π²OSCP Methodology
Find the foothold
Host Discovery
Port Scanning
Identify a vulnerable service
Web service
File services
SSH
Privilege escalation
Linux
Windows
Active directory compromise
Last updated