March 10, 2016 Karn Ganeshen

My OSCP Experience

Becoming the Stronger version of Self – My OSCP Experience
Today I am proud to announce I have achieved my personal target of attaining OSCP certification.
I am sharing my experiences I had preparing for PWK course and OSCP exam.
Let me start by stating that this one is unique and a worthy challenge. OSCP demands a lot of time and effort. It will test your mettle. It will make you toil. It will push you in the face many times, and you’d have to pull your chin back up – fast – and Try harder.
It is not a piece of cake like most other multiple-choice question based paper certifications. The only way to roast this juicy steak is prepare, learn, practice, and Try harder. Seriously, no shit.
I love penetration testing & am deeply passionate about continuos learning. And OSCP has been the most elusive learning objective for a long time. So, I decided it was time and I registered for the course.

I believe any new challenge is more about preparing mentally first, and then comes everything else – planning, time management, setting milestones, learning, practicing, self-evaluation, learning & practicing more, and then hitting the challenge.
Therefore, before I started, I had set forth 5 affirmations and 3 principles for myself – for working on PWK course and preparing for OSCP:
My Affirmations
  1. I may not know a lot of things and it is Okay – no need to beat myself about it
  2. I am doing PWK to Learn what I do not know
  3. It Is possible to PWN All the boxes in the Lab and Exam networks
  4. This Is worth my effort and time
  5. No matter how hard it is, I Will earn OSCP
My Principles
  1. I will pwn majority of boxes in all the network segments of lab
  2. I will not ask anyone for straight up hints, and / or answers
  3. I will figure out each challenge myself
Students can talk to other students and IRC support guys and ask questions, but there is only one answer you will learn to expect – Try Harder. Rarely will you ever receive a straight answer or a good hint from OffSec support team on irc. That will churn up the frustrations of not knowing stuff, and that Is Good.

But I understand some students like to work together and collaborate on solving the lab network systems and OSCP exam. And that’s one way of learning. My take on this is – it’s the easy way out, and it’s not worth it.

I chose to abide by my 3 principles absolutely and boy, it was so worth it.
When you hit road-blocks, and you will certainly hit them if you choose to follow the principles above, I recommend you continue pushing onenumerating, researching, enumerating again – and you Will find the solution.
I hit road blocks a few times in the lab. Breaking the principles looked so alluring back then, but I am glad I stuck to them. I did check with irc support guys to see if I was on the right track, & then I would continue on. I figured out the what’s, and hows’ myself. It brings confidence, and what you learn after so many hours all by yourself, you won’t have to try to remember that trick, it will stay naturally with you.
The Lab Environment
The lab environment is a complex, multi-segment network, with a total 4 network segments. We need to learn, and find ways to pwn all these network segments. I pwn’d all (except 4) boxes in these networks. I am confident had I spent more time on those, I would have solved them as well. But, don’t fret over getting all the boxes. If you can get about 30 + boxes, it should be fine.
Also it is very important – during the preparation at least – to surround yourself with positive entities / people – family, friends, peers – who support your belief and effort on this learning road. Second, build self belief in your abilities and achievements. Use these to create a better self-confidence and a drive to help keep you pushing forward.
I took a 90 day lab access (12 weeks). 12 weeks is enough time to cover the lab and be ready for exam. 
I started the preparations 2-3 weeks before the course start date. I started with Vulnhub and practiced heavily on about a dozen VMs. I learnt a lot from each of them. I Highly recommend getting in the trenches with Vulnhub disks.
I received the course materials a week before the course start – (W0). My next step was to finish off all the lab exercises before the lab access got started (W1). 
I did finish most of the exercises, read up on various topics, and I also prepared up the roofies [notes, tips & techniques, scripts, etc] so I was ready to kick the lab boxes straight in. 
Start W1, I was excited and all charged up. It was awesome to find so many different targets, flavors, services, and challenges associated with them.
I spent around 7-8 hours per day on an average, at times more for about 7 weeks straight (W1-W7). My objective was to learn, practice, pwn, document, and repeat. If you can spend 4-5 hours a day, it should suffice.

Update Plan of Action

After taking a break for W8 and W9, at W10, I was feeling much better and jumped back to the labs, and reviewed my work. I had already pwn’d most boxes, and I decided to change the course of action for the remaining 3 weeks.
In W10, W11, and W12, I repeated the challenges at least twice. I pwn’d the boxes afresh, worked the full attack cycle again. I re-did easy boxes, as well as difficult boxes, and for some scenarios, I added new complexities myself. For example, in one of the scenarios, I decided to remove administrative privs from a specific local user and then identified an alternate way to pwn those set of boxes; in another instance, I decided to play with tunneling & chaining across networks, so on.
With these repetitions, I figured out what I had missed on the first round, collected the information pieces from locations I had ignored earlier, and overall, I learnt to fine tune the attack cycle & post exploitation phase.
So, I’d recommend you take out at least one week to repeat practice all the boxes in lab. It is important to keep practicing the steps, and techniques, and fine tune the cycle.
As I did and redid the practice, I was constantly updating my notes, and arsenal. After lab access ended, I cleaned up my notes (KeepNote) once again, added a few new tools, and organized the overall structure of notes.
Having an organized Note structure, will save you a Lot of time and confusion. Same goes for the tools, scripts & binaries. I organized my roofies too, and continued to update them with tips & tricks, techniques, gotchas, when I found something new, & useful.
The Exam
Exam is truly challenging – to say the least.
It made me push my planning, thinking, strategy, techniques’ correlation to attack vector(s) – to the Extreme.
OSCP is the Super Saiyan level exam, compared to other – mere mortal – theory, MCQ based exams.
Do not go in lightly, or casually. This one Exam deserves absolute dedication.
Exam is 24 hours long. You get 5 boxes to pwn. Target is to get administrator / root shell access on all the boxes, collect certain flags. Total scoring is 100 points. You need to score 70 points to pass.
Oh, and one more thing – You get to use Metasploit with a very restricted, specific set of usage conditions, lest you lose your points, and of course no VA scanners are allowed.
After the 24 hours exam, you get another 24 hours to write up a good report, and send it to OffSec team.
Exam boxes are Not in any manner, same or even remotely similar, to the lab boxes. Having said that, if you learn well in the lab, you will know what to employ to 0wn the Exam.
Sharpen the sword well, in the labs, and you will slice through the Exam.
I was able to pwn 4 boxes with full Administrator / root shell access, and the final box with local user access.
Achieving OSCP has been an awesome learning experience, and an extremely fulfilling one. It has helped me grow into a stronger version of my self as a professional pentester.
Thank You mutz!
Tagged: , , , , , , ,

Comment (1)

Leave a Reply

Your email address will not be published. Required fields are marked *