# refabr1k's Pentest Notebook

{% embed url="<https://refabr1k.gitbook.io/oscp/>" %}

:bulb: Use the search function to look for a command.

## Must read

* Windows Privilege Escalation - <https://www.fuzzysecurity.com/tutorials/16.html>&#x20;
* Linux Privilege Escalation - <https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/>
* hakluke's OSCP guide pt. 1 - <https://medium.com/@hakluke/haklukes-ultimate-oscp-guide-part-1-is-oscp-for-you-b57cbcce7440>
* hakluke's OSCP guide pt. 2 - <https://medium.com/@hakluke/haklukes-ultimate-oscp-guide-part-2-workflow-and-documentation-tips-9dd335204a48>
* hakluke's OSCP guide pt. 3 - <https://medium.com/@hakluke/haklukes-ultimate-oscp-guide-part-3-practical-hacking-tips-and-tricks-c38486f5fc97>
* Abatchy's OSCP guide - <https://www.abatchy.com/2017/03/how-to-prepare-for-pwkoscp-noob>
* TJnull's OSCP study guide - <https://www.netsecfocus.com/oscp/2019/03/29/The_Journey_to_Try_Harder-_TJNulls_Preparation_Guide_for_PWK_OSCP.html>
* James Hall's OSCP Prep - <https://411hall.github.io/OSCP-Preparation/>
* KongWenBin OSCP Review - <https://kongwenbin.wordpress.com/2017/02/23/officially-oscp-certified/>

## Must do

* TJnull's HTB and Vulnhub machines - <https://www.netsecfocus.com/oscp/2019/03/29/The_Journey_to_Try_Harder-_TJNulls_Preparation_Guide_for_PWK_OSCP.html#vulnerable-machines>
* Georgia Weidman's Cybrary Pentest Course (Free!) - <https://www.cybrary.it/course/advanced-penetration-testing/>
* OverTheWire: Bandit linux challenges - <https://overthewire.org/wargames/bandit/>
* Windows/Linux Privesc Workshop (lpeworkshop) - <https://github.com/sagishahar/lpeworkshop>
* Metasploit Unleashed - <https://www.offensive-security.com/metasploit-unleashed/>
* **Try harder**

## Must use&#x20;

* SecLists wordlists - <https://github.com/danielmiessler/SecLists>
* PentestMonkey cheatsheet - <http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet>
* PayloadsAllTheThings cheatsheet - <https://github.com/swisskyrepo/PayloadsAllTheThings>
* OSCP Prep Discord Channel - <https://discord.gg/2AG6TCm>
* SecWiki windows kernel exploits - <https://github.com/SecWiki/windows-kernel-exploits>
* AutoRecon.py - <https://github.com/Tib3rius/AutoRecon>
* OBS Recorder for OSCP EXAM - <https://obsproject.com/>

##


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://refabr1k.gitbook.io/oscp/master.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
