Member-only story
Try Harder: A Guide to “Smash and Grab” Your OSCP Certification — Part 3
An inside look at the Penetration Testing with Kali Linux course and the notorious OSCP exam
In my last post I went over various resources useful in the PWK labs and OSCP exam. If you haven’t read the previous posts in this series, I recommend you start at part one.
The (Revised) Hacker Methodology
When conducting a penetration test, there is a very common methodology that one typically follows when approaching a target. This is often known as “the hacker methodology”. While it can be said that “rules are made to be broken”, this framework has been used time and time again (with little modification needed) to successfully gain a foothold and own a network.
Reconnaissance
The reconnaissance phase is usually the starting point of a penetration test. Before you go charging into a network like Leroy Jenkins, you’ll likely need to research the target organization in a variety of ways depending on the what the company determines is in or out of scope.