I've been in information security for a few years now and pentesting is about 30% of my job. I'd like to do it full time one day so researching how to get there showed the OSCP. Since I read about it, I knew I wanted it. I created a website,
www.hausec.com, to document what I've done in preperation for PWK -- from Vulnhub write-ups to cheatsheets. I have a section dedicated to my OSCP progress and I'll basically be copy+pasting from here to there and vice versa.
Here's what I've done to prepare for PWK (About a year ago now):
At home I have a giant whiteboard attached to my wall. On it, I’ve drawn a tree diagram with my goal of OSCP at the top. I have four components I want to “check off” before I registered for the OSCP. They are:
Vulnhub VMs
Homelab(Psuedo Windows environment)
Books
Videos
Homelab was the first thing I crossed off. I simply installed an ESXI server on an old box I had laying around and build a Windows environment with server 2003, 2008 R2, 2012 R2, XP, Win 7, Vista, and Win8. The point of this was to purposely make misconfigs in the domain (e.g. DNS Zone Transfers) that will simulate what a real environment will be like.
Vulnhub VMs were the things that took me the longest. I’ve done a lot of research and read a lot of blogs on people who have taken the OSCP, and of those that listed Vulnhub VMs, I’ve gone and downloaded and added to my list. It’s as followed:
- 64Base
- Droopy
- FristiLeaks
- IMF
- Kevgir
- Kioptrix 1-4
- LordofTheRoot
- Metasploitable 2
- Mr.Robot
- NullByte
- Pwnlab_init
- PwnOS 1.0
- SickOS 1.2
- SickOS 1.1
- Stapler
- trll
- trll2
- Vulnix
For some of these I've done a write-up as I’ve noticed that write-ups greatly help me remember what I did. To assist me with these, I compiled a **** sheet as well that can be found
here.
Next are books. I have five books that I have read since my preperation:
- Metasploit, the Penetration Tester’s Guide
- Practical Malware Analysis (Definitely not needed for OSCP but this helps with my job)
- Hacking Exposed 7
- Violent Python (Also not too necessary, but does help)
- RTFM (More of a reference guide, but still helpful)
Finally there are 4 video topics I've watched from
Pentester Academy: Learn Pentesting Online, it’s a subscription to watch them and I got it when it was on sale.
- Python
- Powershell
- Network
- Webapp
- Shellcoding
With the exception of a few videos and some chapters in the books, I've accomplished all of these so I registered for PWK starting on June 24th for 90 days.
I work full time, and I'm still in school part time, so I figured I would need the most time as possible. Once my lab time is up I’ll attempt the exam. I know if I were to take the exam now I would probably not even root one box, but I feel as though my preparation over the last year has prepared me for the PWK. The plan is when the lab opens up, to download all the training material. I won’t even begin scanning or pentesting; I’m just going to go through the course material and do the labs, taking notes when appropriate. I won’t be posting anything specific here, but I’ll be keeping personal notes.
Once I’ve finished the labs and course materials, I will then start pentesting the machines in the environment and document those as well. I’m prepared to have my confidence crushed, as others have before, and truth be told I doubt I’ll pass the OSCP on the first try as it usually takes a few, but I'll definitely try my hardest.