OSCP: My Experience - Part 3
This post is part three of a series, as seen below:
- Part 1: PWK Syllabus
- Part 2: Tool Enumeration
- Part 3: Penetration Testing Topics
- Part 4: Course, Lab, and Exam Overview
- Part 5: OSCP Takeaway
This post focuses on exploitation topics that helped me greatly with the course and lab. See references below:
- Reverse shell cheat sheet:
- Using reverse shells with different tools:
- Creating Metasploit Payloads:
- Understand difference between a reserve shell and a bind shell
- Exploit Writing: Stack Based Overflows:
- Intro to Exploit Development:
First, it’s all about getting shellz. There are a number of ways in the lab to exploit a machine to get it to send you back a shell. I used netcat and multi/handler predominately for catching shells, but there were a number of times that I needed to get creative with how to receive a shell. The reverse shell cheat sheet and lanmaster’s “Using reverse shells with different tools” helped point me in the right direction.
The “Creating Metasploit Payloads” link is a great resource for how to use msfvenom. When I went through the OSCP, any payload created with msfvenom was allowed on the exam. I’m not sure that will always be the case, so make sure to check the Exam Guide when you go through, especially when dealing with anything Metasploit, cause I’ve heard they might’ve changed (as of August 2019, msfvenom payloads are allowed).
For Buffer Overflows, above are the two tutorials I used to get familiar with them. There are tons more around the Internet to practice with. The OSCP course teaches you how to do one with step-by-step instructions, so from my experience, not too much before hand knowledge is required, but obviously it helps.
Side note, something I used to always remember backwards: Bind shell is a type of shell in which the target machine opens up a listener on the victim machine and waits for an incoming connection. The attacker then connects to the victim machine’s listener. A reverse shell is a type of shell in which the target machine communicates back to the attacking machine. The attacking machine has a listener port on which it receives the connection.
The next two topics both deal with privilege escalation:
- Windows Privilege Escalation Fundamentals:
- Encyclopedia Of Windows Privilege Escalation Video:
- Level UP conference talk on Windows privX:
- Great script for finding exploits for vulnerable Windows targets:
- Basic Linux Privilege Escalation:
- Linux privX talk:
- Privilege escalation enumeration scripts:
- Great scripts for finding exploits for vulnerable Linux targets:
- Great script for finding exploits for vulnerable Unix targets:
Privilege Escalation is something I had trouble with until I found these resources. Often I would get a low privileged shell and have no clue what to do next. Reading through the tutorials and watching the videos helped establish a stepping stone for me to learn how to properly enumerate while having a low privileged shell. The scripts also really helped push me in the right direction.
Part of the high level checklist I created to guide me through privilege escalation included:
- Checking for kernel or OS exploits.
- CHECKING RUNNING SERVICES. What is installed and running on the target? Is there a local exploit available for that service?
- Looking for misconfigured file permissions (those checker scripts are great for this). Is there something readable/writeable to me that shouldn’t be? For example: should I be able to write to a file owned by user/group root? Probably not. What about scheduled task/cron jobs? Can I use those somehow?
- Lastly, I would just look around for any files that maybe have a password in them. Example: SQL/Apache config files. Did someone leave a password lying around that I could use?
I’ve included a ton of information in this post, so lastly, I’ll leave you will the best way to learn everything that was just outlined: practice.
Below are VMs that can be found on VulnHub. These machines are similar to those found in the PWK lab and OSCP exam.
- Beginner friendly
- Intermediate
- Others
If you get to the point where comfortable rooting these, you’re more than prepared for the lab.
Continue to Part 4: Course, Lab, and Exam Overview.
Let me know what you think of this article on twitter @_TheGetch_!