+ Reply to Thread
Page 1 of 2 1 2 Last
Results 1 to 25 of 37
  1. Member
    Join Date
    Apr 2017
    Posts
    41

    Certifications
    OSCP
    #1

    Default OSCP Journey Starting this week

    Ok, so i enrolled to PWK course and my lab started on 28 January 2018.

    Will share my learning experience daily

    Here is my experience.

    I did MCA in aug 2013. After that i took course CEH and RHCE course. In 2014 i started learning sql injection without having programming language. After did sql injection lots of challenges i started learning web programming language.From 2015 to 2016 i learned some web attacks and some programming languages like html,css,javascript,php,mysql,python,bash. All basics i learned and even made some sqli lab and lfi lab my own writing code. In 2017 aug to sept i solved many vulnhub machines and overthewire challenges and nebula 0 to 10 series i started hackthebox. In october i started solving HTB machines and solved 47 user and 46 root till now and got 30 rank till now.

    Also learning BOF and today i enrolled to PWK course for 30 days.

    I also did essential badge challenges and white badge and some serialize badge challenges of pentesterlab pro website

    From 28 January to 27 March.

    I need lots of guidance from this forum.Please guide me during my journey.

    Thanks
    Last edited by aakashc1; 01-23-2018 at 02:46 PM.
    Reply With Quote Quote  

  2. SS
  3. Junior Member
    Join Date
    Oct 2012
    Location
    India
    Posts
    15

    Certifications
    CCNA, CEH, ECSA, CHFI, LPT, ENSA, ECSP, ECVP, ECSS, ECIH, ECES, ECSP .Net/Java, RHCE, Cloud, OpenStack, RHCVA, Server Hardening, RHCA, MCP, MCTS, OSCP
    #2
    Welcome to the board and best of luck
    Reply With Quote Quote  

  4. Member
    Join Date
    Apr 2017
    Posts
    41

    Certifications
    OSCP
    #3
    So, today was my first day on oscp lab and rooted two machines so far
    1. Alice
    2. Phoenix

    Alice i rooted with metasploit and i have python exploit for same too but it was not working and i will figure it out soon so this one is i kept in my TODO List

    Phoenix i did manually and i loved it too.Not so tough

    Many things i learn today and also put in my to do list as i need to learn that new thing again

    Machine force us to heavily depend on GOOGLE-FU and i really loved this

    Once i done my oscp i will share my bookmarks-list which are going to help me in my journey.

    I actually attempted 4 machines today

    2 i already rooted, one is i see depend on other machine and as suggested from friend that do this machine later so i skip it,and another machine i tried and almost got limited shell but machine is not stable so it is frustrating a lot.

    So, that one i also put in my to do list

    My aim is to solve as much as labs as i can in 25 days out of 30 days and which i can't solve put in my to-do list and then focus on them completely.And if needing i will extend my lab time to 15 days more.

    Suggestion: Do machine randomly and check hints on forums which will get idea is machine depend on others or not so that time will be save

    Thanks
    Reply With Quote Quote  

  5. Member
    Join Date
    Apr 2017
    Posts
    41

    Certifications
    OSCP
    #4
    Day 2

    So, i did 2 machines today so far -> HELPDESK and bob

    First machine,HELPDESK was easy ,rooted within a hour but again with msf. I got exploit manually way mean without msf but that didn't work. So, this i keep in my todo list

    Second machine,bob,oh man this machine gave me headache today. I almost spent 7 hours on this machine alone to root it. I got shell using msf again but after that real fun was waiting for me and yes i did it finally with that new method which i learnt today though still one more tool remaining to do with that machine and i noted that in my to-do list again.Also i asked my friend is there more way in this machine and he said yes there is one more way.So i noted it in my note and will do this machine again with another method and ofcourse without metasploit.

    So, in two days i rooted 4 machines out of 6 machines attempted where one machine as suggested i skip for later purpose as that was depend on other machine and one machine i saw unstable so i will do this too later as my main focus/aim is to root machines as much as i can upto 3 Feb...

    I planned,from 4 Feb to 15 Feb,practice on exercises like buffer overflow and other which i skipped from PDF/Video materials

    I almost done 85% PWK material[PDF/Video]

    And from 16 Feb to 25 Feb again do lab machines and on 26 Feb will extend my lab time for another 30 Days so that i practice on my to do list with great focus

    Suggestion:
    Don't rely only on google search. Search everywhere our problem on internet
    Before today i was search my problem like this ->

    Stackoverflow->github->google

    Now,it changed to ->
    Stackoverflow->github->google/bing/duck duck go/yahoo -> exploit-db->offensive security itself->youtube/vimeo->archive.org->pastebin/ghostbin

    TIP:
    if window box then for directory searching whether gobuster or dirbuster,i will use these extension everytime -> asp,aspx,txt,bak,conf,cfm

    The concept i learned today to root bob machine i found from some of above places

    Thanks
    Last edited by aakashc1; 01-29-2018 at 09:29 AM.
    Reply With Quote Quote  

  6. Member
    Join Date
    Apr 2017
    Posts
    41

    Certifications
    OSCP
    #5
    I see no one reply to my thread don't know why
    Anyway,nevermind i will continue write my experience everyday here

    DAY 3

    So,i did only 1 machine today and other 1 machine is in enumeration phase.

    Machine 1 -> mike
    This machine is good and i did manually as metasploit exploit didn't work but the exploit which didn't work i try to understand that exploit what actually it doing and then by hand manually i did it and this experience to solve this machine was really so awesome.Learned the way we need to solve this machine

    Machine 2 -> Barry
    I am still enumerating this machine. Actually got headache so i took medicine and went for sleep and just now woke up and will continue with this machine for sometime

    Tip:Always understand the application and exploit so that we get knowledge as much as we can
    Also in three days i addicted to Terminator and now i am thinking to learn and practice tmux in upcoming days.
    Also nikto is our friend helping us a lot. Before that i used nikto sometime only not everytime but as i got suggested from my friend to use nikto always then i see why he said this as it is absolutely correct that nikto will save us a lot during lab time though we not heavily depend on this but not a bad to use it.
    Thanks

    Machine done so far:
    Alice,Bob,HELPDESK,mike,Phoenix
    Reply With Quote Quote  

  7. Senior Member
    Join Date
    Nov 2016
    Location
    Iowa
    Posts
    154

    Certifications
    OSCP, OSWP, CISSP, CCNA Cyber Ops, Sec+
    #6
    Good job, and good luck, though with your preparation, you should be doing just fine. Just to interject a counter-point, I find/found using Google searching to suffice as a first step.
    -------------------------------------------------------
    Security Engineer/Analyst/Geek, Pen Testing
    Reply With Quote Quote  

  8. California Kid JoJoCal19's Avatar
    Join Date
    Mar 2009
    Location
    Jacksonville, FL
    Posts
    2,628

    Certifications
    CISSP, CISM, CISA, CRISC, GCIA, GSEC, CCSK, AWS CCP, CEHv8, CHFIv8, ITIL-F, MS Cyber Security, MSISA, BSBA
    #7
    Thanks for posting your progress aakashc1! One question I have, how do you manually exploit machines? I've always read about people exploiting the machines with Metasploit and then going back and doing it manually. However when I ask how one does manual exploitation, I don't get a good explanation lol. So are you able to give an example of you do a manual exploit, without naming any machines?
    Have: CISSP, CISM, CISA, CRISC, GCIA, GSEC, CCSK, AWS CCP, CEHv8, CHFIv8, ITIL-F, MS Cyber Security - USF, BSBA - UF, MSISA - WGU
    Currently Working On: eJPT, Learning: Linux/CLI, Git, Python, Pentesting
    Next Up:​ eJPT, eCPPTv2, OSCP
    Studying:​ Code Academy (CLI, Git, Python), eLearnSecurity PTSv3
    Reply With Quote Quote  

  9. Member
    Join Date
    Apr 2017
    Posts
    41

    Certifications
    OSCP
    #8
    Quote Originally Posted by JoJoCal19 View Post
    Thanks for posting your progress aakashc1! One question I have, how do you manually exploit machines? I've always read about people exploiting the machines with Metasploit and then going back and doing it manually. However when I ask how one does manual exploitation, I don't get a good explanation lol. So are you able to give an example of you do a manual exploit, without naming any machines?
    Yes sure mate

    By exploiting manually means doing attack vulnerable system as same as exploit does. So if we understand the exploit what it does really doing then we can do same as it doing. I am not a very good programmer but i can understand almost of programming language.

    Don't use exploit blindly,just see what it doing as backend process. Best thing is reading first and understand and second thing is just intercept them and check what's going on? Like here is example ->

    HTB Machine Arieki solution from IPPSEC video on youtube there ippsec what does is add a new proxy in burpsuite and too in msf exploit and intercept them and understood why exploit first failed

    Another good approach is use either tcpdump/wireshark and check whats going on as exploit doing

    Now another thing is exploit by using tool like -> gdb,gdb-peda,radare2,mona.py etc

    I will do BOF exercises tomorrow from PWK Material and will understand mona.py and what i understood in first time reading is exploit thing with mona.py and understand what's going on under the hood

    Hope it helps you

    Thanks
    Reply With Quote Quote  

  10. California Kid JoJoCal19's Avatar
    Join Date
    Mar 2009
    Location
    Jacksonville, FL
    Posts
    2,628

    Certifications
    CISSP, CISM, CISA, CRISC, GCIA, GSEC, CCSK, AWS CCP, CEHv8, CHFIv8, ITIL-F, MS Cyber Security, MSISA, BSBA
    #9
    Thanks aakashc1, that helps from a high level, which is usually what I get. So how are you delivering the exploit to the victims manually?
    Have: CISSP, CISM, CISA, CRISC, GCIA, GSEC, CCSK, AWS CCP, CEHv8, CHFIv8, ITIL-F, MS Cyber Security - USF, BSBA - UF, MSISA - WGU
    Currently Working On: eJPT, Learning: Linux/CLI, Git, Python, Pentesting
    Next Up:​ eJPT, eCPPTv2, OSCP
    Studying:​ Code Academy (CLI, Git, Python), eLearnSecurity PTSv3
    Reply With Quote Quote  

  11. Member
    Join Date
    Jul 2015
    Posts
    68

    Certifications
    CEH, ECSA, eCPPT, OSCP, (MASPT), (CPSA)
    #10
    Hi aakashc1,

    Good luck on your venture... Personally, I suggest you not to disclose the method like python script on xxx machine or MSF exploit etc. As this leave breadcrumbs and whoever genuinely trying might use this clue.
    Hope you don't mistake it

    Cheers
    Reply With Quote Quote  

  12. Member
    Join Date
    Apr 2017
    Posts
    41

    Certifications
    OSCP
    #11
    After getting response now mine confidence go to next level

    Day 4

    Today i did 3 machines -> BARRY,PAYDAY,RALPH

    Total Machine done -> 8

    TIPon't overthink and follow guide for methodology from xapax and bitsvijay.Link? just google it

    Next Plan ->
    Feb 1 to Feb 7 -> PWK Exercises like BOF and others

    Also i booked my exam on 11 March 12:30 PM Asian/Kolkata

    Thanks
    Reply With Quote Quote  

  13. Member
    Join Date
    Apr 2017
    Posts
    41

    Certifications
    OSCP
    #12
    Day 5




    Ok , so i today rooted 3 machines. 2 machines rooted easily while 1 machine took some hours to solve




    Rooted -> asterisk,tophat,kraken




    Total Rooted Machine -> 11




    Today i learned something and also i got another note taking software ->

    https://github.com/geckom/Attero




    And also i used Reconnitre which is too good




    Really Doing HTB Machine helped a lot




    Thanks
    Last edited by aakashc1; 02-01-2018 at 01:57 PM.
    Reply With Quote Quote  

  14. Junior Member
    Join Date
    Feb 2014
    Posts
    8
    #13
    How did you like pentesterlab.com pro? Was the cost worth it?
    Reply With Quote Quote  

  15. Senior Member
    Join Date
    Feb 2016
    Posts
    211
    #14
    You are on a roll. Started in January and already scheduled the exam for 2 months later. That is not the norm. I wish you the best. I guess this was in your blood.
    Reply With Quote Quote  

  16. Member
    Join Date
    Apr 2017
    Posts
    41

    Certifications
    OSCP
    #15
    Quote Originally Posted by jortjr View Post
    How did you like pentesterlab.com pro? Was the cost worth it?
    https://awesomeaakash.github.io/pent...ab_pro_review/
    Reply With Quote Quote  

  17. Member
    Join Date
    Apr 2017
    Posts
    41

    Certifications
    OSCP
    #16
    DAY 6

    So, today i did only machine root and another machine is very very near to root.

    I did PAIN and rooted it
    I am in shell in GHOST machine and nearly to root. I spend my whole day in GHOST machine and still unable to root it.This machine is really NIGHTMARE for me. PAIN machine was easy and compared to GHOST is nothing.

    Will do GHOST machine tomorrow again

    Total Machine done -> 12

    and today is really so tired day and at the same time very learning day


    Thanks
    Reply With Quote Quote  

  18. Member
    Join Date
    Apr 2017
    Posts
    41

    Certifications
    OSCP
    #17
    DAY 7

    So, I today rooted 2 machines and one machine very close to root. It was totally tired and fun and very learning day.

    Today i rooted -> Ghost,Dotty
    and nearly root to -> Bethany

    Best learning experience i ever got from GHOST Machine. This is superb

    Total ROOTED Machine -> 14

    ROOTED Machine Names ->
    Alice,Phoenix,Mike,Bob,Barry,Tophat,Payday,Ralph,P ain,Dotty,Ghost,Helpdesk,Kraken,Hotline

    Thanks
    Reply With Quote Quote  

  19. Member
    Join Date
    Apr 2017
    Posts
    41

    Certifications
    OSCP
    #18
    Day 8

    So, today is the day where i learned a lot by doing 4 machines. Yes,i rooted 4 machines today. I learned the basic concept of shellcoding part today.

    Rooted machines today -> oracle,susie,jd,mail

    Total Machine done -> 18

    Machine names i rooted ->
    Alice,Phoenix,Mike,Bob,Barry,Payday,Ralph,Pain,Dot ty,Tophat,Ghost,Helpdesk,Susie,Oracle,Kraken,Hotli ne,Jd,Mail

    TIP:My tip is play with msfvenom manually mean not meterpreter shell and use them with in your exploit and try to learn to modify scripts by understanding them

    Thanks
    Reply With Quote Quote  

  20. Member
    Join Date
    Dec 2015
    Location
    Georgia,Tbilisi
    Posts
    71

    Certifications
    GCIH, OSCP
    #19
    Thank you for posting about OSCP journey. It is helpful.
    I have one question. Are Kioptrix challenges(1,2,3,4) almost the same as OSCP lab machines?

    P.S I'm going to buy tomorrow PWK training course and soon I'll create my own journey
    Reply With Quote Quote  

  21. Member
    Join Date
    Apr 2017
    Posts
    41

    Certifications
    OSCP
    #20
    Day 9

    So, i rooted 1 machine only and that is leftturn. Very nice and interesting machine.learned new thing.I might solve more than 1 machine today but i got VPN issue today so i mail offsec staff and mine issue solved after 3:00 PM and after that i started solving machine. Enough for today. Also i played with tmux and i learned it

    Machine i rooted today -> Leftturn

    Total Machines done -> 19

    Total Machine done names ->
    Alice,Phoenix,Mike,Bob,Barry,Payday,Ralph,Pain,Dot ty,Tophat,Ghost,Helpdesk,Susie,Oracle,Kraken,Hotli ne,Jd,Mail,Leftturn

    TMUX Resource ->
    https://hkh4cks.com/blog/2017/12/29/tmux-**********/
    https://github.com/samoshkin/tmux-config

    Thanks
    Reply With Quote Quote  

  22. Member
    Join Date
    Apr 2017
    Posts
    41

    Certifications
    OSCP
    #21
    Day 10,11,12

    Rooted 26 machines total.Unlocked IT and Dev Department. Still hard machines like humble and sufferance remaining. Practicing a lot in file transfer and will learn a lot in this area

    Thanks
    Reply With Quote Quote  

  23. Junior Member
    Join Date
    Oct 2012
    Location
    India
    Posts
    15

    Certifications
    CCNA, CEH, ECSA, CHFI, LPT, ENSA, ECSP, ECVP, ECSS, ECIH, ECES, ECSP .Net/Java, RHCE, Cloud, OpenStack, RHCVA, Server Hardening, RHCA, MCP, MCTS, OSCP
    #22
    Congrats Aakash Choudhary & Keep going
    Last edited by suraj2010; 02-12-2018 at 03:01 PM.
    2018: OSCP - COMPLETED, CISSP - Continue...
    Reply With Quote Quote  

  24. Member
    Join Date
    Aug 2017
    Location
    ancient alien moon-base of Jupiter
    Posts
    73

    Certifications
    CCNA 200-125, A+
    #23
    I'll follow this thread

    I"m trying to get into infosec but it might take a few more jobs until I land a gig

    I like the journal entries since it gives me an idea where/how to go

    thanks
    Reply With Quote Quote  

  25. Member
    Join Date
    Apr 2017
    Posts
    41

    Certifications
    OSCP
    #24
    Day 13,14,15,16

    Rooted humble,edbmachine,sean,sufferance,dj,master,fc4

    Total machine done 37

    Today i will focus on IT and Developer Department

    So much fun and learned.Superb journey so far.Those who want to do oscp this year please focus on HTB+VULNHUB and be calm and play with msfvenom

    Thanks
    Reply With Quote Quote  

  26. Member
    Join Date
    Apr 2017
    Posts
    41

    Certifications
    OSCP
    #25
    Day 17, superb day. Learned pivoting concept and done two machines of it department and one more from public network and hence i unlocked admin department too

    Total Machines done -> 40

    woooootttt
    Reply With Quote Quote  

+ Reply to Thread
Page 1 of 2 1 2 Last

Social Networking & Bookmarks