OSCP Practice Machine Tracker
An essential, curated list of machines to practice for the OSCP—use it to plan your progression, track coverage, and focus on the most relevant targets.
Open curated list →
Capture the Flag
This is a collection of a few walkthroughs that I have published. Each of these machines are organized by OS and difficulty. I will be adding to this collection over time, but if you would like to contribute or suggest a walkthrough, feel free to reach out on LinkedIn.
An essential, curated list of machines to practice for the OSCP—use it to plan your progression, track coverage, and focus on the most relevant targets.
Open curated list →NibbleBlog enumeration, upload exploit, and sudo abuse.
Open walkthrough →Web shell discovery, sudo pivot, and cron job escalation.
Open walkthrough →Elastix LFI to credential reuse and SSH access.
Open walkthrough →Multi-app enumeration, phpLiteAdmin abuse, and privesc.
Open walkthrough →DNS zone transfer, auth bypass, and cron job takeover.
Open walkthrough →Second-order SQLi, Imagick abuse, and capability-based escalation.
Open walkthrough →hMailServer LFI, Outlook hash capture, and LibreOffice RCE.
Open walkthrough →Service enumeration, credential harvesting, and escalation.
Open walkthrough →AD enumeration, credential abuse, and Windows privesc.
Open walkthrough →MSSQL abuse, hash capture, and AD CS escalation.
Open walkthrough →Web enumeration, data extraction, and Windows escalation.
Open walkthrough →