Professional Documents
Culture Documents
OSCP Syllabus 2023 Update
OSCP Syllabus 2023 Update
OSCP Syllabus 2023 Update
Penetration Testing Welcome to PWK ● Take inventory over what’s included in the
with Kali Linux : course
General Course
Introduction
● Set up an Attacking Kali VM
Introduction to Threats and Threat Actors ● List and describe different classes of
Cybersecurity threat actor
Effective Learning Tactics and Common ● Explore the SQ3R and PQ4R Method
Strategies Methods
Report Writing for Understanding Note-Taking ● Review the deliverables for penetration
Penetration Testers testing engagements
Report Writing for Understanding Note-Taking ● Identify the general structure of pentesting
Penetration Testers documentation
Vulnerability Scanning Vulnerability Scanning with ● Understand and work with the results of a
Nessus vulnerability scan with Nessus
SQL Injection Attacks SQL Theory and Database ● Refresh SQL theory fundamentals
Types
SQL Injection Attacks Manual and Automated ● Exploit MSSQL Databases with
Code Execution xp_cmdshell
● Use SearchSploit
● Cross-compile binaries
Password Attacks Attacking Network Services ● Attack SSH and RDP Logins
Logins
● Mutate Wordlists
Password Attacks Working with Password ● Obtain and crack NTLM hashes
Hashes
Windows Privilege Abusing other Windows ● Leverage Scheduled Tasks to elevate our
Escalation Components privileges
Linux Privilege Enumerating Linux ● Understand files and user privileges on Linux
Escalation
escalate privileges
Linux Privilege Insecure System ● Enumerate the system’s kernel for known
Escalation Components vulnerabilities, then abuse them for privilege
escalation
Port Redirection and Port Forwarding with *NIX ● Learn about port forwarding
SSH Tunneling Tools
Active Directory Active Directory Manual ● Enumerate Active Directory using legacy
Introduction and Enumeration Windows applications
Enumeration
Attacking Active Performing Attacks on ● Use password attacks to obtain valid user
Directory Active Directory credentials
Authentication Authentication
Lateral Movement in Active Directory LAteral ● Understand WMI, WinRS, and WinRM lateral
Active Directory Movement Techniques movement techniques
Assembling the Pieces Enumerating the Public ● Enumerate machines on a public network
Network
Trying Harder: The PWK Challenge Lab ● Learn about the different kinds of Challenge
Labs Overview Labs