Strange Security

Exploring the Strangeness of Security !

View on GitHub

Table of Contents

My OSCP Exam Adventure

Introduction:

As a second-year college student with no prior hacking experience, I was unsure of what I wanted to do in the future. I was searching for different fields to pursue when I came across the Offensive Security Certified Professional (OSCP) certification. Intrigued by the reputation and the exam structure, I was thinking how cool are those guys who had passed it and another thing that attracted me was the certificate and wallet card that offsec gave to the holders at that time (I know its immature but I felt bit sad when i got to know that that i won’t be getting those but still having skill was more important from a career point of view.) So after researching about the field i found different courses and platforms to prepare for oscp. But i wasn’t consistent as i had my college studies too and also i had a habbit of procrastination so time went and after a year my graduation was completed and i had job offer but didn’t want to go for that. So i decided to start preparing for oscp. So oscp is the reason I’m in this field. In this blog post, I will share my journey towards obtaining the OSCP certification, including the challenges I faced, the skills I acquired, and the lessons I learned along the way and i will share every resource that i used to learn and not just oscp but in general.

Before Enrollment Preparation:

Before Enrolling, I completed Practical Ethical Hacking course by TCMsecurity and it was enough to get hang of the things and i was also reading blogs by people on their oscp experience. After that i started with tryhackme to get hands on experience, it is the best platform for beginners. So after some time, i did only around 15 labs on tryhackme. Then i started with TJNull HTB machines for oscp. I was not able to do any machine without looking at walkthrough and kind of demotivated and didn’t have enough confidence and was able to do only around 20 machines including both windows and linux. Then i enrolled on HTB academy for Peneteration Tester path which covered almost every topic oscp had. After doing some important modules i was little confident that now i have what it takes to pass oscp. So after 2.5 months from the day i started preparing for oscp i enrolled for oscp on 2 dec 2022 with learn one subscription as it was on discount during that time.

My recommendations for pre-enrollment phase :

Post Enrollment Preparation:

So after enrolling, my plan was to go through videos and look for any new topic and get bonus points in a month by completing 80 % exercises and doing 1 machine a day. But as a wise man once said

“Nothing ever goes as planned in this accursed world”

As i started study material i didn’t find them useful to me then i moved on to doing exercises which was very tedious task so i skipped that for later and moved to PWK labs directly and i was doing fine for first 20 days even though i was not able to any machine without looking at hints and asking for help on discord but i was learning a lot but then i thought of taking a break (biggest mistake). Taking a break is not bad but it’s important to get back on track but i kind lost touch of that and wasted almost a month doing absolutely nothing (not exaggerating). I just wasn’t able to do anything and left everything to do for later and started thinking that i won’t be able to pass it and had lost of faith in myself that i had at the time of enrollment. Even though i was thinking about doing everyday but i couldn’t get myself to start the system and start doing practice actually and this made me more stressed. On 20 jan 2023 i scheduled my exam for 27 feb 2023 thinking that i might start doing things if i have some kind of pressure of exam being scheduled, it did had a little effect but i still wasn’t giving my best and after a week my system stopped working which gave me a reason to stop and i was back to my lazy schedule. I still remember on feb 18 2023 i started again with strong will of doing but when i started i felt totally blank like i was a beginner, i couldn’t process what i can i do in these 10 days. I was so stressed but still tried doing anything i could, I had already given up on getting bonus points as it was so irritating to start and stop VMs for every topic, i just couldn’t do it. So on 25 feb 2023 before 3 hours of loosing the chance to reschedule the exam, i rescheduled my exam for 6 march 2023 because i was not mentally ready. So in the last week i completed retired machines in labs, wasn’t able to do them without help and cleared my AD and pivoting concepts and i was literally feeling like a looser already.

Overview of 3 months:

My recommendations for Post Enrollment phase :

I just did one hard machine from pg practice 2 days before the exam day but it was quite straightforward and easy. So i don’t know much about it but many people recommend that too, so you can try it if you want.

Exam Day:

On exam day i had already thought that i’m going to fail so my plan was to get most of the day and get experience from the machines so that my preparation for second attempt is better. Exam started:

Exam Reporting:

After ending my exam i slept whole day and woke up at 7 PM and i had fever and headache that i had during exam too but after waking up it was much more than normal headache so i took medicine (even though i hate medicines). After that i took some rest and started writing my report at 9 PM. When i started it was a shock for me because that was the first time i am writing a report and template that offsec provided had some issue with formatting or i don’t know. It just didn’t work for me. So after checking editing it with different software, i changed the template and used another improved version of it here.

It was better than official and i could edit it, still not the way i wanted to but it was fine. In my report i explained everything from start to finish how i scanned and exploited anything and what my thought process was during any exploitation and pasted every command i found important to be written. I even included links to configure burp suite with firefox (i don’t know if i overdid it but i didn’t want of fail because of report).

Reporting Recommendations:

After i got My Results:

I submitted my report at 5:30 AM on 8 march and was relaxed but still feeling nervous about result as i knew i had scored passing points but still it all depends on my report whether it is good enough according to offsec. On 10 march around 5:50 PM i got my results at first i didn’t want to look at it but i mistakenly clicked it and saw what i wanted to.

My Overall Methodology and Recommendation:

At the end i would say the best way to become better is to take notes of whatever you are doing and practice everyday. I was not disciplined enough to do what my initial plan was but i still manage to pass the exam on first attempt, so you can too. I kind of gave too much importance to the exam rather than health but i knew i have the knowledge and skill required to pass the exam and i would say that its good to have passed the exam in first attempt but even if you don’t, it doesn’t mean that you don’t have enough skills or whatever. After submitting the report i felt that i deserve to pass the exam not because i scored required points but because i knew i was able to penetrate systems and find weakness in them. So What matters the most is how good your understanding is about a particular topic. I am still learning daily and will continue to do so as much i want.

And How i feel after passing, i know its just entry level cert but this is my first ever achievement in life so it feels so special. I used to think about those who passed oscp as “Cool guys” and now i am one of them, so yeah i can see the difference and it feels so good:

You can check my Notes and use it but i still encourage you to make your own cheatsheet.

My Notes — https://strange-1.gitbook.io/notes/

Connect with me

Twitter Medium LinkedIn HackTheBox TryHackMe GitBook

Resources for Learning:

Basic Pentesting Courses:

Windows Privilege Escalation:

Linux Privilege Escalation:

Active Directory:

Buffer Overflow:

Platforms to practice:

Useful sites:

Other Useful Resources:

Thank you for Reading…