OSCP Page
Wordlist
# WEB
/usr/share/wordlists/dirb/common.txt
/usr/share/dirb/wordlists/big.txt
/usr/share/wordlists/seclists/Discovery/Web-Content/raft-medium-directories-lowercase.txt
/usr/share/wordlists/dirbuster/directory-list-2.3-medium.txt
# Passwords
/usr/share/wordlists/rockyou.txt
# Usernames
/usr/share/wordlists/dirb/others/names.txt
# Passwords Leak
https://scatteredsecrets.com
https://weleakinfo.io
https://haveibeenpwned.com
# Hashcat rules
/usr/share/hashcat/rules/
# Precomplied binaries for Windows
/usr/share/windows-resources/Cheat Sheet
Scenarios
Ports
Troubleshooting
Ressources
Useful commands
Windows & AD
Tcpdump
Python
Open Ports
OOB
Automation
Looking for creds
Information Gathering
Passive Information Gathering
Infrastructure-based Enumeration
LLM-Powered Passive Information Gathering
Active Information Gathering
Network Enumeration
Nmap Options
Protocols & Services
MSSQL
Interacting with MSSQL
Execute Commands
Read & Write Local Files
Capture MSSQL Service Hash
Impersonate Existing Users with MSSQL
Linked Database
File Transfers
Windows
Download a file with PowerShell
Execute a file in memory using PowerShell
Upload a file with PowerShell
Upload a file with PowerShell using uploadserver
File Transfers with Powercat
Invoke-WebRequest using a Chrome User Agent
File transfer using SMB
Download a file using FTP
Upload a file using FTP
File transfer with base64 encoding
File transfer with WebDav
Download a file using JavaScript and cscript.exe
File transfer using WinRM
File transfer with RDP
Download a file using Bitsadmin
Download a file using Certutil
Linux
Download a file using Wget / cURL / PHP
File transfer with SCP
File Transfer with Netcat and Ncat
File Transfer with Socat
Creating a Web Server
Encode File en base64
Shells, Payloads & Exploit
Shells and Payloads
Public Exploits
Cross-Compiling Exploit Code
Metasploit Framework
MSFVenom
Post-Exploitation
MSFconsole Commands
Meterpreter Commands
Web Enumeration
GIT
Web Enumeration
VHOST
Wordpress
SQLi
Hydra
Login Page
Password Attacks
Password Reuse / Default Passwords
Password Mutations
Remote Password Attacks
Windows Local Password Attacks / Credential Hunting
Linux Local Password Attacks / Credential Hunting
Cracking Passwords
Pivoting, Tunneling & Port Forwarding
Enumeration
Port Forwarding
Local Port Forwarding

Dynamic Port Forwarding

Reverse Port Forwarding

SSH Remote Dynamic Port Forwarding

Socat Redirection
SSH Pivoting with sshuttle
SSH for Windows
Port Forwarding with Windows netsh
Web Server Pivoting with Rpivot
Tunneling
DNS Tunneling with Dnscat2
SOCKS5 Tunneling with Chisel
ICMP Tunneling with SOCKS
RDP and SOCKS Tunneling with SocksOverRDP
Ligolo-ng
Linux
Enumeration
Exposed Confidential Information
Insecure File Permissions
Resources
Windows

Enumerating Windows

Credential Hunting
Service Binary Hijacking
DLL Hijacking

Unquoted Service Paths
Scheduled Tasks
Kernel exploits
Abusing Windows privileges
Resources
Active Directory
Enumeration
Manual Enumeration
Automated Enumeration
AD Attacks
Password Attacks
AS-REP Roasting
Kerberoasting
Silver Tickets
DCSync Attack
GPO
Active Directory Persistence
Golden Ticket
Shadow Copies
AD Tools
Netexec
Mimikatz
Lateral Movement
Lateral Movement
WMI / WinRM
PsExec
Pass the Hash (PtH)
Pass the Key / OverPass the Hash
Pass the Ticket (PtT)
DCOM
Relaying Net-NTLMv2
Phishing & Client-Side Attacks
Phishing
Cloning a Legitimate Website
Client-Side Attacks
Information Gathering
Leveraging Microsoft Word Macros
Abusing Windows Library Files
Automation
Bypass and Evasion
Bypass
Cloud
Jenkins
Last updated