Reporting
Exam Network
Enter all individual IPs
Enter all AD IPs (3 machines)
Enter private interface Ips for AD if applicable
Service Enumeration
Port scan results in tabular format in single record (TCP/UDP)
Heading for particular service enumeration, from where we found a potential target software
Initial Access
Heading for which attack is exploited
Vuln explanation
Vuln Fix
Severity
Steps to Reproduce
Nmap command and output (screenshots)
Searchsploit for exploit (ss)
Exploit URL and modification (modified code)
Payload generation
File transfer commands and ss
Shell reception
PoC Code
Priv Esc
Heading for issue exploited
Explanation
Fix
Severity
Steps to Reproduce
Commands and output with ss
Post Exploitation
Proof files screenshots
If Windows, use PsExec to get SYSTEM
Proof screenshot format:
Type proof.txt && whoami && ipconfig
If AD,
Mimikatz enum
Groups Enum
RDP screenshots
Pivoting tools and commands
Exam Guide: https://help.offensive-security.com/hc/enus/articles/360040165632-OSCP-Exam-Guide
Last updated