Oscp Webinar
Oscp Webinar
Oscp Webinar
AD Preparation
Michael Mancao
Agenda
● OSCP Exam Tips
○ Practice
○ Common Pitfall
● OSCP Exam Scheduling
● Success Tips
● Proctoring Process
○ Preparation checklist
● QA
● Support
● Q&A
OSCP Exam Changes
3
OSCP Exam Structure
10 Bonus Points Requirements
● Complete the lab report AND the course exercises*
● After March 14, 2022, lab reports must also include the full exploitation of an
Active Directory set in the labs.
Approaching the Exam
Attempt Active Directory
● AD gives you 40 points. You can be flexible on how to get the 30 points:
○ AD + 1 stand-alone + lab report
○ AD + 2 stand-alone machines
○ AD + 1 stand-alone machine + partial points
● You must you get all 3 AD machines, no partial points are awarded for this challenge.
7
Study Approach
Go over course materials for each Start exploiting labs!
module ● Learning Path Blog Post &
● Read PDF and watch videos Article
● Practice the course lessons with your ● Exploit lab machines
client and lab machines ● Create a lab report
● Take notes! ● Simulate a practice exam
1 2 3
* subject to change
Course Materials & Exercises
● The course materials and exercises are not a waste of lab time!
○ Builds solid understanding of the fundamental concepts and techniques.
● Your assigned machines are extremely valuable.
○ Allows you to directly observe attacks on your machine.
○ Gives you a user/admin perspective to better understand the target.
○ The Windows Client and Server are a mini-AD environment.
● Exercises are great for practicing and for bonus points on the exam.
○ Complete the Topic Exercises & PDF Exercises.
○ Try the Extra Miles.
Start Exploiting the Labs!
1. To get started, read the PWK Labs Learning Path:
○ Walkthroughs for Alpha and Beta lab machines.
○ Hints for 9 additional lab machines.
2. Build your methodology using the walkthroughs.
○ The write-ups detail the techniques, methodology, and thought process
used to exploit Alpha and Beta.
○ Refine and practice your methodology on 9 lab machines with hints.
○ Continue exploiting the “low-hanging fruit” in the labs.
Find and Exploit AD Lab Machines
● Post-exploitation is as important as initial enumeration.
○ Unlike stand-alone machines, AD needs post-exploitation.
○ Practice by finding dependencies between AD lab machines.
● There are a total of 2 AD sets in the labs. It is up to you to find them.
○ Enumerate and attack the 2 domains along with the sandbox.local
domain from the course materials.
○ Try different tools for AD enumeration and exploitation.
Practice, Practice, Practice!
Practice as many machines as you can on all 3 lab networks.
Don’t Panic
● There is more than enough time to finish the exam.
● If you need to work for 24 hours, you need more preparation.
Reporting
● Document your exercises and lab report with the exam report
requirements.
○ This will be good practice for writing your exam report.
○ This will also help give you bonus points during the exam.
● Prepare a report template prior to your exam.
○ Updated lab & exam report template: Pen-200 Reporting Requirements.
○ The template gives you a direction on what to document.
OSCP Exam Tips
18
Read the Exam Control Panel
1. Read the instructions for each machine before you start.
○ It will give you an idea on the structure of the AD set.
○ It will be evident if there is a buffer overflow machine assigned to you.
2. Plan based on the objectives outlined in your Control Panel.
○ Identify whether you will start with AD set or stand-alone machines.
○ Format your report template in line with the requirements of each
machine.
Enumeration Tips
Initial Enumeration
● Perform light scans on your targets .
○ E.g. scan for 10 common ports on your exam machines.
○ Manually interact with services found while waiting for thorough and longer scans.
Enumerate carefully
● Avoid heavy scans on multiple targets.
● Revert machines after running unsafe scans.
● Re-run scans to ensure all information are correct. Scans can be inaccurate.
○ Use various tools to verify scan outputs.
Enumeration Tips
Enumeration is a cyclical approach
● After gaining new access, enumerate again in the context of your new privileges.
○ If you gain login access to a webpage, enumerate the webapp as that user
○ If you gain domain user access to a machine, enumerate the domain as that
user.
● This concept often overlooked.
○ Students tend to stop enumerating after getting a shell/root access.
Exploitation Tips
Make sure to read exploits prior to using them.
● Do you need to set up files or permissions prior to running the exploit?
● Do you need to modify the exploit to match your target?
AD Exploitation
● Have a cheatsheet of AD commands.
○ Be thorough for enumeration, exploitation, and post exploitation.
● Do not ignore standard enumeration, check applications and non-AD related services.
● Try using information you obtained on multiple domain machines
Document & Backup!
● Document all commands, outputs, scripts, and code you use.
25
Schedule your Exam
● Schedule your exam several weeks prior.
○ We recommend at least 3 weeks before the desired date.
○ You can reschedule your exam up to 3 times.
○ You can reschedule your exam up to 48 hours prior to exam start time.
● Be mindful of the time and timezone (e.g., GMT).
○ If you do not arrive within 1 hour of your exam start time, your exam will
be cancelled.
Exam Scheduling
Exam Confirmation Email
“Penetration Testing with Kali Linux - Proctored Certification Exam
Confirmation - OS-XXXX” email contains:
● How to start the exam and login to the proctoring tool.
● Technical requirements to take the proctored exam.
● Exam proctoring rules.
● Instructions on how to submit your exam report.
Exam Logistics & Proctoring
29
Exam Logistics
● Identify where you intend to take the exam.
● Check government cybersecurity laws. Some countries have strict firewall restrictions.
● Prepare backup Internet connection in case of emergencies.
● Check for scheduled power outages in your area.
● Prepare food and snacks for the 24 hour exam.
○ Water is critical, remain hydrated.
● If other people will be in the room during the exam, inform them regarding the exam
protocol.
Proctoring Requirements
Technical Requirements
● Proctoring technical requirements are outlined here.
● Schedule a test session if you are using a Linux variant.
ID requirements
● Valid government-issued ID in english.
○ Contains your full name, photo, birthdate, country, issue and expiry date.
● Prepare a scanned copy in case your ID is not clear in the camera.
Mentally Prepare Yourself
● Be confident in the preparation you completed.
○ Remember, the exam is just another day in the labs.
● Be calm and avoid worrying about the exam.
○ Try eating out or going to the gym (activities that relax your mind).
● Be healthy.
○ Get plenty of sleep and rest, stay hydrated.
During the Exam
33
Proctoring Process
Proctoring process can start 15 minutes before your exam time.
Overcoming Stress & Anxiety
● If you are panicking, take a moment to stop and collect yourself.
○ Do activities that calm you like meditating or taking a walk.
● Stick to your time schedule.
○ As long as there is time, keep working.
○ Many students finish exams in buzzer beaters.
● It’s ok if you don’t do well.
○ Many OffSec employees had multiple attempts.
○ You will also learn and gain the exam experience.
Before Ending the Exam
● Double check the exam requirements.
● Review and finalize all of your notes.
● Make sure you have captured all the necessary screenshots and proofs.
● If you have the time, re-exploit machines after a revert.
○ Ensures your steps results are correct.
○ Double check proofs and screenshots are correct.
Contact Protocol
● For connectivity issues & issues with machines, contact us immediately.
○ Chat: https://chat.offensive-security.com
○ Email: help@offensive-security.com
● OffSec Student Mentors (SMs) will not assist with exam objectives.
○ However, reach out if you feel overwhelmed or need a sounding board.
Post Exam
38
Writing your Report
● Get sleep & refresh your mind.
○ You have 24 hours for the report, there is time to rest.
● Take the time to write a detailed report.
○ The report is important, it is the product you are delivering to the client.
○ It should be organized, professional and will be clearly understood.
● Proofread your report.
○ Double check if the necessary screenshots and proof files are present
and correct.
○ We do not accept changes or updates to submitted reports.
Upload Login Page
Upload Report Page
Double Check the MD5 Hash
1. After uploading your report, upload.offsec.com will provide the MD5 hash
of your report.
2. Compare MD5 hash of the uploaded file with your local copy.
3. If the values do not match, your file did not upload successfully.
Additional Resources
43
OSCP Exam Resources
Proctoring proctoring@offensive-security.com
46
Good Luck!
47