Active Directory & Exam Simulation
OSCP Exam Strategy & Simulation
The OSCP exam is a 23-hour 45-minute practical test plus 24 hours for reporting. Strategy and time management are as important as technical skills.
Exam Structure Recap
OSCP Exam Breakdown:
├── 3 Standalone machines (60 points total)
│ ├── Machine 1: 20 points (10 local + 10 proof)
│ ├── Machine 2: 20 points (10 local + 10 proof)
│ └── Machine 3: 20 points (10 local + 10 proof)
│
├── 1 Active Directory Set (40 points)
│ ├── 2 Clients + 1 Domain Controller
│ ├── Full chain required for points
│ └── All or nothing scoring
│
└── Passing: 70 points minimum
Time Management Strategy
Recommended Time Allocation
Hour 0-2: Scan ALL machines, gather info
Hour 2-6: AD set (40 points, high priority)
Hour 6-12: Standalone machines (hardest first)
Hour 12-18: Continue standalones, revisit stuck
Hour 18-23: Final attempts, screenshot verification
The 90-Minute Rule
If stuck for 90 minutes:
├── Document everything tried
├── Move to next target
├── Return with fresh perspective
└── Often, breaks lead to breakthroughs
AD Set Strategy
The AD set is 40 points and should be prioritized.
AD Attack Flow
1. Enumerate domain from first foothold
└── BloodHound data collection
2. Find attack paths
└── Kerberoastable? AS-REP? Shares?
3. Get credentials
└── Crack hashes, harvest creds
4. Move to Client 2
└── PtH, tickets, WinRM
5. Escalate privileges
└── Local admin → Domain Admin
6. Compromise DC
└── DCSync, secretsdump, proof.txt
Common AD Exam Patterns
Typical AD Chain:
└── Web app on Client 1
└── Initial shell
└── Local privesc
└── Credentials found
└── Lateral to Client 2
└── Domain Admin path
└── DC compromise
Standalone Machine Strategy
Difficulty Assessment
Quick Assessment:
├── Many open ports = More attack surface
├── Web apps = Common entry point
├── Outdated services = Known exploits
├── Custom apps = Manual exploitation
└── Minimal services = Harder
Enumeration Checklist Per Machine
# Run immediately on each machine
nmap -sC -sV -oA nmap/TARGET $IP &
nmap -p- --min-rate=1000 -oA nmap/full $IP &
# While full scan runs:
# Check HTTP if port 80/443 open
# Check SMB if port 445 open
# Check FTP if port 21 open (anonymous?)
Documentation During Exam
Screenshot Requirements
Required Screenshots:
├── local.txt with IP and hostname
│ └── type local.txt && hostname && ipconfig
├── proof.txt with IP and hostname
│ └── type proof.txt && hostname && ipconfig
├── Initial foothold proof
└── Privilege escalation proof
Note-Taking Template
# Machine Name - IP Address
## Enumeration
- Port scan results
- Service versions
- Web directories found
## Foothold
- Vulnerability exploited
- Steps to reproduce
- Payload used
## Privilege Escalation
- Vector identified
- Exploit/technique used
- Commands executed
## Flags
- local.txt: [hash]
- proof.txt: [hash]
## Screenshots
- [ ] local.txt with IP/hostname
- [ ] proof.txt with IP/hostname
Common Exam Mistakes
| Mistake | Impact | Prevention |
|---|---|---|
| Poor time management | Miss easy points | Use timer, 90-min rule |
| Insufficient enumeration | Miss attack vectors | Enumerate thoroughly |
| Not documenting | Report gaps | Note everything |
| Rabbit holes | Wasted hours | Set time limits |
| Forgetting screenshots | Lost points | Screenshot immediately |
| Skipping UDP | Miss SNMP, TFTP | Always scan UDP |
Exam Day Checklist
Before Exam
□ VPN tested and working
□ Kali VM snapshot taken
□ Tools updated (searchsploit -u)
□ Notes organized
□ Cheat sheets ready
□ Snacks and water prepared
□ Phone silenced
□ 8+ hours sleep
During Exam
□ Start all nmap scans immediately
□ Enumerate while scans run
□ Take screenshots of EVERYTHING
□ Document all steps
□ Regular breaks (every 2-3 hours)
□ Save work frequently
□ Don't panic—methodical approach
After Exploitation
□ Screenshot local.txt with IP
□ Screenshot proof.txt with IP
□ Note all commands used
□ Verify screenshots are clear
□ Document the full chain
Practice Resources
Recommended Practice Order
1. PG Practice (Play/Practice)
└── Closest to OSCP
2. HackTheBox (Easy/Medium)
└── TJ Null's OSCP-like list
3. TryHackMe
└── OSCP learning paths
4. VulnHub
└── OSCP-like VMs
Mock Exam Simulation
Create your own mock exam:
├── 3 standalone machines (PG/HTB)
├── Set 24-hour timer
├── No hints or writeups
├── Document everything
└── Write practice report
Report Writing Tips
Report Structure
OSCP Report Structure:
├── Executive Summary
├── Methodologies
├── Machine Findings
│ ├── Service Enumeration
│ ├── Initial Access
│ ├── Privilege Escalation
│ └── Post-Exploitation
└── Appendices (code, screenshots)
Key Report Elements
Each Machine Section:
├── Screenshots with timestamps
├── Commands used (copy-paste ready)
├── Vulnerability description
├── Proof of exploitation
└── Remediation recommendations
Final Exam Tips
Success Factors:
├── Enumerate harder, exploit smarter
├── Take breaks to avoid burnout
├── Easy points first when stuck
├── Trust your methodology
├── Don't overthink—basics work
└── Stay calm and systematic
Conclusion
Congratulations on completing this OSCP Study Guide! You now have a solid foundation in:
- Network enumeration and scanning
- Web application attacks
- Linux and Windows privilege escalation
- Post-exploitation and pivoting
- Active Directory attacks
- Exam strategy and methodology
Remember: OSCP tests methodology as much as technical skill. Stay systematic, enumerate thoroughly, and document everything.
Good luck on your exam—Try Harder!
::: cta Want to continue your security journey? Check out our Security Engineer Interview Preparation course to prepare for technical security interviews, or explore our DevSecOps Fundamentals course to learn how to integrate security into the development lifecycle. :::
:::