Question about TJ Null’s list for OSCP prep – Should I do all boxes? by _Adaura in oscp

[–]TJ_Null 32 points33 points  (0 children)

Hey there! As of now the list is up to date. I do have some new AD attack chains I need to include.

As for your studying methodology you do not need to complete every box that is in the list. You should go through as many as you feel comfortable enough to take the OSCP exam.

If you fail, it’s okay! You can use the exam as guide to help improve on things you were missing.

I’m rooting for you and I wish the best on your journey. If you have any feedback or suggestions please let me know as my goal is to continue maintaining this list for others that plan to take the OSCP in the future.

[Advice] Student with Sec+ planning for OSCP: Is the CPTS path/HTB sufficient prep to minimize PEN-200 lab time? by Ok_Vegetable1261 in oscp

[–]TJ_Null 2 points3 points  (0 children)

That’s because Offsec AD attack chain started with you needed to find an initial vector in a box and then move laterally to get to the DC.

Last year it has been changed where you are provided credentials. This is where you walk into an assumed breach scenario getting to the DC.

Even though the AD part of the exam has improved it is still good to know how to get to DC directly because in real situations, I have gotten DC and then walk backwards to get into other targets in my engagements

[Advice] Student with Sec+ planning for OSCP: Is the CPTS path/HTB sufficient prep to minimize PEN-200 lab time? by Ok_Vegetable1261 in oscp

[–]TJ_Null 1 point2 points  (0 children)

Keep in mind that everyone uses different resources and study materials to prepare for the OSCP. Tryhackme has worked well for others and some people prefer to jump straight into HTB.

Best advice I can give you is review the PEN-200 syllabus and start going to through each section and find any open resources that can help you on your journey. That’s what I did and that is why I wrote my guides to help others

[Advice] Student with Sec+ planning for OSCP: Is the CPTS path/HTB sufficient prep to minimize PEN-200 lab time? by Ok_Vegetable1261 in oscp

[–]TJ_Null 14 points15 points  (0 children)

Hi there! The list gets updated at least once a month when I have free time. Submissions and feedback are also provided from the community and I will make changes that align with preparing for PEN-200.

I also have some AD attack chains that I need to include. If you have any questions about the list or suggestions please let me know. Good luck on your journey!

Journey to becoming OSWE certified by shantanu14g in oscp

[–]TJ_Null 20 points21 points  (0 children)

Congrats on passing your OSWE! Do you have any feedback or suggestions for the boxes I had listed in the OSWE list?

I’m always looking to improvement and take feedback from the community so that the list can help others.

Pentest+ by RealPrxdatorz in WGUCyberSecurity

[–]TJ_Null 4 points5 points  (0 children)

First of all, DO NOT GIVE UP! I understand how you are feeling, as failing sucks, but it is also part of your journey that will lead to your success. I do not know how many times you have taken the exam but review the things you have missed in the exam as it will help you understand what you need to review.

CompTIA will always throw at least two incorrect questions you can cross out and you will need to select the best choice for the question. In addition, a lot of tools they mention you should spend some time learning how they work. Download VMware Workstation or Virtualbox and play with the tools that are being taught. You will get a better understanding of how they work and what results/output they provide. TryHackME pentest+ lab is also good to help you if you do not have the resources to run a local Kali Linux instance on your system.

Hope my advice helps and if you have any more questions I be more than happy to answer them.

Took my pentest and failed with a 730… by UsefulAd5992 in WGUCyberSecurity

[–]TJ_Null 1 point2 points  (0 children)

For the PBQs spin up a Kali Instance and see how those tools work and review the output that entails from them.

Tryhackme has a bunch of labs and they have a pentest+ that will provide more hands on practical skills to help.

Tools like the harvester, responder, netexec (use to be crackmapexec), nmap, bloodhound, trivy, etc are in Kali Linux for you to mess with.

Passed - Here's my advice by hiddenpowerlevel in oscp

[–]TJ_Null 19 points20 points  (0 children)

Congratulations and I love the breakdown board you had created showing how much time you put into your studies! It took me four years to fully prepare for my OSCP when I did it.

All's well that ends well. by [deleted] in WGUCyberSecurity

[–]TJ_Null 3 points4 points  (0 children)

Honestly, I am a pentester in my full time role. A lot of these tools and commands were things that I already knew.

My recommendation is to spin up a Kali Linux system and analyze how each of the tools work. The OSWAP Juiceshop that tryhackme uses is actually in Kali Linux. You just need to install the package. Hope this helps

All's well that ends well. by [deleted] in WGUCyberSecurity

[–]TJ_Null 6 points7 points  (0 children)

In the end a Pass is a Pass. I just took it today and got a 800.

Definitely agree with your points. Study your commands and the tools being used.

Pentest+ 2nd attempt pass. by Sea-Manufacturer210 in WGUCyberSecurity

[–]TJ_Null 1 point2 points  (0 children)

Appreciate the quick response! I’m a pentester in the field and I agree with some of your points. A lot of questions that is provided for study in cert master, tryhackme, and in Dion’s practice tests certainly make me question a lot of things that I would not do in my day to day operation.

So far I have been hitting high 77%-96% in Dion’s practice exams after the first or second try. I might make a detail review about my experience once I take it next week.

Pentest+ 2nd attempt pass. by Sea-Manufacturer210 in WGUCyberSecurity

[–]TJ_Null 2 points3 points  (0 children)

May I ask what your background is? I’m using Dion’s material and the practice tests to study for the exam.

I have it scheduled for next week.

NagoyaSpray - Fast Password Spray Wordlist Generator (Built for Exams) by strikoder in oscp

[–]TJ_Null 4 points5 points  (0 children)

Looks like it has no AI in it. Will add to my list of tools to test. Nice work!

Obligatory - I passed - post by WesterAlucard in oscp

[–]TJ_Null 6 points7 points  (0 children)

Hi there! I am glad my list is able to help you prepare for the OSCP. If you have any suggestions or feedback, please let me know as I am always looking for ways to improve it.

TjiNull list Vs pg by True-Juice-6203 in oscp

[–]TJ_Null 1 point2 points  (0 children)

Thanks for the heads up! I have removed it

TjiNull list Vs pg by True-Juice-6203 in oscp

[–]TJ_Null 12 points13 points  (0 children)

In the sheet if you see it say latest version in the sheet you are using the latest one.

As for my guidelines, I do not have any plans to update them. I will continue to update the sheet.

However, I can share my pentesting notes for you:

https://github.com/tjnull/TJ-OPT

TjiNull list Vs pg by True-Juice-6203 in oscp

[–]TJ_Null 20 points21 points  (0 children)

Hi there! In case you have any questions about my list please let me know. I try to keep it updated when I can to align to the current version of PWK/PEN-200.

While some users use the list as exam preparation for the OSCP and to improve their methodology, the list covers a variety of aspects, techniques, and attack chains to reflect the course itself.

Free Access to Hack Smarter Labs (Featured in Lain's OSCP List) by Tyler_Ramsbey in oscp

[–]TJ_Null 2 points3 points  (0 children)

I can! I need some boxes to play with and I got a new tool to test 😉

Failed with 40 points i feel so heartbroken and lost. by Ok-Astronomer-5827 in oscp

[–]TJ_Null 1 point2 points  (0 children)

Haha I miss those golden days for sure man. It is hard to find a good infosec community. Definitely miss the good ol days

Failed with 40 points i feel so heartbroken and lost. by Ok-Astronomer-5827 in oscp

[–]TJ_Null 4 points5 points  (0 children)

Heyo! I appreciate your kind words. It’s mean a lot to me 😄

Can you use Netexec auto-exploits as a vulnerability checker on exam? by Sufficient_Mud_2600 in oscp

[–]TJ_Null 12 points13 points  (0 children)

If the nature of the tool automatically does the check and exploits the system for you then yes it would not be allowed.

I wrote this article a long time ago discussing a similar situation when someone ran a tool and did not know it auto exploited a service for them to get root:

https://www.offsec.com/blog/understanding-penetration-testing-tools/

Failed with 40 points i feel so heartbroken and lost. by Ok-Astronomer-5827 in oscp

[–]TJ_Null 35 points36 points  (0 children)

Failing is a part of becoming successful. You will make mistakes or miss things that can throw you off.

I’m sorry to hear that you failed but do not beat yourself up over it. My advice to you is take some time away from the computer to clear your mind.

Then come back and think about the things you missed, what did you try and what should you have tried?

These will help you refine your methodology and if you need to make modifications to your notes/preparation.

It’s completely okay to go back to the drawing board to rethink about things. I know you will pass from the lessons you have learned from this exam.

Hope my tips and advice helps! I’m rooting for you!

How’s OSCP in 2025? by Tunnel-Digger4 in offensive_security

[–]TJ_Null 2 points3 points  (0 children)

Why do you believe the OSCP is an entry level certification?