CTF-Difficulty
OSCP-Exam-Report-Template
CTF-Difficulty | OSCP-Exam-Report-Template | |
---|---|---|
18 | 9 | |
717 | 913 | |
- | - | |
0.0 | 0.0 | |
over 1 year ago | almost 3 years ago | |
- | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
CTF-Difficulty
- Books for pentesting and bug Bounty
- TryHackMe a good starting point?
- MEGATHREAD FOR NOOBS - RESOURCES FOR LEARNING AND SOLVING PROBLEMS
- Additional resources for a Megathread for Noobs?
-
Wie startet man in die IT Sicherheitsbranche?
Tutorials anschauen zb. https://www.hackingarticles.in/ Hackthebox, Kali Proving grounds oder tryhackme.com
- Best Web Application Security Training/Tutorial/Certificate for someone who already has OSCP but would like to go a bit more into web and has an annual budget of 5k to spend on any training?
- What’s a better way to get my foot in the door, tryhackme or hackthebox?
- Starting to learn cyber security
- HacktheBox as a training course/academy?
- Free sources for Hacking (Posting my comment that had so many upvotes)
OSCP-Exam-Report-Template
-
Passing the OSCP in 8 hours(as a high school student)
I had never done any formal pentesting reports like this one, so I kind of learned it on the fly. The whoisflynn template came in clutch for me, since I just had to follow the instructions laid out and copy paste whatever I needed to. Don’t underestimate this part of the exam, and do some planning beforehand to make sure you’re comfortable and have enough time. There isn’t an upper limit to detail in the report, and I was sure I was very detailed in my writeups.
- 22 Hours Later
-
Really bad exam experience, don't wanna take it again?
Was easy to be honest. The way I work was to create reports for all boxes I did in the PWK, proving grounds and HTB as if they were real engagements. I used a template in Joplin I found here https://github.com/whoisflynn/OSCP-Exam-Report-Template. During my practice I would document my findings as I went through and edited out things I didn't need.
-
Passed second try, my thoughts
As for the report, I used this template, and removed most sections such as remediation, and added another section for common tools that I used that needs to leave a link to (i.e. Nishang's repo, Feroxbuster, AutoRecon, etc.)
- Une petite demande concernant les spécialistes en cybersécurité
- I passed OSCP, and here is how you should(nt) do it
-
everything i need to know :3
I used https://github.com/whoisflynn/OSCP-Exam-Report-Template for my report
- Report format for OSCP
-
OSCP report
I had the same thing, the template looks very differently from what I would've done on my own. In the end I decided to follow the template (or more specifically, this version, since it made more sense to me) as closely as possible, only diverging when I had to, for instance when there were certain vulnerabilities I had to exploit before I could do the actual exploit that I used to obtain a shell, but that didn't allow me to obtain a shell themselves directly. In those cases I put those explanations in the initial description.
What are some alternatives?
OSCP-Notes-Template - A template Obsidian Vault for storing your OSCP revision notes
OSCP-Exam-Report-Template-Markdown - :orange_book: Markdown Templates for Offensive Security OSCP, OSWE, OSCE, OSEE, OSWP exam report
caldera - Automated Adversary Emulation Platform
AutoRecon - AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.
Wazuh - Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
EZEA - EZEA (EaZy Enum Automator), made for OSCP. This tool uses bash to automate most of the enumeration proces
can-i-take-over-xyz - "Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.
nmapAutomator - A script that you can run in the background!
oh-my-git - An interactive Git learning game!
SUDO_KILLER - A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges on the system, essentially allowing a regular user to execute commands as the root user.
PEASS-ng - PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
alacarte