OSCP- One Page Repository
Hands on challenge to get comfortable with Linux:
Now move to vulnerable machines. There are two main websites for practice on vulnerable machines. Hackthebox machines and Vulnhub Machines. There are multiples infosec guys who has written blogs related to these machines for community. First thing you need to do, read blogs for 5 machine and try to understand the approach for start on these machines.
TjNull has shared a list which has OSCP related boxes.
Most of the time in OSCP you will need to use a public exploit on your target to see if you can obtain a shell on it. With that exploit you may need to modify shellcode or even parts of the exploit to match with your system to obtain a connection from your target.
There are multiple ways to transfer the files from attacker system to target system.
- Python Server
- SCP - SSH
- For Practice:-
- Windows Binaries (Recommend that you run these on Windows 7/XP 32 bit):
- Windows Privilege Escalation
- Windows Priv checker
I got some content from these below OSCP guides.
- Other Links: