How I passed the OSCP on the first try!
Good to see you in my post. Today I’m going to share my experience with the OSCP, before doing that I want to make a little brief about myself.
Who Am I:
I am Muztahidul Islam Tanim an eighteen-year-old infosec enthusiast from Bangladesh & currently, I am part-time bug bounty hunter at synack & yogosha platform.
I purchased the course on Wed, Sep 30, 2020, 7:30 PM with 60 days of lab access. I have received my course material on Sun, Oct 11, 2020, 6:01 AM, after receiving my course material I decided to go through the book first I read every single word from the 853 page’s book and completed most of the exercise’s, but I didn’t do the reporting cause it was so much time consuming & not worth of 5 points.
The machine’s in the lab vary in difficulties I found most of the machines are easy, but the others were so hard and banging my head on my desk for several hours.
The lab consists of 50+ machines that are to be “hacked”. It is more likely to a corporate network.
It is advised that you hack into as many systems as possible. I could get 41 systems in total, including the four systems supposed to be the most rigid boxes in the lab (Pain, Gh0st, Sufferance & Humble). I would advise anyone who plans to sit in the exam to get root access on 35 machines at least without using Metasploit. I didn’t use Metasploit to hack any system in the labs, and it immensely helped me on the exam. You can’t use Metasploit more than once, so It’s better not to use Metasploit on the lab.
If you find yourself stuck, you can always get a hint from the forum, but I would highly discourage to look into the forum cause sometimes it is full of spoiler.
I scheduled my exam at Sun, Dec 27 2020, 09:00 (Asia/Dhaka) after completing the exam’s prerequisite I got the challenge set at 9:16 & started with the buffer overflow machine and solved it within 20 minutes took a break and came back again and cleared the 10pts machine. So 35 points in 40 minutes. My scans were running in the meantime, I took another long break and came back after 2 hours. But I was hardly stuck with the other boxes didn’t manage to find initial foothold even. After many times passed, I got realised I was poking into the rabbit hole and also overlooking. So after a moment, I got an initial shell from a 20pts machine, and the privesc was easy. Took another break and now started with another 25 pts machine the initial shell was easy but that was hard to identify, now I was stuck again for 2 hours with the privesc but finally, managed to spawn a high privileged shell and obtained more than pass marks. I had spent more than 7 hours in the break that helped me go through the right path. I ended the exam after 23 hours and submitted the exam report in the next day. After two days, I got an email from offsec that I have successfully completed the PWK course and obtained OSCP certification.
There are very few OSCP holders in my country & probably I’m the youngest among them!
I would say the exam was unique and It’s designed to build your penetration testing methodologies and the use of the tools and exploits included within Kali Linux distribution.
I would recommend the PWK course to anyone who wants to build their career in the infosec field.
The precious thing about PWK is the journey itself. My journey was not too long, but I enjoyed it so much.
I would highly recommend completing the Tjnull’s oscp like boxes before enrolling to the course & if you feel weak at privilege escalation grab the excellent course’s of @Tib3rius & for the buffer overflow preparation you can have a look at the “Buffer overflow prep” tryhackme room which is more than enough for the exam.