OSCP Skill Set
OSCP Skill Set
- You must be able to distinguish productive paths from rabbit holes to pass.
- “Which configurations or systems here could become attack vectors or vulnerabilities?”
This list is intentionally incomplete: even a single bullet point can expand into a full article, and it is not feasible to cover everything exhaustively. That said, some relevant items are likely missing.
Initial Foothold
Client Side Attack
.Library-ms.lnkswaks
Web
- DB
- MySQL/PostgreSQL/MSSQL/SQLite
- Syntax like comment out and
@@version - DB users (e.g.,
sa,dbo)
- Syntax like comment out and
- SQL Injection:
- Error-based SQLi
- UNION-based SQLi
- Blind SQLi
- Boolean-based
- Time-based
- MySQL/PostgreSQL/MSSQL/SQLite
- Directory Traversal
/usr/share/seclists/Fuzzing/LFI/...
- File Uploads
simple-backdoor.php- service-specific files, such as
rev.pHP - Non-Executable Files (e.g., authorized_keys upload)
- XSS
- Directory/subdomain enumeration:
ffufraft-small-words.txt-e,-fs- subdomain enumeration
Network / General
- ftp
- anonymous access
- passive/active
- Passive information gathering
- advanced google search like
site:github.com - Wappalyzer
- OSINT
- advanced google search like
nmap- UDP
-sU - Scan via a tunnel
- UDP
- Reverse Shell
msfvenom- Base64 encoded ones to bypass
- revshells.com
- SNMP
- nmap scripts
- snmpwalk/snmpbulkwalk
Utils
hashcathydrajohnssh2john, etc.
sudo tcpdump -i <tun> icmpncrlwrap -r nc -nlvp <port>
Linux
/dev/shm/su/etc/shadow/- Internal network with
ssornetstat
Privilege Escalation
- Shell Establishment
- SUID
- sudo
- capabilities
- NFS
- Cron
- Sensitive Files
- LinPeas
Tunneling/Pivotting
- Ligolo
- Chisel
- SSH
Windows
xfreerdp3reg- UAC
Privilege Escalation
- misconfigured privileges like
SeImpersonatePrivilege- Potato Family
- misconfigured groups like Backup Operators
- Robocopy
Get-Historyand(Get-PSReadlineOption).HistorySavePath- environmental variables
- Internal Reconnaissance
- PowerUp.ps1
- PowerView.ps1
- WinPeas
- Binary Hijacking
- DLL Hijacking
- Unquoted Service Paths
- Currently running processes
tasklist - Scheduled Tasks
schtasks
Post Exploitation
- Sensitive Files
- History files on each user
- Mimikatz
smbclientand shares- firewalls
Active Directory
impacket-mssqlclient(port 1433)impacket-secretdump- share enumeration
- ACL (e.g., GenericAll)
- SharpHound
- Password Spray
- Silver Tickets
- DC Sync
- WMI/WinRM
- Mimikatz:
sekurlsa::logonpasswords,lsadump::sam - Credential dumping with
reg save ... - Roasting
- AS-REP Roasting
- Kerberoasting
- PsExec
- Pass the Hash
- Overpass the Hash (Pass the Key)
- Pass the Ticket
- DCOM
- Golden Ticket
- Shadow Copies
View the original certificate page
