-
Notifications
You must be signed in to change notification settings - Fork 21
/
Copy pathOSCP Exercises Checklist.jex
199 lines (172 loc) · 5 KB
/
OSCP Exercises Checklist.jex
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
ad47241569c24449aa0b03b614e01694.md 000644 0000006133 13673007056 012301 0 ustar 00 000000 000000 OSCP Checklist for Exercises
### OSCP Exercise Checklist
Numbers with * means it's not required for lab report.
#### Getting comfortable with Kali
- [ ] 2.3.6 *
- [ ] 2.4.3.4
- [ ] 2.5.3 *
- [ ] 2.6.6.1 *
#### Command line fun
- [ ] 3.1.3.2
- [ ] 3.2.5.1
- [ ] 3.3.5.1
- [ ] 3.5.3.1
- [ ] 3.6.3.1
- [ ] 3.7.2.1
- [ ] 3.8.3.1
- [ ] 3.9.3.1
#### Practical tools
- [ ] 4.1.4.3 *
- [ ] 4.2.4.1
- [ ] 4.3.8.1
- [ ] 4.4.5.1
- [ ] 4.5.3.1
#### Bash scripting
- [ ] 5.7.3.1
#### Passive information Gathering
- [ ] 6.3.1.1
- [ ] 6.4.1.1
- [ ] 6.5.1.1
- [ ] 6.6.1.1 *
- [ ] 6.7.1.1
- [ ] 6.12.1.1
- [ ] 6.13.2.1
#### Active information Gathering
- [ ] 7.1.6.3
- [ ] 7.2.2.9
- [ ] 7.3.2.1
- [ ] 7.4.2.1
- [ ] 7.5.1.1
- [ ] 7.6.3.6
#### Vulnerability Scanning
- [ ] 8.2.4.2
- [ ] 8.2.5.2
- [ ] 8.2.6.1
- [ ] 8.3.1.1
#### Web Application Attacks
- [ ] 9.3.4.1
- [ ] 9.4.1.3
- [ ] 9.4.2.5
- [ ] 9.4.3.2
- [ ] 9.4.4.5
- [ ] 9.4.4.7
- [ ] 9.4.4.10
- [ ] 9.4.5.4
- [ ] 9.4.5.9
- [ ] 9.4.5.11
- [ ] 9.4.5.13
- [ ] 9.5.1 *
#### Intro to Buffer Overflows
- [ ] 10.2.5
#### Windows Buffere Overflows
- [ ] 11.1.1.2
- [ ] 11.2.3.1
- [ ] 11.2.5.1
- [ ] 11.2.7.1
- [ ] 11.2.9.1
- [ ] 11.2.10.1
- [ ] 11.2.10.2 - Extra Mile
#### Linux Buffer Overflows
- [ ] 12.2.1.2
- [ ] 12.3.1.1
- [ ] 12.5.1.1
- [ ] 12.6.1.1
- [ ] 12.7.1.1
#### Client side Attacks
- [ ] 13.1.2.3 *
- [ ] 13.2.2.1
- [ ] 13.3.2.1
- [ ] 13.3.3.1
- [ ] 13.3.4.1
#### Locating Public Exploits
- [ ] 14.3.1.1
#### Fixing Exploits
- [ ] 15.1.3.1
- [ ] 15.1.4.1
- [ ] 15.1.5.1
- [ ] 15.1.6.1
- [ ] 15.1.7.1
- [ ] 15.2.3.1
- [ ] 15.2.4.1
#### File Transfers
- [ ] 16.1.3.2 *
- [ ] 16.2.5.1 *
#### Antivirus Evasion
- [ ] 17.3.3.2
- [ ] 17.3.3.4
#### Privilege Escalation
- [ ] 18.1.1.13
- [ ] 18.1.2.1
- [ ] 18.2.3.2
- [ ] 18.2.4.1
- [ ] 18.3.2.1
- [ ] 18.3.3.1
#### Password Attacks
- [ ] 19.1.1.1 *
- [ ] 19.2.1.1 *
- [ ] 19.3.1.1 *
- [ ] 19.3.2.1 *
- [ ] 19.3.3.1 *
- [ ] 19.3.4.1 *
- [ ] 19.4.1.1 *
- [ ] 19.4.2.1
- [ ] 19.4.3.1 *
#### Port Redirection and Tunneling
- [ ] 20.1.1.1
- [ ] 20.2.1.1
- [ ] 20.2.2.2
- [ ] 20.2.3.1
- [ ] 20.3.1.1
- [ ] 20.4.1.1
- [ ] 20.5.1.1
#### Active Directory Attacks
- [ ] 21.2.1.1
- [ ] 21.2.2.1
- [ ] 21.2.3.1
- [ ] 21.2.4.1
- [ ] 21.2.5.2
- [ ] 21.3.3.1
- [ ] 21.3.4.1
- [ ] 21.3.5.1
- [ ] 21.4.2.1
- [ ] 21.4.3.1
- [ ] 21.4.4.1
- [ ] 21.5.1.1
#### Metasploit Framework
- [ ] 22.1.3.1
- [ ] 22.2.1.1
- [ ] 22.3.3.2
- [ ] 22.3.7.1
- [ ] 22.4.1.1
- [ ] 22.5.4.1
- [ ] 22.6.1.1
#### Powershell Empire
- [ ] 23.1.3.1
- [ ] 23.3.1.1
#### Assembling the Pieces
- [ ] 24.2.2.2
- [ ] 24.5.1.1
id: ad47241569c24449aa0b03b614e01694
parent_id: f8a56f6f6a9d4450b748bbc75bb96118
created_time: 2020-06-07T04:35:41.621Z
updated_time: 2020-06-19T00:58:15.771Z
is_conflict: 0
latitude: 0.00000000
longitude: 0.00000000
altitude: 0.0000
author:
source_url:
is_todo: 1
todo_due: 0
todo_completed: 0
source: joplin-desktop
source_application: net.cozic.joplin-desktop
application_data:
order: 0
user_created_time: 2020-06-07T04:35:41.621Z
user_updated_time: 2020-06-19T00:58:15.771Z
encryption_cipher_text:
encryption_applied: 0
markup_language: 1
is_shared: 0
type_: 1