Methodology
Introduction
It is always the 3 things for OSCP:
Vulnerable Versions
Misconfigurations
Sensitive Information
1. Vulnerable Versions -> Exploits
Check version -> Google / Searchsploit
2. Misconfigurations -> Exploits / Bypass
Default credentials / Anonymous Login / Weak Passwords
SQL injection -> Auth Bypass / File Read / Command Execution
File Upload -> RCE / Overwrite Login Files / Client side attacks
File Read -> Credential Files / Config Files / Process & Logs
Path Traversal / File Inclusion -> File Read / RCE
Mass Assignment -> Auth Bypass
3. Sensitive Information -> Logins
Credential Pairs -> Login
Usernames -> Find passwords / Brute force Login / Username as Password
Passwords -> Password Spraying
Hints to other services
Vulnerable Versions
Misconfigurations
Sensitive Information
Last updated