SlideShare a Scribd company logo
3
Most read
4
Most read
9
Most read
HOW TO GET
STARTED WITH
OSCP
SREELAKSHMY PALLIYIL, OSCP
AGENDA
• Overview
• Things Required for OSCP Presentation
• Beginning
• Journey
• Exam
• Conclusion
OVERVIEW
• An awesome journey where you will experience lots of
excitement, pain, suffering, frustration, confidence, and
motivation
• Will be awarded on successfully cracking 5 machines
in 23.45 hours.
• One machine for exploit writing.
• Other 4 machines include Enumeration, Exploitation
and Post exploitation
THINGS REQUIRED FOR OSCP
PREPERATION
• A ‘NEVER GIVE UP’ attitude
• Basic Linux usage skills
• A bit of programming knowledge
• Ability to read and understand the flow of public
exploits
• Creative hacker way of thinking
• Lots of interest, patience, and enthusiasm
BEGINNING
• Start over with Hack the box (HTB)
• Get handy in using Linux
• Learn a bit of python
• Basic concepts such as port-scanning, web application
testing, etc.
• Learn Metasploit
• Learn Buffer Overflow
JOURNEY
• “Its not about the destination, Its all about the journey.
• Search for OSCP Similar Machines
• Lab consist of 55 machines
• Go through the video material
• Go through the pdf completely
• Do the exercises in pdf and document it.
JOURNEY
Exploiting a machine is a Systematic Process:
• Find the open ports and services running on ports
• Enumerate the services and the machine
• Exploit the correct vulnerability and gain access
• Do proper post exploitation enumeration
• Privilege Escalation
EXAM
• 23.45hrs
• 5 Machines to Crack
• 70 Marks to get pass
TIPS
• Be confident
• Be very cool and calm
• Never bother if you didn’t get access to one or two machines in
short time as mentioned in other blogs
• Enumerate well
• Take regular breaks. Go for a small walk and get some fresh air.
• Take screenshots and POCs immediately after each exploitation
steps.
• Submit the flags (local.txt & proof.txt) in the exam panel
immediately once you retrieve them
CONCLUSION
TRY HARDER 
THANK YOU

More Related Content

PDF
Oscp preparation
PPTX
AWS Cloud Security
PDF
Memcache Injection (Hacktrick'15)
PDF
Level Up! - Practical Windows Privilege Escalation
PDF
Container Security
PDF
Threat Hunting Workshop
PDF
PPT
Top 10 Web Security Vulnerabilities (OWASP Top 10)
Oscp preparation
AWS Cloud Security
Memcache Injection (Hacktrick'15)
Level Up! - Practical Windows Privilege Escalation
Container Security
Threat Hunting Workshop
Top 10 Web Security Vulnerabilities (OWASP Top 10)

What's hot (20)

PPTX
Owasp top 10 vulnerabilities
PPTX
WAF Bypass Techniques - Using HTTP Standard and Web Servers’ Behaviour
PPT
DDOS Attack
PPTX
K8s security best practices
PPTX
SC-900 Concepts of Security, Compliance, and Identity
PDF
Azure web apps
PDF
Container Security
PDF
Secure Coding in C/C++
PPT
Methods to Bypass a Web Application Firewall Eng
PPTX
Web application security
PPTX
Catch Me If You Can: PowerShell Red vs Blue
PPTX
Rest API Security - A quick understanding of Rest API Security
PDF
Privilege escalation from 1 to 0 Workshop
PPTX
Forging Trusts for Deception in Active Directory
PPTX
Metasploit
PPTX
OWASP Top 10 2021 Presentation (Jul 2022)
PDF
DerbyCon 2019 - Kerberoasting Revisited
PPT
Owasp top 10 vulnerabilities
WAF Bypass Techniques - Using HTTP Standard and Web Servers’ Behaviour
DDOS Attack
K8s security best practices
SC-900 Concepts of Security, Compliance, and Identity
Azure web apps
Container Security
Secure Coding in C/C++
Methods to Bypass a Web Application Firewall Eng
Web application security
Catch Me If You Can: PowerShell Red vs Blue
Rest API Security - A quick understanding of Rest API Security
Privilege escalation from 1 to 0 Workshop
Forging Trusts for Deception in Active Directory
Metasploit
OWASP Top 10 2021 Presentation (Jul 2022)
DerbyCon 2019 - Kerberoasting Revisited
Ad

Similar to Oscp - Journey (20)

PDF
My pwk & oscp journey
PDF
Agile testing
PDF
BSides Lisbon 2013 - All your sites belong to Burp
PDF
Scrum toufiq
PPTX
It's XP Stupid (2019)
PPTX
What aircrews can teach devops teams ignite
PDF
544 Project Part 1
PPT
Automated testing 101
PPTX
Exploratory testing
PPTX
Cron Jobs Gone Wrong: The Top Mistakes That Keep Your Tasks from Ticking
PDF
Finding Needles in Haystacks
PPTX
Automated testing
KEY
Continuous Integration In A PHP World
ODP
2014 ZAP Workshop 1: Getting Started
PPTX
Testing API's: Tools & Tips & Tricks (Oh My!)
PDF
Random thoughts and dev practices / advices to build a great product
PDF
Wilko Nienhaus - continuous delivery release the right thing, done right, at ...
PDF
DOD Presentation V2
PDF
Basics of Functional Verification - Arrow Devices
PDF
You and your code.pdf
My pwk & oscp journey
Agile testing
BSides Lisbon 2013 - All your sites belong to Burp
Scrum toufiq
It's XP Stupid (2019)
What aircrews can teach devops teams ignite
544 Project Part 1
Automated testing 101
Exploratory testing
Cron Jobs Gone Wrong: The Top Mistakes That Keep Your Tasks from Ticking
Finding Needles in Haystacks
Automated testing
Continuous Integration In A PHP World
2014 ZAP Workshop 1: Getting Started
Testing API's: Tools & Tips & Tricks (Oh My!)
Random thoughts and dev practices / advices to build a great product
Wilko Nienhaus - continuous delivery release the right thing, done right, at ...
DOD Presentation V2
Basics of Functional Verification - Arrow Devices
You and your code.pdf
Ad

More from Vandana Verma (18)

PDF
Building security into the pipelines
PPTX
Applying OWASP web security testing guide (OWSTG)
PDF
Running an app sec program with OWASP projects_ Defcon AppSec Village
PDF
SARCON Talk - Vandana Verma Sehgal
PDF
Sacon 2020 living in the world of zero trust v1.0
PDF
Addo 2019 vandana_dev_secops_culturalchange
PDF
App Sec village DevSecOps as a culture
PPTX
Web sockets - Pentesting
PPTX
Story of http headers
PPTX
Security audits & compliance
PPTX
Basics of Server Side Template Injection
PPTX
SIEM Vendor Neutrality
PPTX
Getting started with android
PPTX
Importance of Penetration Testing
PPTX
Identity & access management
PPTX
Chariot generic presentation owaspwia_Infosecgirls
PDF
OWASP - Dependency Check
PDF
Incident response in Cloud
Building security into the pipelines
Applying OWASP web security testing guide (OWSTG)
Running an app sec program with OWASP projects_ Defcon AppSec Village
SARCON Talk - Vandana Verma Sehgal
Sacon 2020 living in the world of zero trust v1.0
Addo 2019 vandana_dev_secops_culturalchange
App Sec village DevSecOps as a culture
Web sockets - Pentesting
Story of http headers
Security audits & compliance
Basics of Server Side Template Injection
SIEM Vendor Neutrality
Getting started with android
Importance of Penetration Testing
Identity & access management
Chariot generic presentation owaspwia_Infosecgirls
OWASP - Dependency Check
Incident response in Cloud

Recently uploaded (20)

PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
KodekX | Application Modernization Development
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Electronic commerce courselecture one. Pdf
PDF
Modernizing your data center with Dell and AMD
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
A Presentation on Artificial Intelligence
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
Cloud computing and distributed systems.
PDF
Approach and Philosophy of On baking technology
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Machine learning based COVID-19 study performance prediction
PPT
Teaching material agriculture food technology
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
KodekX | Application Modernization Development
Chapter 3 Spatial Domain Image Processing.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
The Rise and Fall of 3GPP – Time for a Sabbatical?
Electronic commerce courselecture one. Pdf
Modernizing your data center with Dell and AMD
20250228 LYD VKU AI Blended-Learning.pptx
The AUB Centre for AI in Media Proposal.docx
Building Integrated photovoltaic BIPV_UPV.pdf
A Presentation on Artificial Intelligence
Network Security Unit 5.pdf for BCA BBA.
Advanced methodologies resolving dimensionality complications for autism neur...
Cloud computing and distributed systems.
Approach and Philosophy of On baking technology
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Encapsulation_ Review paper, used for researhc scholars
NewMind AI Monthly Chronicles - July 2025
Machine learning based COVID-19 study performance prediction
Teaching material agriculture food technology

Oscp - Journey

  • 1. HOW TO GET STARTED WITH OSCP SREELAKSHMY PALLIYIL, OSCP
  • 2. AGENDA • Overview • Things Required for OSCP Presentation • Beginning • Journey • Exam • Conclusion
  • 3. OVERVIEW • An awesome journey where you will experience lots of excitement, pain, suffering, frustration, confidence, and motivation • Will be awarded on successfully cracking 5 machines in 23.45 hours. • One machine for exploit writing. • Other 4 machines include Enumeration, Exploitation and Post exploitation
  • 4. THINGS REQUIRED FOR OSCP PREPERATION • A ‘NEVER GIVE UP’ attitude • Basic Linux usage skills • A bit of programming knowledge • Ability to read and understand the flow of public exploits • Creative hacker way of thinking • Lots of interest, patience, and enthusiasm
  • 5. BEGINNING • Start over with Hack the box (HTB) • Get handy in using Linux • Learn a bit of python • Basic concepts such as port-scanning, web application testing, etc. • Learn Metasploit • Learn Buffer Overflow
  • 6. JOURNEY • “Its not about the destination, Its all about the journey. • Search for OSCP Similar Machines • Lab consist of 55 machines • Go through the video material • Go through the pdf completely • Do the exercises in pdf and document it.
  • 7. JOURNEY Exploiting a machine is a Systematic Process: • Find the open ports and services running on ports • Enumerate the services and the machine • Exploit the correct vulnerability and gain access • Do proper post exploitation enumeration • Privilege Escalation
  • 8. EXAM • 23.45hrs • 5 Machines to Crack • 70 Marks to get pass
  • 9. TIPS • Be confident • Be very cool and calm • Never bother if you didn’t get access to one or two machines in short time as mentioned in other blogs • Enumerate well • Take regular breaks. Go for a small walk and get some fresh air. • Take screenshots and POCs immediately after each exploitation steps. • Submit the flags (local.txt & proof.txt) in the exam panel immediately once you retrieve them