OSCP Resources

Backdoors/Web Shells

http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet
https://highon.coffee/blog/reverse-shell-cheat-sheet/
http://pentestmonkey.net/tools/web-shells/php-reverse-shell
http://pentestmonkey.net/tools/web-shells/perl-reverse-shell
https://github.com/bartblaze/PHP-backdoors
https://github.com/BlackArch/webshells
https://github.com/tennc/webshell/tree/master/php/b374k
https://github.com/tennc/webshell/tree/master/php/PHPshell/c99shell
http://www.acunetix.com/blog/articles/web-shells-101-using-php-introduction-web-shells-part-2/
http://securityweekly.com/2011/10/23/python-one-line-shell-code/

Buffer Overflows

http://www.primalsecurity.net/0x0-exploit-tutorial-buffer-overflow-vanilla-eip-overwrite-2/
http://proactivedefender.blogspot.ca/2013/05/understanding-buffer-overflows.html
http://justpentest.blogspot.ca/2015/07/minishare1.4.1-bufferoverflow.html
https://samsclass.info/127/proj/vuln-server.htm
http://www.bulbsecurity.com/finding-bad-characters-with-immunity-debugger-and-mona-py/

Information Gathering/Reconnaissance

LeeBaird Discover Script
https://github.com/leebaird/discover

The Basics Of Penetration Testing
https://www.hackcave.net/2015/11/the-basics-of-penetration-testing.html

Penetration Testing Framework
http://www.vulnerabilityassessment.co.uk/Penetration%20Test.html

Cross-Compilation

Local File Inclusion/Remote File Inclusion (LFI/RFI)

File Transfer

**SCP, WGET, FTP, TFTP, CURL, NC, FETCH Fuzzing Payloads

General Notes

Jailed Shell Escape

Linux Post-Exploitation

Linux Privilege Escalation

Metasploit

MSFVenom Payloads

Port Scanning

Password Cracking

Pivoting

Remote Desktop Protocol (RDP)

Samba (SMB)

TTY Shell Spawning

SQL Injection

Vulnhub VMs

HackTheBox (HTB) and TryHackMe (THM)

HTB is a penetration testing platform with many machines that feel like they belong in the OSCP labs. All you have to do is pass the registration challenge and only then, you will have your VPN access provided. I suggest doing a few as it is free and an excellent way to prepare for the exam without downloading a vulnerable VM.

Web Exploitation

Windows Post-Exploitation

Windows Privilege Escalation

Last updated