OSCP - Offensive Security Certified Professional

What is offensive security

Offensive security involves simulating a real-world cyber attack to identify vulnerabilities in an organization’s security measures, and it has become a popular method for ensuring the security of sensitive data and infrastructure. However, the process of offensive security can be complex, involving multiple phases and frameworks. In this post, we will explore the offensive security attack phases and frameworks that are commonly used by cybersecurity professionals to carry out effective security assessments. We will also discuss the importance of offensive security, the benefits of using frameworks, and how they can be adapted to meet the specific needs of an organization.

Penetration testing

Penetration testing, also known as pen testing, is a type of offensive security assessment that involves simulating a real-world cyber attack on an organization’s systems and infrastructure. Pen testing typically follows a series of well-defined attack phases, which are designed to simulate the different stages of a real-world cyber attack.

OSCP phases

  1. Reconnaissance

  2. Scanning & Enumeration

  3. Exploitation (Gaining Access)

  4. Privilege Escalation

  5. Command & Control (Persistence/Maintaining Access)

  6. Clearing / Covering Tracks

Last updated

Was this helpful?