OSCP Template
OSCP Template
OSID: OS-
1|Page
Table of Contents
1.0 - High-Level Summary............................................................................................................................3
1.1 – Recommendations..........................................................................................................................3
2.0 – Methodologies....................................................................................................................................4
OS-XXXXX utilized a widely adopted approach to performing penetration testing that is effective in....4
testing how well the Offensive Security Labs and Exam environments are secure. Below is a summary
of.............................................................................................................................................................4
how OS-XXXXX was able to identify and exploit a number of systems....................................................4
2.1 - Information Gathering.....................................................................................................................4
2.2 - Service Enumeration........................................................................................................................4
2.3 – Penetration.....................................................................................................................................4
System Vulnerable: 0.0.0.0 (<Hostname>)..........................................................................................6
2.4 – Report – House Cleaning.................................................................................................................7
2|Page
1.0 - High-Level Summary
OS-XXXXX was tasked with performing an internal penetration test in the Offensive Security Labs and
Exam network. An internal penetration test is a simulated attack against internally connected systems.
The focus of this test is to perform attacks, similar to those of a malicious entity, and attempt to
infiltrate Offensive Security’s internal lab systems – the THINC.local domain, and the exam network.
OSXXXXX’s
overall objective was to evaluate the network, identify systems, and exploit flaws while
reporting the findings back to Offensive Security.
While conducting the internal penetration test, there were several alarming vulnerabilities that were
identified within Offensive Security’s network. For example, OS-XXXXX was able to gain access to
multiple machines, primarily due to outdated patches and poor security configurations. During testing,
OS-XXXXX had administrative level access to multiple systems. All systems were successfully exploited
and access granted. These systems as well as a brief description on how access was obtained are listed
below:
1.1 – Recommendations
OS-XXXXX recommends patching the vulnerabilities identified during the penetration test to ensure that
an attacker cannot exploit these systems in the future. One thing to remember is that these systems
require frequent patching and once patched, should remain on a regular patch program in order to
mitigate additional vulnerabilities that may be discovered at a later date.
3|Page
2.0 – Methodologies
OS-XXXXX utilized a widely adopted approach to performing penetration testing that is effective in
testing how well the Offensive Security Labs and Exam environments are secure. Below is a summary of
how OS-XXXXX was able to identify and exploit a number of systems.
Exam Network
0.0.0.0
0.0.0.0
0.0.0.0
0.0.0.0
0.0.0.0
2.3 – Penetration
The penetration testing portion of the assessment focuses heavily on gaining access to a variety of
systems. During this penetration test, OS-XXXXX was able to successfully gain access to 10 out of the 50
systems.
4|Page
Console text color legend:
Note: The events in this penetration test did not necessarily occur in order as described in this report.
Additionally, some output displayed in the console format above was reconstructed or modified (e.g.
aliases replaced). Both of these changes have been made to increase the readability of this report.
5|Page
System Vulnerable: 0.0.0.0 (<Hostname>)
Vulnerabilities Exploited:
Vulnerability Explanation:
Vulnerability Fix:
Severity: Critical
Proof of Concept:
Local.txt:
Privilege Escalation:
Proof.txt
6|Page
2.4 – Report – House Cleaning
Clean up was conducted after assessment of each target to remove any artifacts from the penetration
test. The removals included any user accounts created and any files uploaded to the targets.
Additionally, any configuration changes made were reverted to their original state.
7|Page