- Information Gathering and Reconnaissance
- Network and Web Exploitation
- OS & Application Exploitation
- Databases Exploitation
- Binary Exploitation
- Password Cracking
- Reverse Shells
- Windows Privilege Escalation
- Windows Active Directory Exploitation
- Linux Privilege Escalation
- Supplementary Materials
o Windows System Administration
o Linux System Administration
o Database Administration
o Regular Expressions
,Copyright © 2024 by HackNotes
All rights reserved. No part of this publication may be reproduced,distributed, or transmitted in any form
or by any means, including photocopying, recording, or other electronic or mechanical methods,without
the prior written permission of the publisher.
Accessing an information system without the express permission of the owner is illegal and this book
does not encourage or promote unethical behavior.
Product names, logos, brands and other trademarks featured or referred to within HackNotes are the
property of their respective trademark holders. The author does not intend to infringe on any trademark.
These trademark holders are not affiliated with HackNotes. They do not sponsor or endorse our products,
materials or company in any way.
HackNotes attempts to ensure that the information in this publication is complete and accurate; however,
this information may contain typographical errors or other errors or inaccuracies. We assume no
responsibility for such errors and omissions. HackNotes assumes no responsibility for any damages
resulting from the use of information in this publication.
If you have any suggestions or corrections please contact at
, Please take a careful look at the exam page guide to
familiarize yourself with the exam structure, the
allowed tools and the online labs.
Link
https://help.offsec.com/hc/en-
us/articles/360040165632-OSCP-Exam-Guide
Moreover, make sure to read the OSCP on-boarding
process from the link below
https://help.offsec.com/hc/en-
us/articles/4406841351316-PEN-200-
Onboarding-A-Learner-Introduction-Guide-
to-the-OSCP