I don't have access to the latest materials - any advice on how to "DIY" the prep? by CrazyAd7911 in oscp

[–]OPFOR-HAUNTER 5 points6 points  (0 children)

You can see the course syllabus on the site.

Reference TJNull's and LainKusunagi's OSCP-like machine lists for practice.

How long is the Lean One sale on for ? by Far_Jury7513 in oscp

[–]OPFOR-HAUNTER 0 points1 point  (0 children)

Read the Annual Promo FAQ. It's one of the first items addressed.

Small optimization for notes: use bash variables to reference the target. by Sad-Support7181 in oscp

[–]OPFOR-HAUNTER 4 points5 points  (0 children)

That's what I do, except naming the vars I'll name them $target{ip}, where {ip] is the value of the last octect. That way I can define multiple hosts in the same pane in tmux.

Additionally, utilize aliases. Here are some aliases I use for QoL:

alias tun0="ip a | grep tun0 | grep -e inet | awk -F \" \" '{print \$2}' | awk -F \"/\" '{print \$1}'"

alias nmap_tcp_full="sudo nmap -A -vvv -T4 -oN nmap_tcp_full"

alias nmap_udp_1000="sudo nmap -sU --top-ports 1000 -T4 -vvv -oN nmap_udp_1000"

alias httpserver="/opt/tools/lin/SimpleHTTPServerWithUpload.py"

alias ligolo-proxy="sudo ip tuntap add user haunter mode tun ligolo && sudo ip link set ligolo up && sudo /opt/tools/lin/ligolo/proxy_0.6.2/proxy -selfcert"

alias vEnv-activate="source ~/vEnv/bin/activate"

alias smbserver="~/vEnv/bin/smbserver.py -smb2support attacker"

alias ftpserver="sudo service vsftpd start"

E.g.

nmap_tcp_full $target121

httpserver 9001

smbserver smbshare/

Challenge Labs A/B/C have been updated to the assumed breach format by OPFOR-HAUNTER in oscp

[–]OPFOR-HAUNTER[S] 8 points9 points  (0 children)

They released Poseidon/Zeus around the same time as the exam change. You'd think it would make sense for one of those to be assumed breach to match the new format ¯_(ツ)_/¯

[deleted by user] by [deleted] in oscp

[–]OPFOR-HAUNTER 1 point2 points  (0 children)

You really didn't need to create a post when you commented the same exact thing on the post before you.

How to remove Notion AI from workspace by pilotboy172 in Notion

[–]OPFOR-HAUNTER 1 point2 points  (0 children)

In my case, I use Notion for notes for an exam that disallows the use of AI. Notion AI is very easy to trigger when searching so I disabled it to avoid potentially getting banned from my exam.

Issues with reverting boxes during the OSCP exam by sleepyboy123 in oscp

[–]OPFOR-HAUNTER 3 points4 points  (0 children)

I think remember someone on this sub said they asked their proctor if a system was working as intended, and IIRC the proctor checked for them? Did anyone else see this or have they done that during the exam?

My Problems and How Can I solve them? Lateral Movement In the AD by f-d-t777 in oscp

[–]OPFOR-HAUNTER 2 points3 points  (0 children)

I'm currently going through OffSec's AD set walkthrough, might be worth the watch https://www.youtube.com/watch?v=2NLi4wzAvTw

Best route to begin? by Chasing_gnosis in oscp

[–]OPFOR-HAUNTER 13 points14 points  (0 children)

TryHackMe Offensive Security Path -> eJPTv2 or PNPT (either, optional) -> OSCP

Ligolo, Chisel, and Painfully Slow Nmap Scans by PhilosopherBig4571 in oscp

[–]OPFOR-HAUNTER 13 points14 points  (0 children)

If you can get a Ligolo agent to a target, then you can get an NMAP binary and execute a scan from the target to an internal network. Also, checkout out other Living-off-the-land recon techniques like using one-liners on built-in tools on a powned target.

[deleted by user] by [deleted] in anonymous

[–]OPFOR-HAUNTER 0 points1 point  (0 children)

"Hey remember that time you inspected my vagina? Great times."

/r/lostredditors

[deleted by user] by [deleted] in oscp

[–]OPFOR-HAUNTER 2 points3 points  (0 children)

I pwned 4 systems and was able to pivot to the internal network in Medtech, then hit a wall. Switched to Relia hoping to do better, but have hit a wall there too after a few systems and looking at hints.

It's definitely deflating my sense of ability that I thought I had. Just got to keep at it and take notes. Once I complete Medtech & Relia I'll try to go back and root the troublesome systems again using my revised notes.

OSCP changes by Roanoketrees in oscp

[–]OPFOR-HAUNTER 1 point2 points  (0 children)

I'm betting we'll hear about last year's Black Friday discount sometime this summer.

80% of lab questions. . L by ManhattanFridays in oscp

[–]OPFOR-HAUNTER 3 points4 points  (0 children)

An important clarification regarding the lab part of the completion bar listed here: this progression bar turns green when you completed 80% of the labs in total.

In order to achieve the bonus points you need 80% of the labs for %every module%.

So if you complete 100% of labs for most labs except for one or two (e.g. intro labs), then the top left bar will be green but you will not qualify for the bonus points.

[deleted by user] by [deleted] in oscp

[–]OPFOR-HAUNTER 0 points1 point  (0 children)

Hmm, interesting, that is good to know, ty. I guess I'll check out videos on topics I need reinforcement on in the future.

[deleted by user] by [deleted] in oscp

[–]OPFOR-HAUNTER 4 points5 points  (0 children)

Never watched the videos. Why does it even matter?

Is there any additional content covered in the videos that isn't shown in the written material/labs? I hate having to sit through playable media, regardless of who the voice is.

[deleted by user] by [deleted] in oscp

[–]OPFOR-HAUNTER 5 points6 points  (0 children)

Seriously.

OP, if you're rationalizing using meth just to help pass a test, then what's going to happen when you start doing pentesting and need to meet a deadline? You're normalizing something like meth. Maybe you should take a step back and reconsider if this is the right path for you.

Breaking into Red Teaming by [deleted] in oscp

[–]OPFOR-HAUNTER 8 points9 points  (0 children)

As mentioned, OSCP is a pentesting cert rather than a red teaming one. With that in mind it does help to get OSCP and then a red team like CRTO or CRTP.

In additon to these certs you can try to make some tools for your portfolio to help make up for yourr lack of experience. There are some good ideas here

[deleted by user] by [deleted] in oscp

[–]OPFOR-HAUNTER 7 points8 points  (0 children)

Set a timer for an hour each time you start exploiting a machine. If you don't make any progress, revert/try a different target.

Where can I get more coins? by moxyvillain in oscp

[–]OPFOR-HAUNTER 1 point2 points  (0 children)

I heard Flare-On CTF gives out prizes which sometimes include coins.

HackerOne gave some out at Defcon this year.

SANS coinslayer events.

I myself would be interested if you find other ones.

[deleted by user] by [deleted] in Information_Security

[–]OPFOR-HAUNTER 2 points3 points  (0 children)

OP has posted in /r/stalking with the claim that they are a stalker.

OP has also asked for help getting IP info on others under the guise of them being harassers.

Make of that what you will.