;tdlr This is going to be a long post. You have been warned :)
Little background around me. I work as a cyber security consultant at one of the big4s. I do penetration testing as part of my day to day work. OSCP was on my list for a long time. Around April 2018 i made up my mind and decided to enrol on OSCP. I also did lot of vulnhub machines and played CTF's as well so that gave me good base for the course.
So i completed the registration and i took the 90 days lab. i patiently waited for the email from offsec on the starting of my PWK course.
I got the welcome email from Offsec. i got the videos, PDF's and VPN to the offsec labs. I spent around 2 days going through the videos and pdfs. i did that so that i know about the basics. Once that is done. i started hitting the labs. The labs in OSCP comprised of ~58 machines. It is separated into three different networks, only one subnet is a public network. You have to crack machines to know which machines gives you access to other subnets.
I work from 10 am to 7 pm so i decided to spend at least 6 hours daily on OSCP labs so that i did the labs from 8 Pm to 1 am daily. Weeks passed, i was able to get some of the easy machines which are in public subnet. One piece of advice that OSCP course gave me is that enumeration is the key. I got struck in lot of places because i didn't do proper enumeration. Offsec forums are good source of knowledge and indirect hints if you get really struck. Offsec admins have kept it good that there is no spoiling happening on the lab machines. I happen to take notes as i when i made progress on each machines. Thank you evernote.
A month passed i was able to get around 25 machines and while cracking one of machines i stumbled upon access to another subnet. I got back to reading and understood how to pivot into internal networks. The concept of pivoting was super cool to do. i started cracking on machines in that subnet as well.
There are 4 difficult machines in public network which took lot of time for me to crack. They are gh0st, pain , Humble and Sufferance. This four machines are most hard ones than the public network. I took good amount of time on each one of them. i got to say the person who designed these machines really made it real good so that you get to learn a lot about concepts. While cracking the other machines i was able to get hold of the last subnet. There are machines in that subnet which requires you to double pivot into that subnet. There is a machine called "Jack" which was even more tougher than public ones. I kept a entire day to practice the buffer overflow in the PDF. i knew this is a confirm machines so i made sure i get a good hands on that.
It was close to 60 days since i started my lab. i was already losing my sleep. i was able to get all the machines in lab in all the subnets. i decided that it is time to schedule the exam and try my chance there.
OSCP exam is a continuous 24 hour exam were you are given 5 machines. You need to get 70 points out of 100 to pass the exam and get the certification. I scheduled my exam on last week of July 2018. i revisited all the machines which i felt tough and i went through my notes.
Around the scheduled time i got the mail that the exam has began. i quickly went through the exam guide and made sure that i checked all the instructions, checked the connectivity.
There were five machines in which are combined of both linux and windows. i started with the buffer overflow machine. Little over 2 hours i was able to get shell on BOF machines. I took screenshots of the steps. i started the enumeration of the other machines. Time was running by i was not been able to get any good heads on the other 4 machines. So i took a small 10 min break and i had a good coffee.
Coming back fresh i enumerate got a low point machines. It was direct one that i overlooked in the enumeration process. i got little confident. I started enumeration on the other machines which had a web app. The machine i got was little similar to the one of the machines in lab ( But it is not identical). I got a limited shell on that machine.
I further did more enumeration on the other machine and i got a reverse shell on the other machine as well. So i have 2 limited shell machines for which i need to do the privilege escalation. i worked on more enumeration on these 2 machines after 12 hours i got root on both the machines. Now i have enough marks to pass the exam.
With 12 hours left. It was already 4 AM in the morning so i decided to take a small Nap. i setup my alarm for 8 AM. I wasn't getting enough sleep due to excitement. i woke up at 7.30 AM before the alarm and i started working on the final machine. That machine will make you fall in rabbithole a lot. After a lot of struggles around 10.30 AM i got the limited shell. Only 2 hours left for the 24 hours lapse so i decided to check my screenshots so that i haven't missed any screenshots. I tried privilege escalation but i wasn't able to get root on time before the VPN expired.
I took few hours off after the exam expired and i started writing the documentation. I double checked everything so that i don't miss any details. I mailed the documentation to offsec AND I WAITED.
After waiting for 2 days. Got the email that i cleared. i jumped in happiness :). That day was the good Day for me :) celebrated it with family and friends :)
My Hunger for Exploits Grew..........
OSCE & CTP Course..
The buffer overflow module in OSCP fondled my thirst for more bigger exploitation challenges. i wanted to go deep into Reverse engineering and exploit-development. As a part of my work i do a bit of reverse engineering but it is quite limited and i never had any exposure as this level. So badly i wanted to do it.
I made up my mind but what the heck should i do so that i am better prepared for the course. This course registration it self is little different. You need to crack a challenge to even get registration of the course.
I decided to learn more to crack the registration. The registration is located here. I wanted to get hold of the reverse engineering basics before i started with this. I started going through the SLAE course. This teaches you shellcoding basics of linux. i went through the 32 bit course. Going through the syllabus you can say this course is more focused on the 32bit. Some say which is outdated by the old saying goes "you need to learn to walk before you can run".
Once the SLAE is done i decided to hit fuzzysecurity and corelean tutorials on exploitation. I redid each and every tutorial again questioning each and everything, finding answer for the same. You can refer to this link.
Then i hit the challenge and i was able to solve it. If you have did SLAE you will know why even through OSCE itself is windows focused :). I registered for 30 days. If you can spend like i did 30 days could be good else go for 60 days.
I waited for the day patiently and like OSCP i got the VPN, Videos and PDFs. The Labs in OSCE are little different from the OSCP. You are not given any machines where you do those machines and obtain root. OSCE is mostly focused on the what is given in the syllabus so there are very few machines.
OSCE deals with the following concepts.
- Web Application Angle
- Backdoor Angle and Antivirus Bypass
- Exploit Development
- 0day Angle
- Network Exploitation angle
i started with the web application ones i was to follow it and complete it. The ones which are most tougher ones are the later ones. The 0day angle module where you hit one of softwares which is famous and you write exploit for it.
I was loosing more sleep and i spent from around 8 Pm to 4 AM in the morning to get through with the concepts.
I was able to get all the modules in CTP course and the lab is done for. Now i am still not confident enough for the exam. i wanted to get more out of it before i get the hands on the exam. i started with vulnserver. i kept preparing vulnserver again and again. Once that is done i went over to exploit-db and downloaded the vulnerable applications and practiced without looking at the exploits.
Now i got little bit of confidence i decide to schedule the exam. i took a week off from work and i scheduled the exam in mid of october 2018.
OSCE is a brutal 48 hour exam where you have to crack 4 challenges. You need 75 out of 90 to pass the exam. This followed by 24 hours of reporting. i was excited and scared at the same time.
i got the email on the scheduled exam day with the VPN and exam guide link. i took a hour to go through the exam guide and challenges description.
i started with the challenges on the lower points. i was trying hard to complete it and after 5 hours i was able to complete it. i moved to Web application challenge, i was so confident on the web application challenge thought i could clear it. 12 hours later i am still struck at web challenge.
After 2 hours later i got reverse shell and i took another solid 2 hours to escalate it to root. i missed that due to incomplete enumeration. *Banged my Head* with close to 30 hours left i still didn't have the required points to pass. i started with the AV challenge and due to small overlook i didn't find the obvious answer. I cleared that challenge. i was feeling little relaxed.
Now one large monster left. "The Mother of All challenges" Machine.
I have to warn you this challenge will make you mad. This is one mother of god challenge. I started with and i was able to get hang of it after observing around 6 hours. You have to use your RE, exploit whatever the skill you have on this. Few hours later i was able to crack that challenge. I learned more than the course itself on this challenge. God knows how much google i did for this.
With this i was able to crack all the machines a full 90/90 points :). I took screenshots for the challenges and i re read the requirements as well. i was into 35 hours in the exam with no sleep. i was literally crawling.
I took few hours a small NAP. i started preparing the documentation and submitted as per instructions.
AND THE WAITING BEGINS...........
I was literally jumping in JOY. People near me never saw a grown man jumping like this :P. i completed both OSCP and OSCE in around 5 months time. This was best ever learning experience. i started look differently now with lot of lateral thinking.
Whats Next? ...
I am thinking of getting OSEE, But it requires a large foundation. For now i just want to focus a lot about new research in Cyber Security and learning new concepts on the fly. i am very happy offsec made these courses. They really defined my knowledge in the subject. Thanks offsec :)
Feel free to leave your comments...