My OSCP journey began in 2019. I was fortunate to have my employer at the time pay for the 3-month access pass for the PWK course. And I didn’t do squat with it… I let it expire, but fortunately I changed roles at that employer and had a new manager who offered to renew it for another 3 months. And still, I did nothing with it….

My 2nd PWK course expired right before the 2020 pandemic started. Incidentally, I started a new role at a new company literally the week the country shut down. I was also teaching during this time (a cybersecurity boot camp at UT Austin) and though my new job and teaching duties kept me busy, there was still some time to kill.

I setup some virtual happy hours during the first few months the country was shut down, and we often worked on some Hack the Box (HTB) machines during these meetings. I also found some time in the evenings to work on HTB machines, often found while Googling “OCP HTB labs” or similar machines. I tried to do one a week while I was teaching, but after that cohort finished I tried doing a machine every 1-2 days.

I approached the HTB machines by doing the walkthroughs. I focused on walkthroughs that did not utilize Metasploit, and even wrote a few myself and submitted them to Hack the Box (most of them are below). While either following walkthroughs, or writing my own, I started collecting notes on how to use tools, commands that might be frequently used, and getting familiar with the overall pentesting process.

VulnHub OSCP Machines

  1. Kioptrix: Level 1
  2. Kioptrix: Level 1.1
  3. Kioptrix: Level 1.2
  4. Kioptrix: Level 1.3
  5. FristiLeaks: 1.3
  6. Stapler: 1
  7. PwnLab: init

Intermediate?

  1. Kioptrix 2014
  2. Brainpan: 1
  3. Mr-Robot: 1
  4. HackLAB: Vulnix

Unknown

VulnOS: 2
SickOs: 1.2
/dev/random: scream
pWnOS: 2.0
SkyTower: 1
IMF

TryHackMe


HackPark

HTB OSCP Machines

In no particular order:

  1. Lame (Linux) – Easy
  2. Beep (Linux) – Easy
  3. Sense (FreeBSD) – Easy
  4. Grandpa (Windows) – Easy
  5. Granny (Windows) – Easy
  6. Mirai (Linux) – Easy
  7. Chatterbox (Windows) – Medium
  8. Solidstate (Linux) – Medium
  9. Jeeves (Windows) – Medium
  10. Bashed (Linux) – Easy
  11. Cronos (Linux) – Medium
  12. Nibbles (Linux) – Easy
  13. Tally (Windows) – Hard
  14. Valentine (Linux) – Easy
  15. Bart (Windows) – Medium
  16. Bastard (Windows) – Medium
  17. Popcorn (Linux) – Medium
  18. Nineveh (Linux) – Medium
  19. Optimum (Windows) – Easy
  20. Arctic (Windows) – Easy
  21. Haircut (Linux) – Medium
  22. Shocker (Linux) – Easy

Others

Devel
Resolute
Obscurity
Traceback
Remote (Password Protected)
Monteverde
Access (Windows) – Easy
RedCross (Linux) – Medium
Mischief (Linux) –