7. Access and further attacks

8. Port redirection and Tunnelling

9. Metasploit

10. Kali

11. Thirdparty scripts

Clone this wiki locally