Skip to main content

OSCP+

·1906 words·9 mins
Table of Contents

This page was written for giving you a summary about my experience in obtaining the infamous OSCP / OSCP+ certification. There are also some tips and tricks for the exam in the end, which I think gives you a better chance for succeeding on it.

Overview
#

As there is already so much info and blogs about the OSCP cert, I only include the official description here:

“The Penetration Testing with Kali Linux (PEN-200) course is OffSec’s essential training program for aspiring penetration testers. The course teaches learners how to identify and exploit real-world vulnerabilities across computers, network security, web applications, and basic cloud environments. Emphasizing hands-on, practical learning, PEN-200 provides the core technical skills and mindset required to simulate offensive information security operations—and defend against them. It’s a critical resource for those pursuing roles such as penetration tester, security analyst, security specialist, or certified ethical hacker.

PEN-200 is organized into 20+ modules. Most modules have companion videos for the visually inclined learners. Most modules have hands-on labs to help learners practice the concept and theory taught in that module. After mastering each of the techniques and skills taught in all modules, learners can move on to the 9 challenge labs to practice a combination of skills in one lab, mimicking the real-world penetration test engagement. To help learners get ready for their OSCP+ certification exam, three challenge labs are designed to closely replicate the OSCP+ exam environment.

PEN-200 is suitable for those wishing to embark on a professional pen testing career, or wanting to learn ethical hacking skills possessed by pen testers. Before taking this course, we do suggest having hands-on practical knowledge of Linux and Windows administration, networking, and network scripting.”

The exam contains:

  • 1 AD-Set with three interconnected machines (40 Points)
    • Starting as assumed breach (provided low level credentials)
    • Includes Network Pivoting
  • 3 Standalone Machines (each 20 Points)
    • Random selection (Windows & Linux boxes)

24 hour time limit + another 24 hour for reporting. The exam is fully proctored. To pass you need at least 70 out of 100 points. There are no more bonus points, which you can collect during the course beforehand, like in the past.

Since November 2024 you also receive in addition to OSCP the OSCP+ certification. The only difference is, that the latter expires in three years without submitting CPE points, passing another exam or taking a different cert from OffSec. Yes this is only a money grab. But I also think a potential employer absolutely doesn’t care if your certification is expired.

Why did I choose this course? As it is the best known offensive security certification and with its reputation about a challenging exam, which often is described as a gateway, I just had to do this certification. I also have a passion for offensive security. I didn’t do it to show off or to get a higher paying job (there are so many people writing on the internet, they were just doing this cert to land a specific job), but to truly learn new views, techniques and approaches on the same topic. And yes it was a vastly different experience than on my “home base” HTB (neither worse nor better, just different).

Review
#

Course & Challenge Labs
#

I would rate the PEN-200 course a 7 / 10. The main point deduction is, that many concepts and techniques are taught only very brief. Due to my knowledge with CPTS + CRTO I easily filled the gaps. But would I have taken this course as a beginner (even with IT background), I think I would’ve not been able to even solve the capstone labs (labs at the end of each modules, which tests your practical skill). In my opinion, if a course does not teach you the skills to master the included labs / exam, not a student is at fault but the teacher / its teaching material. And no you can’t just say "Try Harder", "Do your own research", etc. At least not on a course at this price range. However there were also some major plus points on the course material over CPTS. The material and labs (f.e. fully Win 11 environments) were mostly very up to date (not looking at you Anti Virus Evasion section) and had many recent tools / exploits included, which I very liked. Short said: the material was good, but just very short in depth. It also included some modules, which were completely new to me like AWS cloud penetration stuff (tough not tested on exam).

The included challenge labs I’d rate 9 / 10. Especially the larger AD-Sets like Relia and Skylark were exceptional. Also the experience with stability and performance on any lab was really good (better then on any HTB Academy lab, esp. windows labs).

What sections / modules did I like the most?

  • Password Attacks (includes NTLM-Relaying and Windows Credential Guard)
    • This whole module lead me down into a rabbit hole in bypassing LSA protected memory on recent Windows 11 machines (fully AV evaded).
  • Phishing and Client-side Attack modules
  • The three AD modules
    • Not many new techniques encountered, but I just like Active Directory overall, so that’s already a big plus :).

What sections / modules did I dislike?

  • Learning Strategies
    • This module is wasted in my opinion. If you’re at this technical level, you should already know your own working learning methods. I skipped the module completely after a few paragraphs.
  • Antivirus Evasion
    • The methods / tools taught are quiet outdated and not really working on up to date machines (f.e. they introduce you to the free version of Shellter, which only can do 32-bit binaries). I think OffSec would better move this topic altogether to its PEN-300 course. Alternatively they could change it into simple working forms like powershell obfuscation on a simple reverse shell and AMSI- bypasses, which can be taught easy.

I cannot rate the AWS modules right know, as they are not fully done at the time of writing. My approach was to do them after passing the exam.

Time I was through the course (including challenge labs and exam) and over 100 Proving Ground labs (OffSec’s open lab environment) in about 2 months working on and off (not daily). As I mentioned before, I think you would’ve a hard time to pass the course / exam without other training material like HTB or any previous knowledge.

Exam
#

At the end was standing this very infamous known exam, which the whole certification and it’s “legendary” status in the cybersecurity space comes from. How did I fare and what was my experience? - Yes, I did pass on my first attempt (not in the time I thought of tough, I fell in quiet some rabbit holes) As of the rules of the cert dictates, I cannot go into specifics on the exam. Overall I found it fair on some sections (Active Directory) and completely CTF like on others (Standalone machines). There were a ton of rabbit holes, which I believe you would not encounter on a real environment the forms they appeared. I also had machines, where the exploit path did only properly work after a machine revert. All these experience left some bitter taste. In comparison: the included challenge labs (f.e. OSCP A, B, C) are just too easy and do not prepare you enough for the exam.

The proctoring was completely fine by me, the proctors were very kind and they never really intervened. The VPN connection was also rock solid, even tough in the beginning connection speed was slow and due to it, it came to some timeouts on nmap scans and on other tools (tough I don’t know if it was their or my end, it solved itself after a short amount of time, which was why I did not look further into it).

An absolute strong point was, that I received the result of passing in under 24 hours. That was very unexpected, coming from HTB, where I waited more than 20 business days for CDSA results. My guess is, this is because of the lower report requirements and/or more resources on OffSec’s side.

Conclusion
#

Would I do the course / exam again? I find this question hard to answer. I guess if I had to pay for the course myself, I would say clearly no. The money is so much better spent onto HTB courses. However if the course would be on the same level as HTB cost-wise, I would say yes. OffSec teaches you a completely different view, methodology and approach in terms of enumeration, which is very valid. I just think their course is nowhere the level the exam is.

CPTS vs OSCP
#

There is no clear winner, both have their own strong points:

PointCert to approach
beginner friendlyCPTS
cost wiseCPTS
more recent materialOSCP
lifetime access to materialCPTS
cert recognitionOSCP
community (discord f.e.)CPTS (HTB)
vendorsupportOSCP (OffSec)
proctored, fewer / no cheatersOSCP
depth of skillset taughtCPTS
If you can, I would recommend doing both in the order CPTS -> OSCP. Best doing the latter payed by your employer.

Tips & Tricks for Exam
#

Like always, here is my list, if you want to do the certification yourself:

  • Even if you can do all included challenge labs blind, you still might fail. You need to learn the style how OffSec boxes, with their rabbit holes are built. My guess is, that’s the main reason, why even experienced people, which hold CPTS can fail the exam (there are some reviews out their). Best approach to do this is doing Proving Ground Practice boxes. The style is very similar, I strongly believe the authors of these boxes and the exam boxes are the same.
  • Initial Access is Key. If you are limited in time, what to learn. Focus on learning Enumeration for Initial Access. If you can’t get initial access you fail the exam, as you are not able to privilege escalate.
  • Privilege Escalation is real easy (any privilege escalation I had done in max. 30 minutes)
  • The exam is not overly hard, there are just so many misleading points, where you can get lost. There are no custom exploits, no custom script writing, no WAF or brute force limitation bypassing included.
  • Take the approach KISS: Keep it simple and stupid. What services are running, what version are they, what default credentials are known.
  • Report while you go. Every time you reach a flag, hold on and report to this point, before you go on.
  • Reporting was really a cake. I had it done in about 2 hours (I used https://sysreptor.com/). I also did not find one review, where someone mentioned he failed the exam because of reporting. My guess is, if you can overall explain how you compromised the machines, you’re already golden. You don’t have to give CVSS scores and detailed remediation recommendations like on HTB.
  • If you get stuck for more than 2 hours, get off your computer to clear your mind and to reassess.
  • You have more than enough time for the exam.
  • Revert boxes and don’t hesitate to contact support if your machine behaves oddly. Retry exploits / methods again after reverts.
  • Learn ligolo-ng it makes the whole pivoting part easy and stable.
  • Learn how to debug if an exploit is successful, but you don’t get a reverse shell back (crucial skill). Learn how to bypass firewalls.