Material overview
first of all, I’m really thankful for @offensive security for such a great course and great journey.
the course material is divided into 17 modules, starting with a small introduction about OS and programming theory and the second two chapters are taking you in-depth with the client-side attacks starting from macro fundamentals to create a fully undetectable macro file that runs only in memory with writing on the desk, then for other attacks for using HTA, js ..etc
Then the course goes with process hollowing and injections attacks which will help you later for more advanced attacks in a more secure environment with more restrictions and security controls, and then we start the Anti-virus evasion part which is divided into two chapters the first one talks about some basic evasion techniques and the second one go in-depth for more effective evasion techniques which you can really use in your real-life engagement not just some random attacks!
after this part you should be more comfortable in your initial access, then you go for lateral movement starting with application whitelisting bypass and CLM bypass with different techniques preparing you to start your post-exploitation attacks.
then you will go with Linux post-exploitation which is an easy chapter if have already obtained your OSCP certificate and windows credentials also, is a small chapter about basic Windows stuff.
the next two chapters were the most fun and important chapters for me ” Linux lateral movement, windows lateral movement ” which you will explore a new topics in handling AD attacks from a Linux environment and other great scenarios that I really enjoyed with working on it.
then you will go with AD attacks and SQL attacks and the different point that the topics were well arranged and all the attacks in the SQL chapters were done manually which gives you more knowledge for the background process and a more powerful mindset.
each module has a separate lab which you can try and work on everything with your hand which is really great!
challenges overview
the OSEP labs are different from OSCP, in OSEP you will have 6 challenges each one of them is some machines connected in a small environment and each time you will face different initial access and lateral movement techniques which made you by the end of the challenges have a more than a great mindset, and I have to mention that there is a discord Server that you find a great way to communicate with offensive team in case you stuck at any point or needed any help regarding the material or the challenges.
EXAM overview
at this point I can’t say to much due to offensive policy, the exam is 47:45 hour and you will have access to dashboard contain all the information that you will need during your exam, and the exam is not some machines you have to solve, the exam simulates a corporation infrastructure which you have to find your way into getting initial access and then move forward to get 10 flags or reach the secret.txt flag
I have got 7 flags within the first 10 hours and then I have gone to sleep after the break I have obtained the secret flag, and the exam has more than one path so you maybe reach a dead point and go back and start over, also bloodhound is a big supporter ! solving the challenges and taking good notes can guarantee your exam pass 100 %
you are restricted to use any commercial tools ( cobaltstrike , metaploit pro , bursuit pro .. ) , and you can use Metasploit as you want, also covenant and empire and also sqlmap are allowed
Useful resources
1- https://github.com/chvancooten/OSEP-Code-Snippets
2 – https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference/ ” this link is more than great for helping you in writing your notes !”
3- https://www.ired.team/ ” for more attacks regarding the topics in the OSEP material ”
4- https://github.com/mantvydasb/RedTeam-Tactics-and-Techniques
5- https://github.com/deletehead/pen_300_osep_prep
6- https://github.com/infosecn1nja/AD-Attack-Defense
Hints!
finish the challenges
take organized notes for every information ( and the codes you will write )
solve the exercises and the extra mile ( very important)
there is priv escalation attacks and web attacks that you have to be aware of them before going to the course. (OSCP is enough for this )