Member-only story

Try Harder: A Guide to “Smash and Grab” Your OSCP Certification — Part 3

An inside look at the Penetration Testing with Kali Linux course and the notorious OSCP exam

Tony West
7 min readJul 1, 2020
LinEnum.sh, as mentioned in part two of this guide, checks Linux systems for potential privilege escalation

In my last post I went over various resources useful in the PWK labs and OSCP exam. If you haven’t read the previous posts in this series, I recommend you start at part one.

The (Revised) Hacker Methodology

When conducting a penetration test, there is a very common methodology that one typically follows when approaching a target. This is often known as “the hacker methodology”. While it can be said that “rules are made to be broken”, this framework has been used time and time again (with little modification needed) to successfully gain a foothold and own a network.

Reconnaissance

A crude example of a sub-domain enumeration script

The reconnaissance phase is usually the starting point of a penetration test. Before you go charging into a network like Leroy Jenkins, you’ll likely need to research the target organization in a variety of ways depending on the what the company determines is in or out of scope.

--

--

Tony West
Tony West

Written by Tony West

Red Teamer and Bug Bounty Hunter. Follow me for writeups, tips, and tricks! https://un4gi.io

Responses (1)