Machines
Perform all possible offensive attack stages.
Map activity with MITRE
Understand how and why vulnerability works
Understand how vulnerability can be fixed on the compromised host
Understand how vulnerability can be triggered by IDS/IPS/XIDS/NIDS
Understand how to cover and clean-up all traces left
Use Metasploit but:
Try to understand and perform same activity fully manually
Find/write your own scripts of automation, since Metasploit is not allowed on OSCP
Last updated