2. OSCP PLAYBOOK


1. Host Enumeration

1.1. Passive Enumeration

1.2. Active Enumeration


2. Vulnerability Scanning


3. Web

3.1. Web Application Enumeration

3.2. Web Application Attacks


4. Client-side

4.1. Target Reconnaissance

4.2. Client-side Attacks


5. Exploits


6. Anti-virus Evasion

6.1. Evasion Testing

6.2. Evasion TTPs


7. Password Attacks

7.1. Remote Password Attacks

7.2. Hash-stealing

7.3. Hash-cracking


8. Windows Privilege Escalation

8.1. Enumeration

8.2. Privilege Escalation


9. Linux Privilege Escalation

9.1. Enumeration

9.2. Privilege Escalation


10. Port Tunneling & Pivoting

10.1. Linux Pivoting

10.2. Windows Pivoting

10.3. Other Tunnels


11. Metasploit Framework


12. Active Directory

12.1. Enumeration

12.2. Manipulation & Escalation

12.3. Authentication Manipulation

12.4. Credential Spraying

12.5. Movement