Obsidian OSCP Notes: Turn Nmap XML Into a One-Page Host Snapshot (Template + Workflow)

Obsidian OSCP host template

Beyond the Scan: Mastering the One-Page OSCP Workflow If your Obsidian notes feel “full” but still don’t tell you what to do next, the problem isn’t Nmap—it’s shape. Raw scan data is honest, but it’s not readable when you’re tired. When you can’t retrieve that SMB host from two days ago, you don’t just lose … Read more

OSCP+ Points Blueprint: Turn Every Lab Box Into a 10-Point “Initial Access” Checklist

OSCP initial access checklist

Ten points. One target. Zero “I swear it worked last night.” If you’ve ever “owned” a lab box and then couldn’t recreate the path the next day without improvising, your problem isn’t intelligence—it’s a workflow that doesn’t survive fatigue. In OSCP/OSCP+ practice, that gap quietly burns time, confidence, and (when it matters) scorable proof. Keep … Read more

OSCP+ Pivoting Tool Choice: TUN (Ligolo-NG) vs SOCKS (Chisel) vs Transparent Proxy (sshuttle) — Which Fits Your Target Mix?

OSCP pivoting tool choice

Mastering the OSCP+ Pivot: Precision Over Guesswork The fastest way to lose half a day in an OSCP+ lab isn’t failing an exploit—it’s building a pivot that “works” for a browser and quietly breaks everything else. That pain has a shape: mixed traffic (HTTP + SMB/AD + RDP/WinRM), proxy-ignorant tools, and DNS behaving like a … Read more

Obsidian OSCP Enumeration Template (Per-Service) — SMB/HTTP/FTP Cards That Don’t Repeat Commands

Obsidian OSCP Enumeration Template

Obsidian OSCP Enumeration Template Most OSCP notes don’t fail because you “forgot a command.” They fail because, the next day, you can’t recreate what you proved—and your confidence turns into rework. This template is built for that exact moment: you’re tired, timeboxed, and one missing breadcrumb quietly costs you an hour. Keep guessing, and you … Read more

OSCP Rabbit Hole Rule: The 20-Minute Enumeration Timebox (With a Reset Checklist)

OSCP Rabbit Hole Rule

The OSCP Rabbit Hole Rule The rule is simple and brutal: time is a vulnerability, and it will be exploited—by indecision. One “quick scan” becomes a museum of terminal output, and somehow you’re farther from a foothold than when you started. Definition: A 20-minute enumeration timebox that forces a decision at the buzzer. Run a … Read more

OSCP-Style Proof for Kioptrix: The “proof.txt + IP in One Screenshot” Rule (with Examples)

OSCP proof screenshot

Mastering the OSCP Proof: No Theatrics, Just Receipts Nothing ages faster than a “perfect” flag screenshot you can’t defend the next morning—because the IP isn’t visible, the tab was wrong, or the interface doesn’t match your report. An OSCP proof screenshot is a single, audit-friendly image that shows the target IP address and the full … Read more

Kali Linux Lab Logging for OSCP/HTB: Minimal auditd Rules + journald Persistence (What to Enable/Skip)

Kali Linux lab logging

Kali Linux Lab Logging for OSCP/HTB:Building a Stubborn, Searchable Memory A Kali VM can wipe five hours of progress in one cheerful reboot. The evidence often lives only in your head and a volatile log buffer. Effective logging isn’t about building a mini-SOC; it’s about knowing exactly what ran, who ran it, and what changed—without … Read more

OSCP-Style Pentest Report on Kali: Flameshot Screenshots → Markdown Notes → Pandoc PDF (Repeatable Template)

Kali Pentest Report Template

An OSCP-Style Pentest Report on Kali At 1:47 a.m., the report doesn’t fail because you “can’t write”—it fails because your proof is scattered, your screenshots are mislabeled, and your PDF build is a one-off spell you can’t repeat. An OSCP-style pentest report on Kali fixes that by treating evidence like source code: predictable paths, clean … Read more

Essential Kali Tools (Extended Series Part 2–3): 8 Critical Tools That Saved My OSCP-Style Practice From Disaster

Essential Kali Tools

Essential Kali Tools (Extended Series Part 2–3): 8 Critical Tools That Saved My OSCP-Style Practice From Disaster At 1:07 a.m., a frozen shell and a blinking VPN can quietly steal 45 minutes—then charge you interest in doubt. If your OSCP-style practice keeps derailing, it’s rarely because you “don’t know enough.” It’s because your session has … Read more

RCE → Shell → PrivEsc: The End-to-End Exploitation Architecture — 9 Brutal Mistakes I Made (and the 1 Proven Blueprint That Fixed My Chain)

RCE

RCE → Shell → PrivEsc: The End-to-End Exploitation Architecture — 9 Brutal Mistakes I Made (and the 1 Proven Blueprint That Fixed My Chain) RCE → Shell → PrivEsc It’s not a highlight reel—it’s a reliability pipeline. I wasted 47 minutes on a “working exploit” that only worked when the target felt emotionally supported. That’s … Read more