Hacker Kayra
Ctrlk
  • πŸ“Introduction Page
  • ⭐Learning Process
  • πŸ” Fundamentals
  • 🧰Tools
  • ✍️Write Ups
  • πŸ“šStudy Notes
  • πŸ§‘β€πŸ’»Other
  • πŸ—„οΈArchive/Backup/Bin
    • Sysmon Usecases (IBM)
    • 🐧Linux Fundamentals (TryHackMe)
    • πŸͺŸWindows Fundamentals (TryHackMe)
    • Active Directory (TryHackMe)
    • FOR508: Advanced Incident Response, Threat Hunting, and Digital Forensics
    • Certified Threat Hunting Professional (eCTHPv2)
    • OSCP
      • Report Writing
      • βœ…Passive Information Gathering
      • βœ…Active Information Gathering
      • βœ…Vulnerability Scanning
      • Introduction to Web Application Attacks
      • Common Web Application Attacks
      • βœ…Locating Public Exploits
      • βœ…Exploiting Walkthrough
      • Fixing Exploits
      • βœ…Antivirus Evasion
      • Password Attacks
      • Windows Privilege Escalation
      • Linux Privilege Escalation
      • Port Redirection and SSH Tunneling
      • Tunneling Through Deep Packet Inspection
      • The Metasploit Framework
      • Active Directory Introduction & Enumeration
      • Attacking Active Directory Authentication
      • Lateral Movement in Active Directory
      • Assembling the Pieces
      • Other General Information
    • ⚑Port Swigger (Web Penetration Testing)
    • Certified Bug Bounty Hunter (CBBH)
    • Getting Started
    • Certified Penetration Testing Specialist (CPTS)
    • Old Active Directory
    • Tib3rius Privilege Escalation
    • HTB Archived Write-Ups (Check)
    • πŸ“‹Cheat Sheets
Powered by GitBook
On this page
  1. πŸ—„οΈArchive/Backup/Bin

OSCP

This is my notes for the OSCP based on the original PEN-200 OSCP Course

Report Writingβœ…Passive Information Gatheringβœ…Active Information Gatheringβœ…Vulnerability ScanningIntroduction to Web Application AttacksCommon Web Application Attacksβœ…Locating Public Exploitsβœ…Exploiting WalkthroughFixing Exploitsβœ…Antivirus EvasionPassword AttacksWindows Privilege EscalationLinux Privilege EscalationPort Redirection and SSH TunnelingTunneling Through Deep Packet InspectionThe Metasploit FrameworkActive Directory Introduction & EnumerationAttacking Active Directory AuthenticationLateral Movement in Active DirectoryAssembling the PiecesOther General Information
PreviousEvent IDs, Logging, & SIEMsNextReport Writing

Last updated 9 months ago