-
Notifications
You must be signed in to change notification settings - Fork 21
/
Copy pathOSCP Exercises Checklist.json
1 lines (1 loc) · 3.28 KB
/
OSCP Exercises Checklist.json
1
{"id":"ad47241569c24449aa0b03b614e01694","parent_id":"f8a56f6f6a9d4450b748bbc75bb96118","title":"OSCP Checklist for Exercises","body":"### OSCP Exercise Checklist\nNumbers with * means it's not required for lab report.\n\n#### Getting comfortable with Kali\n- [ ] 2.3.6 *\n- [ ] 2.4.3.4\n- [ ] 2.5.3 *\n- [ ] 2.6.6.1 *\n\n#### Command line fun\n- [ ] 3.1.3.2\n- [ ] 3.2.5.1\n- [ ] 3.3.5.1\n- [ ] 3.5.3.1\n- [ ] 3.6.3.1\n- [ ] 3.7.2.1\n- [ ] 3.8.3.1\n- [ ] 3.9.3.1\n\n#### Practical tools\n- [ ] 4.1.4.3 *\n- [ ] 4.2.4.1\n- [ ] 4.3.8.1\n- [ ] 4.4.5.1\n- [ ] 4.5.3.1\n\n#### Bash scripting\n- [ ] 5.7.3.1\n\n#### Passive information Gathering\n- [ ] 6.3.1.1\n- [ ] 6.4.1.1\n- [ ] 6.5.1.1\n- [ ] 6.6.1.1 *\n- [ ] 6.7.1.1\n- [ ] 6.12.1.1 \n- [ ] 6.13.2.1\n\n#### Active information Gathering\n- [ ] 7.1.6.3\n- [ ] 7.2.2.9\n- [ ] 7.3.2.1\n- [ ] 7.4.2.1\n- [ ] 7.5.1.1\n- [ ] 7.6.3.6\n\n#### Vulnerability Scanning\n- [ ] 8.2.4.2\n- [ ] 8.2.5.2\n- [ ] 8.2.6.1\n- [ ] 8.3.1.1\n\n#### Web Application Attacks\n- [ ] 9.3.4.1\n- [ ] 9.4.1.3\n- [ ] 9.4.2.5\n- [ ] 9.4.3.2\n- [ ] 9.4.4.5\n- [ ] 9.4.4.7\n- [ ] 9.4.4.10\n- [ ] 9.4.5.4\n- [ ] 9.4.5.9\n- [ ] 9.4.5.11\n- [ ] 9.4.5.13\n- [ ] 9.5.1 *\n\n#### Intro to Buffer Overflows\n- [ ] 10.2.5\n\n#### Windows Buffere Overflows\n- [ ] 11.1.1.2\n- [ ] 11.2.3.1\n- [ ] 11.2.5.1\n- [ ] 11.2.7.1\n- [ ] 11.2.9.1\n- [ ] 11.2.10.1\n- [ ] 11.2.10.2 - Extra Mile\n\n#### Linux Buffer Overflows\n- [ ] 12.2.1.2\n- [ ] 12.3.1.1\n- [ ] 12.5.1.1\n- [ ] 12.6.1.1\n- [ ] 12.7.1.1\n\n#### Client side Attacks\n- [ ] 13.1.2.3 *\n- [ ] 13.2.2.1\n- [ ] 13.3.2.1\n- [ ] 13.3.3.1\n- [ ] 13.3.4.1\n\n#### Locating Public Exploits\n- [ ] 14.3.1.1\n\n#### Fixing Exploits\n- [ ] 15.1.3.1\n- [ ] 15.1.4.1\n- [ ] 15.1.5.1\n- [ ] 15.1.6.1\n- [ ] 15.1.7.1\n- [ ] 15.2.3.1\n- [ ] 15.2.4.1\n\n#### File Transfers\n- [ ] 16.1.3.2 *\n- [ ] 16.2.5.1 *\n\n#### Antivirus Evasion\n- [ ] 17.3.3.2\n- [ ] 17.3.3.4\n\n#### Privilege Escalation\n- [ ] 18.1.1.13\n- [ ] 18.1.2.1\n- [ ] 18.2.3.2\n- [ ] 18.2.4.1\n- [ ] 18.3.2.1\n- [ ] 18.3.3.1\n\n#### Password Attacks\n- [ ] 19.1.1.1 *\n- [ ] 19.2.1.1 *\n- [ ] 19.3.1.1 *\n- [ ] 19.3.2.1 *\n- [ ] 19.3.3.1 *\n- [ ] 19.3.4.1 *\n- [ ] 19.4.1.1 *\n- [ ] 19.4.2.1\n- [ ] 19.4.3.1 *\n\n#### Port Redirection and Tunneling\n- [ ] 20.1.1.1\n- [ ] 20.2.1.1\n- [ ] 20.2.2.2\n- [ ] 20.2.3.1\n- [ ] 20.3.1.1\n- [ ] 20.4.1.1\n- [ ] 20.5.1.1\n\n#### Active Directory Attacks\n- [ ] 21.2.1.1\n- [ ] 21.2.2.1\n- [ ] 21.2.3.1\n- [ ] 21.2.4.1\n- [ ] 21.2.5.2\n- [ ] 21.3.3.1\n- [ ] 21.3.4.1\n- [ ] 21.3.5.1\n- [ ] 21.4.2.1\n- [ ] 21.4.3.1\n- [ ] 21.4.4.1\n- [ ] 21.5.1.1\n\n#### Metasploit Framework\n- [ ] 22.1.3.1\n- [ ] 22.2.1.1\n- [ ] 22.3.3.2\n- [ ] 22.3.7.1\n- [ ] 22.4.1.1\n- [ ] 22.5.4.1\n- [ ] 22.6.1.1\n\n#### Powershell Empire\n- [ ] 23.1.3.1\n- [ ] 23.3.1.1\n\n#### Assembling the Pieces \n- [ ] 24.2.2.2\n- [ ] 24.5.1.1\n\n","created_time":1591504541621,"updated_time":1592528295771,"is_conflict":0,"latitude":"0.00000000","longitude":"0.00000000","altitude":"0.0000","author":"","source_url":"","is_todo":1,"todo_due":0,"todo_completed":0,"source":"joplin-desktop","source_application":"net.cozic.joplin-desktop","application_data":"","order":0,"user_created_time":1591504541621,"user_updated_time":1592528295771,"encryption_cipher_text":"","encryption_applied":0,"markup_language":1,"is_shared":0,"type_":1}