All Projects → whoisflynn → Oscp Exam Report Template

whoisflynn / Oscp Exam Report Template

Modified template for the OSCP Exam and Labs. Used during my passing attempt

Projects that are alternatives of or similar to Oscp Exam Report Template

Oscp Exam Report Template Markdown
📙 Markdown Templates for Offensive Security OSCP, OSWE, OSCE, OSEE, OSWP exam report
Stars: ✭ 2,066 (+308.3%)
Mutual labels:  oscp, offensive-security
Oscp Pwk
This is my cheatsheet and scripts developed while taking the Offensive Security Penetration Testing with Kali Linux course.
Stars: ✭ 406 (-19.76%)
Mutual labels:  oscp, offensive-security
Redteam Tactics And Techniques
Red Teaming Tactics and Techniques
Stars: ✭ 2,190 (+332.81%)
Mutual labels:  oscp, offensive-security
Rapidscan
🆕 The Multi-Tool Web Vulnerability Scanner.
Stars: ✭ 775 (+53.16%)
Mutual labels:  oscp, offensive-security
Vanquish
Vanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple active information gathering phases.
Stars: ✭ 449 (-11.26%)
Mutual labels:  oscp, offensive-security
Oscp Human Guide
My own OSCP guide
Stars: ✭ 358 (-29.25%)
Mutual labels:  oscp, offensive-security
Reconnoitre
A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, along with writing out recommendations for further testing.
Stars: ✭ 1,824 (+260.47%)
Mutual labels:  oscp, offensive-security
Awesome Oscp
A curated list of awesome OSCP resources
Stars: ✭ 804 (+58.89%)
Mutual labels:  oscp, offensive-security
aterm
It records your terminal, then lets you upload to ASHIRT
Stars: ✭ 17 (-96.64%)
Mutual labels:  reporting, offensive-security
RedTeaming-Tactics-and-Techniques
Red Teaming Tactics and Techniques
Stars: ✭ 2,991 (+491.11%)
Mutual labels:  offensive-security, oscp
Vhostscan
A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages.
Stars: ✭ 767 (+51.58%)
Mutual labels:  oscp, offensive-security
php-reverse-shell
PHP shells that work on Linux OS, macOS, and Windows OS.
Stars: ✭ 274 (-45.85%)
Mutual labels:  offensive-security, oscp
Buffer overflow
Don't let buffer overflows overflow your mind
Stars: ✭ 131 (-74.11%)
Mutual labels:  oscp, offensive-security
Pwk Oscp Preparation Roadmap
Roadmap for preparing for OSCP, anyone is free to use this, and also feedback and contributions are welcome
Stars: ✭ 142 (-71.94%)
Mutual labels:  oscp, offensive-security
OSCP-A-Step-Forward
Opening the door, one reverse shell at a time
Stars: ✭ 126 (-75.1%)
Mutual labels:  offensive-security, oscp
oscp-omnibus
A collection of resources I'm using while working toward the OSCP
Stars: ✭ 46 (-90.91%)
Mutual labels:  offensive-security, oscp
Ignition Contracts
The contracts used to display solutions on Ignition and Flare
Stars: ✭ 372 (-26.48%)
Mutual labels:  reporting
Pwndoc
Pentest Report Generator
Stars: ✭ 417 (-17.59%)
Mutual labels:  reporting
Vulnhub Ctf Writeups
This cheasheet is aimed at the CTF Players and Beginners to help them sort Vulnhub Labs. This list contains all the writeups available on hackingarticles.
Stars: ✭ 368 (-27.27%)
Mutual labels:  oscp
Penetration Testing Study Notes
Penetration Testing notes, resources and scripts
Stars: ✭ 461 (-8.89%)
Mutual labels:  oscp

OSCP Report Templates

This repo contains my templates for the OSCP Lab and OSCP Exam Reports. The reports are nearly identical, with minor variations between them.

I wanted to share these templates with the community to help alleviate some of the stress people feel when they start their report.

Notable Edits - Lab Report

  1. Updated version to 3.2
  2. Updated the Table of Contents to reflect the new data flow of the document
  3. Added more information to the High Level Summary
  4. Added a total of 10 machine sections. (Copy and paste these if you are reporting more than the 10 machines required for the lab report)
  5. Updated 3.1 Information Gathering (For each machine, I create a link to the associated machine)
  6. Updated the documentation flow. Each Machine is given its own section. Creates a boot to root walkthrough feel for each machine
  7. Added the Service Enumeration table to each machine section instead of one table for the entire report
  8. Added a header for Nmap scan results (screenshot)
  9. Added a header for Initial Shell Screenshot
  10. Added headers for Proof.txt Contents and the Proof.txt Screenshot
  11. Added Appendix 1 - Proof Contents. This is an easy way to track those keys
  12. Added Appendix 2 - PWK Course Exercises
  13. Included all the headers for the requested exercises. The exercises are not included, as they are present in the course material

Notable Edits - Exam Report

  1. Updated version to 3.2
  2. Updated the Table of Contents to reflect the new data flow of the document
  3. Added more information to the High Level Summary
  4. Updated 3.1 Information Gathering (For each machine, I create a link to the associated machine)
  5. Updated the documentation flow. Each Machine is given its own section. Creates a boot to root walkthrough feel for each machine
  6. Added the Service Enumeration table to each machine section instead of one table for the entire report
  7. Added a header for Nmap scan results (screenshot)
  8. Added headers for Local.txt Contents (the hash) and Local.txt Screenshot
  9. Added headers for Proof.txt Contents and the Proof.txt Screenshot
  10. Created a machine entry for the Buffer Overflow machine.
  11. Added Appendix 1 - Proof and Local Contents. This is an easy way to track those keys
  12. Added Appendix 2 - Metasploit/Meterpreter Usage. If you use the allowance on the exam, this is an easy way to document it
  13. Added Appendix 3 - Completed Buffer Overflow Code

Notice

Original template was created by Offensive Security and can be found here: https://www.offensive-security.com/pwk-online/PWKv1-REPORT.doc

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].