Skip to content
Waleed Zafar edited this page Mar 1, 2023 · 1 revision

Welcome to the OSCP-Prep-Guide wiki!

A curated list of TryHackme (THM) and HackTheBox (HTB) resources, modules and rooms to be used with OSCP. The list is not complete and will be updated regularly

OSCP Training

Basic Linux Usage

Basic Commands

https://tryhackme.com/room/linuxfundamentalspart1

Managing Linux Services

https://tryhackme.com/room/linuxfundamentalspart2

Installing and removing tools

https://tryhackme.com/room/linuxfundamentalspart3

Bash Basics

https://tryhackme.com/room/linuxfundamentalspart2

Piping and Redirection

https://academy.hackthebox.com/module/18

Text (String) search and Manipulation

https://academy.hackthebox.com/module/18

Editing and Comparing Files

https://academy.hackthebox.com/module/18

Downloading Files

https://tryhackme.com/room/linuxfundamentalspart3

Managing Processes and Monitoring Commands

https://tryhackme.com/room/linuxfundamentalspart3

More training

https://tryhackme.com/room/linuxstrengthtraining

Notes

Please complete both of the following modules for Linux Basics. Both are free of charge.

https://academy.hackthebox.com/module/18

https://tryhackme.com/module/linux-fundamentals

Tools Usage

Netcat and Socat

https://tryhackme.com/room/introtoshells

https://tryhackme.com/room/activerecon

PowerShell and Powercat

https://academy.hackthebox.com/module/details/167

https://tryhackme.com/room/weaponization

https://tryhackme.com/room/powershell

https://tryhackme.com/room/powershellforpentesters

Wireshark and tcpdump

https://tryhackme.com/room/wireshark

https://tryhackme.com/module/wireshark

https://tryhackme.com/room/tshark

https://academy.hackthebox.com/module/details/81

https://tryhackme.com/room/overpass2hacked (For Practice)

https://tryhackme.com/room/h4cked (For Practice)

Bash Scripting plus example Tool creation as assignment

https://tryhackme.com/room/bashscripting

https://academy.hackthebox.com/module/details/21

Passive Information Gathering

https://academy.hackthebox.com/module/details/28

https://tryhackme.com/room/redteamrecon

https://tryhackme.com/room/passiverecon

Website Recon

Whois

https://tryhackme.com/room/introtonetworking

Google Dorking

https://tryhackme.com/room/googledorking

Netcraft and Recon-ng

https://tryhackme.com/room/redteamrecon

https://academy.hackthebox.com/module/details/144

Shodan

https://academy.hackthebox.com/module/details/28

https://tryhackme.com/room/shodan

Opensource Tools

https://tryhackme.com/room/gitandcrumpets

https://tryhackme.com/room/committed

SSL Server Testing and Security Header Scanners

https://tryhackme.com/room/httpindetail

https://www.ssllabs.com/ssltest/

https://academy.hackthebox.com/module/details/144

Pastebin

https://academy.hackthebox.com/module/details/28

Email Harvesting and Password Dumps

https://www.kali.org/tools/theharvester/

https://github.com/praetorian-inc/Hob0Rules/blob/master/wordlists/rockyou.txt.gz

Social Media Tools

https://academy.hackthebox.com/module/details/112

OSINT (Maltego and OSINT Framework)

https://tryhackme.com/room/redteamrecon

https://tryhackme.com/room/searchlightosint

https://tryhackme.com/room/sakura (OSINT Practice)

https://osintframework.com/

https://www.social-searcher.com/

https://digi.ninja/projects/twofi.php

https://github.com/initstring/linkedin2username

Active Information Gathering

https://tryhackme.com/room/activerecon

DNS Enumeration

https://tryhackme.com/room/webenumerationv2

https://academy.hackthebox.com/module/details/27

Port Scanning

https://tryhackme.com/module/nmap

https://tryhackme.com/room/intermediatenmap

https://tryhackme.com/room/rustscan

https://academy.hackthebox.com/module/details/19

SMB, SNMP, NFS and SMTP Enumeration

https://tryhackme.com/room/enumerationpe

https://tryhackme.com/module/intro-to-networking

Vulnerability Scanning

https://academy.hackthebox.com/module/details/108

Vulnerability Scanning Basics

https://academy.hackthebox.com/module/details/108

Scanning with Nessus

https://tryhackme.com/room/rpnessusredux

Scanning with Nmap and NSE

https://tryhackme.com/room/furthernmap

Web Attacks

Methodology and Enumeration

https://tryhackme.com/room/webenumerationv2

Web Application Assessment

https://tryhackme.com/module/learn-burp-suite

https://tryhackme.com/room/toolsrus

Web Application Exploitation

https://academy.hackthebox.com/module/details/189?redirect_to_section=2019

https://tryhackme.com/room/owaspjuiceshop

https://tryhackme.com/room/owasptop10

https://academy.hackthebox.com/module/details/134

SQLi

https://academy.hackthebox.com/module/details/177

https://academy.hackthebox.com/module/details/33

https://academy.hackthebox.com/module/details/171

https://academy.hackthebox.com/module/details/58

https://tryhackme.com/room/sqlmap

https://tryhackme.com/room/sqhell

https://tryhackme.com/room/sqlinjectionlm

https://tryhackme.com/room/sqlilab

XSS

https://tryhackme.com/room/xssgi

https://tryhackme.com/room/xss

https://academy.hackthebox.com/module/details/103

Directory Traversal and LFI

https://tryhackme.com/room/fileinc

https://tryhackme.com/room/archangel (Practice)

https://academy.hackthebox.com/module/details/23

Buffer Overflows

https://tryhackme.com/room/bufferoverflowprep (OSCP Oriented Lab)

https://tryhackme.com/room/chronicle

Overflow Basics

https://tryhackme.com/room/bof1

Windows Buffer Overflows

https://academy.hackthebox.com/module/details/89

Linux Buffer Overflows

https://academy.hackthebox.com/module/details/31

Client-Side Attacks

Social Engineering

https://academy.hackthebox.com/module/details/28

https://tryhackme.com/room/phishinghiddeneye

https://tryhackme.com/room/phishingyl

HTML Attacks

Microsoft Office Attacks

https://tryhackme.com/room/mrphisher

https://academy.hackthebox.com/module/details/115

Public Exploits

https://tryhackme.com/room/ide

Searching for Exploits

https://www.exploit-db.com/

https://bugtraq.securityfocus.com/

https://academy.hackthebox.com/module/details/77

Using Public Exploits

https://academy.hackthebox.com/module/details/184?redirect_to_section=1946

Modifying Public Exploits to fit our needs

Exploit Transfer

Transferring to Windows Hosts

https://academy.hackthebox.com/module/details/167

Exe2hex and PowerShell

Uploading using TFTP

PureFTPd

AV Evasion

https://tryhackme.com/room/introtoav

https://tryhackme.com/room/avevasionshellcode

https://tryhackme.com/room/redteamnetsec (IPS/IDS evasion)

https://tryhackme.com/room/obfuscationprinciples

https://tryhackme.com/room/signatureevasion

On Disk Evasion

In memory Evasion

https://tryhackme.com/room/abusingwindowsinternals

https://tryhackme.com/room/dllhijacking

https://tryhackme.com/room/windowsinternals

Privilege Escalation

Windows Privilege Escalation

https://tryhackme.com/room/windows10privesc

https://tryhackme.com/room/windowsprivesc20

https://tryhackme.com/room/bypassinguac

https://academy.hackthebox.com/module/details/67

Linux Privilege Escalation

https://tryhackme.com/room/linuxprivesc

https://tryhackme.com/room/linprivesc

https://tryhackme.com/room/commonlinuxprivesc

https://tryhackme.com/room/linuxprivescarena

https://tryhackme.com/room/dirtypipe

https://academy.hackthebox.com/module/details/51

Password Attacks

https://academy.hackthebox.com/module/details/147

https://tryhackme.com/room/passwordattacks

https://tryhackme.com/room/crackthehashlevel2 (Practice)

https://tryhackme.com/room/johntheripper0

Generating Custom Wordlists

Brute forcing

https://academy.hackthebox.com/module/details/20

https://tryhackme.com/room/johntheripper0

Htaccess, THC Hydra and Crowbar

https://tryhackme.com/room/hydra

https://academy.hackthebox.com/module/details/184?redirect_to_section=1946

Using Password hashes

https://academy.hackthebox.com/module/details/147?redirect_to_section=1657

https://academy.hackthebox.com/module/details/147?redirect_to_section=1638

https://tryhackme.com/room/credharvesting

https://tryhackme.com/room/attackingkerberos

Port Redirection and Tunneling

https://academy.hackthebox.com/module/details/158

Port Forwarding

https://tryhackme.com/room/extendingyournetwork

SSH Port Tunneling

PLINK.exe and NETSH

HTTP Tunneling

https://tryhackme.com/room/yotf

Active Directory Attacks

https://tryhackme.com/module/hacking-active-directory

https://tryhackme.com/room/attacktivedirectory

https://tryhackme.com/room/winadbasics

https://tryhackme.com/room/zer0logon

https://tryhackme.com/room/exploitingad

https://academy.hackthebox.com/module/details/22

https://academy.hackthebox.com/module/details/68

https://academy.hackthebox.com/module/details/69

https://academy.hackthebox.com/module/details/74

https://academy.hackthebox.com/module/details/84

https://academy.hackthebox.com/module/details/143

Enumeration

https://tryhackme.com/room/adenumeration

Authentication Attacks

https://tryhackme.com/room/breachingad

https://tryhackme.com/room/attackingkerberos

Lateral Movement

https://tryhackme.com/room/lateralmovementandpivoting

Persistence

https://tryhackme.com/room/persistingad

Metasploit

https://tryhackme.com/module/metasploit

https://academy.hackthebox.com/module/details/39

Exploit Modules

Payloads

Building your own module

Automation and Post Exploitation

https://academy.hackthebox.com/module/details/115?redirect_to_section=1132

PowerShell Empire

https://academy.hackthebox.com/module/details/74?redirect_to_section=1395

https://tryhackme.com/room/rppsempire

Usage

Modules

A Complete Example Pentest Breakdown

https://academy.hackthebox.com/module/details/48

https://tryhackme.com/room/vulnnetendgame

https://tryhackme.com/room/relevant

Reporting

https://academy.hackthebox.com/module/details/162

Clone this wiki locally