OSEP Exam Report
OSEP Exam Report
OSEP Exam Report
OSID: XXXXX
student@example.com
v1.0
CONFIDENTIAL 1
Table of Contents
3 Findings ................................................................................................ 5
3.1 192.168.XX.XX / Hostname .................................................................................. 5
3.1.1 Local.txt/Proof.txt/Secret.txt ................................................................................................................ 5
3.1.2 Pre-Compromise Enumeration Steps ................................................................................................. 5
3.1.3 Compromise .......................................................................................................................................... 5
3.1.4 Post-Exploitation Enumeration Steps ................................................................................................. 5
3.1.5 Local Privilege Escalation ..................................................................................................................... 5
3.1.6 Screenshots ........................................................................................................................................... 5
A Appendix .............................................................................................. 6
A.1 TODO appendix title ........................................................................................... 6
1.1 Objective
The objective of this assessment is to perform an external penetration test against the Offensive
Security Exam network. The student is tasked with following methodical approach in obtaining access
to the objective goals. This test should simulate an actual penetration test and how you would start
from beginning to end, including enumeration and post-exploitation. The exam report is not meant to
be a penetration test report, but rather a writeup of the steps taken to locate, enumerate and
compromise the network. Enumeration and post-exploitation actions that lead to subsequent attacks
with successful compromises should be included in the report. An example page has already been
created for you at the latter portions of this document that should give you ample information on
what is expected to pass this exam. Use the sample report as a guideline to get you through the
reporting.
1.2 Requirements
The student will be required to fill out this penetration testing report fully and to include the following
sections:
TODO Provide relevant techniques and methods used to perform enumeration prior to initial
compromise, the steps taken should be able to be easily followed and reproducible if necessary.
Include any custom code or references to public tools.
3.1.3 Compromise
TODO Provide a description of exploitation steps to compromise the machine and obtain shell access,
the steps taken should be able to be easily followed and reproducible if necessary. Only the steps that
ended up working are required. Include any custom code or references to public tools.
TODO Provide relevant post-exploitation enumeration steps related to the network or local privilege
escalation, the steps taken should be able to be easily followed and reproducible if necessary. Include
any custom code or references to public tools.
TODO Provide a description of exploitation steps to escalate privileges on the machine if applicable,
the steps taken should be able to be easily followed and reproducible if necessary. Include any custom
code or references to public tools.
3.1.6 Screenshots
TODO The exam control panel contains a section available to submit your proof files. The contents of
the local.txt, proof.txt and secret.txt files obtained from your exam machines must be submitted in the
control panel before your exam has ended. Note that the control panel will not indicate whether the
submitted proof is correct or not.
Each local.txt, proof.txt and secret.txt found must be shown in a screenshot that includes the contents
of the file, as well as the IP address of the target by using ipconfig, ifconfig or ip addr.