OSCP Exam Playbook
#AutoRecon - Start with autorecon with a targets.txt file to easily make
#all my directories easily. You can pick the IP/IPs I will start scanning manually and
#let autorecon run in the background for the rest of the IPs# Take the time to do these scans correctly. A missed port can be the
# difference. Don't scan multiple hosts at once. It can cause ports to be
# missed.
#Most Used
rustscan -a <IP> -- -A -sC -Pn -T4 -On rustscan.txt --script=(\"'vuln'\")
sudo nmap <IP> --top-ports=5000 -sS -A -sC -T4 -Pn -On nmapscan.txt
sudo nmap <IP> --top-ports=5000 -sU -A -sC -T4 -Pn -On UDPscan.txt
sudo nmap <IP> -p --script=vuln -T4 -Pn -On vulnscan.txt
#Everything Else
rustscan -a <IP> #Hits all the ports wicked fast. Use this first as a first pass
sudo nmap --top-ports=1000 -Pn -T4 <IP> #Hits the top 1000 ports #Hits the top 1000 ports
sudo nmap -p- -Pn -T4 <IP> #Hits every port with syn/ack requests
sudo nmap -p- -sT -Pn -T4 <IP> #Hits every port with syn requests
sudo nmap -p- -sU -Pn -T4 <IP> #Hits every port with udp requests
sudo nmap -sT -sC -A -Pn -T4 -script vuln <IP> -p <PORTS> #Hits the found ports with all the goods
sudo nmap -script='<PROTOCOL>-vuln*.nse' <IP> -p <PORT> #Hits a specific service with vuln scripts
MAKE SURE TO ADD IPs AND MATCHING DOMAIN NAMES TO /etc/hosts
DNS zone transfer
Web Enumeration
Samba (SMB)
NFS
SNMP
RPC (111/tcp, 135/tcp)
ident (113/tcp)
NTP (123/udp)
NetBIOS-NS (137/udp)
Windows
After Initial Entry
File Transfers
Linux
After Inital Entry
Resources
Recon and Enumeration
Tricks
Last updated