EZEA
OSCP-Exam-Report-Template
Our great sponsors
EZEA | OSCP-Exam-Report-Template | |
---|---|---|
10 | 9 | |
91 | 913 | |
- | - | |
1.8 | 0.0 | |
almost 3 years ago | almost 3 years ago | |
Shell | ||
GNU General Public License v3.0 only | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
EZEA
- I passed OSCP, and here is how you should(nt) do it
-
5/5 full compromise. Rick Rolled the proctor. đ
Congrats bro, I personally like notion. And use tilix for terminal segmention. Made a bash script for enumeration: https://github.com/yassirlaaouissi/EZEA
-
Exam in 1 week, any last tips
I have my exam on thr 6th of june, 09:00, amsterdam time. I have the entire public PWK network done, 25 hackthebox machines from TJ Nulls list, 10 BOF machines, an automated enum tool (https://github.com/yassirlaaouissi/EZEA), all of my notes and a healthy amount of failure anxiety for the OSCP Exam. Did most of the boxes without hints, the 5 big ones and some hackthebox machines mostly needed hints on initial foothold for me.
-
Exam in <24 hours - Planning to fail. What do I do, study, or at least research?
I made a nice enum tool, use it: https://github.com/yassirlaaouissi/EZEA
-
Mid OSCP Update #2
The first two weeks of my labtime went to the course material (PDF and video). After that I spent a week or two on making an enumeration tool: https://github.com/yassirlaaouissi/EZEA
-
Tips and resources on pentesting methodology?
Many people make tools based on steps in the methodology. I've made a tool to auromate the enumeration step: https://github.com/yassirlaaouissi/EZEA
-
Just Failed First Attempt - BOF, and then NOTHING - HUH?
This is kinda self advertising, but trust me. It will save you time; I use this tool to enumerate my targets. Have done around 30 PWK boxes and 7 HTB machines with it so far: https://github.com/yassirlaaouissi/EZEA
-
Mid OSCP Update
I have been using my enumeration tool EZEA (https://github.com/yassirlaaouissi/EZEA), and so far I am not disappointed I spent time on it. If anyone has suggestions on how to make this tool better, or on how to practice buffer overflows, please do tell me. Have a nice day!
-
Made a nice OSCP enum tool
Made this tool based on several other tools that can simplify the enumeration proces for OSCP-like environments. Have rooted 8 boxes so far using this tool in 2 weeks time. Here is the link, let me know how you feel about it: https://github.com/yassirlaaouissi/EZEA
-
OSCP tips: Enumeration + time management
I've made an automatic enumerator for myself to prevent timeloss typing all commands from scratch during OSCP. Here it is, let me know what you think about it: https://github.com/yassirlaaouissi/EZEA
OSCP-Exam-Report-Template
-
Passing the OSCP in 8 hours(as a high school student)
I had never done any formal pentesting reports like this one, so I kind of learned it on the fly. The whoisflynn template came in clutch for me, since I just had to follow the instructions laid out and copy paste whatever I needed to. Donât underestimate this part of the exam, and do some planning beforehand to make sure youâre comfortable and have enough time. There isnât an upper limit to detail in the report, and I was sure I was very detailed in my writeups.
- 22 Hours Later
-
Really bad exam experience, don't wanna take it again?
Was easy to be honest. The way I work was to create reports for all boxes I did in the PWK, proving grounds and HTB as if they were real engagements. I used a template in Joplin I found here https://github.com/whoisflynn/OSCP-Exam-Report-Template. During my practice I would document my findings as I went through and edited out things I didn't need.
-
Passed second try, my thoughts
As for the report, I used this template, and removed most sections such as remediation, and added another section for common tools that I used that needs to leave a link to (i.e. Nishang's repo, Feroxbuster, AutoRecon, etc.)
- Une petite demande concernant les spécialistes en cybersécurité
- I passed OSCP, and here is how you should(nt) do it
-
everything i need to know :3
I used https://github.com/whoisflynn/OSCP-Exam-Report-Template for my report
- Report format for OSCP
-
OSCP report
I had the same thing, the template looks very differently from what I would've done on my own. In the end I decided to follow the template (or more specifically, this version, since it made more sense to me) as closely as possible, only diverging when I had to, for instance when there were certain vulnerabilities I had to exploit before I could do the actual exploit that I used to obtain a shell, but that didn't allow me to obtain a shell themselves directly. In those cases I put those explanations in the initial description.
What are some alternatives?
AutoRecon - AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.
OSCP-Exam-Report-Template-Markdown - :orange_book: Markdown Templates for Offensive Security OSCP, OSWE, OSCE, OSEE, OSWP exam report
SUDO_KILLER - A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges on the system, essentially allowing a regular user to execute commands as the root user.
nmapAutomator - A script that you can run in the background!
CTF-Difficulty - This cheasheet is aimed at the CTF Players and Beginners to help them sort the CTF Challenges on the basis of Difficulties.
Pentest-Service-Enumeration - Suggests programs to run against services found during the enumeration phase of a Pentest
alacarte
RELY - RELY (Name composed on project members Romy, Esther, Lucille and Yassir) is a python tool developed to help a Digital Forensics Triage procedure on some Microsoft Windows devices.