OSCP+ Pivoting Tool Choice: TUN (Ligolo-NG) vs SOCKS (Chisel) vs Transparent Proxy (sshuttle) — Which Fits Your Target Mix?

OSCP pivoting tool choice

Mastering the OSCP+ Pivot: Precision Over Guesswork The fastest way to lose half a day in an OSCP+ lab isn’t failing an exploit—it’s building a pivot that “works” for a browser and quietly breaks everything else. That pain has a shape: mixed traffic (HTTP + SMB/AD + RDP/WinRM), proxy-ignorant tools, and DNS behaving like a … Read more

Obsidian OSCP Enumeration Template (Per-Service) — SMB/HTTP/FTP Cards That Don’t Repeat Commands

Obsidian OSCP Enumeration Template

Obsidian OSCP Enumeration Template Most OSCP notes don’t fail because you “forgot a command.” They fail because, the next day, you can’t recreate what you proved—and your confidence turns into rework. This template is built for that exact moment: you’re tired, timeboxed, and one missing breadcrumb quietly costs you an hour. Keep guessing, and you … Read more

Kioptrix No IP Address in VirtualBox (Host-Only): The PCnet-PCI II Fix + Reset Checklist (2026)

Kioptrix VirtualBox host-only no IP

Troubleshooting Kioptrix: No IP Address in VirtualBox (Host-Only) If you’ve burned 20–45 minutes watching a Kioptrix VM boot perfectly—then sit there with no lease, no target, no IP—you already know the worst part: VirtualBox makes a broken Host-Only setup look “fine.” This guide fixes Kioptrix no IP address in VirtualBox (Host-Only) the reliable way: one … Read more

Kioptrix Level 1 Without Metasploit: Samba trans2open (CVE-2003-0201) Exploit Research + Validation

Kioptrix Level 1 Without Metasploit

Beyond the Banner: A Disciplined Approach to Kioptrix Level 1 The fastest way to fail a “simple” box is to treat a Samba banner like a contract—and a random PoC like a magic spell. Kioptrix Level 1 Without Metasploit is where that illusion dies: the version looks old, the exploit link looks tempting, and then … Read more

OSCP Rabbit Hole Rule: The 20-Minute Enumeration Timebox (With a Reset Checklist)

OSCP Rabbit Hole Rule

The OSCP Rabbit Hole Rule The rule is simple and brutal: time is a vulnerability, and it will be exploited—by indecision. One “quick scan” becomes a museum of terminal output, and somehow you’re farther from a foothold than when you started. Definition: A 20-minute enumeration timebox that forces a decision at the buzzer. Run a … Read more

OSCP-Style Proof for Kioptrix: The “proof.txt + IP in One Screenshot” Rule (with Examples)

OSCP proof screenshot

Mastering the OSCP Proof: No Theatrics, Just Receipts Nothing ages faster than a “perfect” flag screenshot you can’t defend the next morning—because the IP isn’t visible, the tab was wrong, or the interface doesn’t match your report. An OSCP proof screenshot is a single, audit-friendly image that shows the target IP address and the full … Read more

Kioptrix TTY Upgrade Checklist: From Dumb Shell to Fully Interactive (No More Broken Ctrl+C)

Kioptrix TTY Upgrade Checklist

The Kioptrix TTY Upgrade Checklist “Ctrl+C prints ^C like a little protest sign—and the process just keeps running. That’s the moment Kioptrix stops feeling like a win and starts feeling like you’re operating with oven mitts on.” If your arrows spit ^[[A, editors redraw like a haunted CRT, and copy/paste turns into static, you’re not … Read more

Kioptrix Linux Credential Hunting: Bash/Zsh History Leaks (What to Audit First)

Bash and Zsh history leaks

The Invisible Debt: Triage and Hardening for Shell History Leaks A credential leak doesn’t always arrive with fireworks. Sometimes it’s a tired one-liner—run once at 2:11 a.m.—that keeps paying interest in the worst possible way. Bash/Zsh history leaks are accidental exposures of secrets—passwords, API keys, tokens, or SSH material—that get saved in shell history files … Read more

Kioptrix Level 1 Post-Foothold Checklist: 12-Minute PrivEsc Triage (SUDO vs SUID vs Kernel)

Kioptrix Level 1 PrivEsc checklist

You don’t get stuck on Kioptrix Level 1 because you’re “missing a trick.” You get stuck because the moment you land a shell, you start wandering—and 45 minutes later you have screenshots, not a plan. This Kioptrix Level 1 Post-Foothold Checklist is a 12-minute privilege escalation triage: a tight, evidence-first way to classify your best … Read more

Kioptrix Level 2 Ping Command Injection (Proof-First Flow): Reverse Shell Risk, Evidence, and Fixes (No Metasploit)

Kioptrix Level 2 command injection

Mastering Kioptrix Level 2: Validation Over Guesswork Stop chasing shells and start proving impact. Most testers fail Kioptrix Level 2 because they prioritize the “pop” over the process. This guide shifts the focus to evidence-driven validation—the way a senior tester operates. Learn to demonstrate unsafe OS command execution without Metasploit, wrecking the lab, or losing … Read more