August 11, 2023 Jesús Berriales Navas
An OSCP has demonstrated the ability to use persistence, creativity, and perceptiveness to identify vulnerabilities and execute organized attacks under tight time constraints. They can:
* Use information gathering techniques to identify and enumerate targets running various operating systems and services
* Write scripts and tools to aid in the penetration testing process
* Analyze, correct, modify, cross-compile, and port public exploit code
* Conduct remote, local privilege escalation, and client-side attacks
* Identify and exploit XSS, SQL injection, and file inclusion vulnerabilities in web applications
* Leverage tunneling techniques to pivot between networks
OSCP holders have also shown they can think outside the box while managing both time and resources.
Habilidades / conocimientos
- Kali Linux
- Network Vulnerability Scanning
- Buffer Overflow Exploits
- Exploitation
- Client Side Attacks
- Web Exploitation
- Password Attacks
- Pivoting
- Antivirus Exploitation
- Advanced Command Line
- Practical Tools
- Bash Scripting
- Active Information Gathering
- Passive Information Gathering
- Vulnerability Scanning
- Web Application Attacks
- Windows Buffer Overflow
- Linux Buffer Overflow
- Locating Public Exploits
- Fixing Public Exploits
- File Transfers
- Antivirus Evasion
- Port Redirection
- Tunneling
- Active Directory Attacks
- PowerShell Empire
- Privilege Escalation
- Metasploit
- Port Scanning
- Information Gathering
Emitida en
11 de agosto de 2023
Prescribe el
No caduca