- Gireesh S SDecember 10, 202457157533
Gireesh S S
An OSCP has demonstrated the ability to use persistence, creativity, and perceptiveness to identify vulnerabilities and execute organized attacks under tight time constraints. They can:
* Use information gathering techniques to identify and enumerate targets running various operating systems and services
* Write scripts and tools to aid in the penetration testing process
* Analyze, correct, modify, cross-compile, and port public exploit code
* Conduct remote, local privilege escalation, and client-side attacks
* Identify and exploit XSS, SQL injection, and file inclusion vulnerabilities in web applications
* Leverage tunneling techniques to pivot between networks
OSCP holders have also shown they can think outside the box while managing both time and resources.
Skills / Knowledge
- Kali Linux
- Command line
- Practical tools
- Bash scripting
- Passive information gathering
- Active information gathering
- Vulnerability scanning
- Web application attacks
- Windows and Linux Buffer Overflows
- Client-side attacks
- Locating public exploits
- Fixing exploits
- File transfers
- Antivirus evasion
- Privilege escalation
- Password attacks
- Port redirection and tunneling
- Active directory attacks
- Metasploit framework
- PowerShell Empire