my osep journey

by emre - 28.11.2023



why did i write this
oscp is most popular and osep experiences can't be found easily. i wanted to show what my level is and how i prepared for the exam.

background
solved over 250 ctfs, oscp since 2020, started first professional job as a junior penetration tester at 2021, crtp since 2022 (gifted by company), senior penetration tester since 2023. no coding knowledge, only a little bit bash. since my area of expertise is active directory, i successfully obtained 89 domain admins during my full time pentest job until resigning. it took me two years and three months to obtain them. various scenarios, i even obtained a domain admin by using a linux cash register as foothold.

mental status
i said that i've resigned from my full time pentest job. even though i love my job and pentest so much, hard working, a cuckold manager mobbed me. i'm really tired of constant mobbing so i've resigned. i also knew that i'll remain unemployed for at least one or two years because things are pretty shitty in turkiye. pride is most important thing. anyway, i rest a bit then thought taking osep would be a good idea.

first steps
first i started to learn c++ to bypass at least windows defender. this part is not interesting because i did just watch youtube and did exercises. result, i got a successful defender bypasser. btw, i immediately bought crowdstrike falcon because if a script kiddie like me can bypass defender easily, then a leet would smash my infrastructure.

course
after creating a defender bypasser, i bought the course. i just quickly checked the pdf, a little bit reading. most important parts for me are; office phishing, uac bypass, clm bypass. because in real world pentest they're pretty not exist. then i learned every aspect of getting shell from office phising. after i jumped to labs that has six challenges which is pretty low. i successfully pwned them all then i thought i'm ready to take exam. i've booked my exam and it's 20 days away from buying course. so 70 days of lab access left and is unneccesary in my scenario.

exam
osep exam is really tough. classic offsec style with a lot of rabbit holes. i obtained the initial foothold after five hours. it's because there was a vulnerable thing i didn't even know about. so after getting initial foothold, the rest flowed away. i just did what i do in real world pentest projects but with a little extra. my ctf mindset and out of the box thinking really helped me on this. i learned how to exploit some of the vulnerabilities i encountered in the exam in exam, not from the course. in the end, i successfully obtained 12 flags and secret.txt.

certification
i started to write my report during my exam time and sent it quickly after that day. 4 days later i've received a mail from offsec that says i'm now osep certified.

if you have questions: contact