1 of 7

Penetration Testing 13

OSCP Machine

2 of 7

Setup the VM

Just double-click the oscp.ova file

https://download.vulnhub.com/infosecprep/oscp.zip

Run an arp-scan to reveal the IP of the target machine.

3 of 7

4 of 7

Found us a secret.txt file in that nmap scan with some Base64 encoded fun.

Decode the Base64 for the Private Key

5 of 7

6 of 7

7 of 7

-p Turned on whenever the real and effective user ids do not match.

Disables processing of the $ENV file and importing of shell functions.

Looks like bash has misconfigured permissions.

sudo sh -c ‘cp $(which bash) .; chmod +s ./bash’