Cracking OSCP — PWK 2020 by a regular every day normal guy


This blog about how I cracked Updated OSCP using PWK 2020 and tips for people who are trying to purse it.

About myself

The Exam

Day -1

  1. Read nmap scan line by line follow round robin algorithm in exploiting possible vulnerabilities by this way you wont end up on a rabbit holes.
  2. Privilege Escalation Tools


  • winPEAS
  • SeatBelt
  • Mssql
  • PowerUpSQL


  • linPEAS
  • linenum
  • linux-smart-enumeration

Just a normal Security Analyst