DiegoYM OSCP journey
Hi all!! Yet another OSCP journey here. I really enjoyed reading all the other ones (most specially JollyFrog's, thank you!!!) so I decided to write mine.
Well, after many years (since it first came out) reading about this course, I've finally joined OSCP. My lab time will be starting on Saturday 14.
I've already downloaded the Kali image (the one created for the OSCP, which is 32 bit), installed it on Virtualbox instead of Vmware (I hope that will not cause unexpected problems), then tested the vpn following the instructions from Offsec, and everything seems to be working as it should.
I decided to try OSCP about three or four months ago, when my life plan suddenly had a little Kaylee (my soon-to-be daughter's name) on the picture. I then downloaded the syllabus and I've been studying like crazy since then, trying to cover as much of the contents as possible. Our baby girl is coming on August, so I kinda have a deadline... I will most probably need to extend my lab after that, but I'm guessing it will be a little harder to find the much needed free time.
I have a bachelor degree in computer engineering, lots of experience with Linux, bash scripting, python, networking, and web programming and simple web attacks (sql injection and xss), but I think I'm seriously lacking in many areas. Even on linux command line, these months I've found out there's a lot (I mean, like, A LOT) of really useful commands I never used before.
Also never used anything about privilege escalation or buffer overflow exploitation, but I've been learning a lot last months.
For note taking I'll be using Cherrynote, because i've found it's much faster than keepnote, I like that it's fully saved in a single file, and also the only noticeable Keepnote's advantage seem to be the ability to take screenshots, which I will just take myself and keep organized in folders.
I downloaded all remotedly OSCP-related stuff from github I could find, and I've been analyzing many scripts and tools which I hope will be useful. I'm also trying to write my own scripts, because even if there are better ones, I can learn a lot on the process of creating them myself.
I got a few machines from Vulnhub, I tried attacking many of them, and have been soundly unsuccesful at it. Oh, well... I learnt a lot from some walkthrougs, but breaking into at least a single machine would have given me some confidence.
Lastly, I'm starting to sketch a simple methodology. It seems good organizational skills are a very important point for successfully passing the OSCP. I don't plan on attacking any server until I completed all the modules, videos and exercises. And when I start attacking, I will stick to the methodology, while changing (hopefully improving) it as needed.
The basic plan is: (feel free to comment)
- Simple network scan for host discovery
- OS fingerprinting
- Choosing a target
- Full scan all ports, TCP and UDP
- Find open ports version, What's behind each of them?
- Check known vulnerabilities for those
- If port 80 is open: Check in browser
- Get traffic with wireshark, Who is this machine talking to? What's it saying?
- Search for usable exploits
- Use such exploits to get a basic shell
- Privilege escalation
- Loot like crazy
This is just the basics, as every step will need to be detailed with a list of sub-steps. I'm working on it now.
In between each steps, of course, I will sometimes stand up from my computer and run around the house screaming in desperation / panic as needed.