OSCP - Offensive Security Certified Professional Practice Test

โ–ถ

OSCP Certification Guide

OSCP Key Facts: Issued by OffSec (Offensive Security) | Requires PEN-200 (PWK) course completion | 24-hour hands-on exam + 24-hour report writing | Exam machines: 3 standalone + Active Directory set | Passing score: 70/100 points | No multiple-choice questions โ€” 100% practical exploitation | Widely considered the gold standard penetration testing certification

OSCP Certification Guide: The Penetration Testing Credential That Actually Tests What You Know

The OSCP (Offensive Security Certified Professional) is different from virtually every other cybersecurity certification in one critical way: it doesn't test your ability to memorize definitions or answer multiple-choice questions. The entire exam is a 24-hour hands-on penetration test against a set of target machines you've never seen before. To pass, you have to actually compromise systems โ€” find vulnerabilities, exploit them, and document your findings in a professional penetration testing report submitted within 24 hours after the exam ends. No partial credit for knowing the theory. No recovery from a bad day of passive study. This is why OSCP carries a different weight in the security community than most other certifications.

OffSec (the company formerly known as Offensive Security) issues the OSCP as the final credential for their PEN-200 course (also called Penetration Testing with Kali Linux, or PWK). You don't register for the exam separately โ€” you purchase the PEN-200 course bundle, which includes lab access time, course materials, and one exam attempt. Additional exam attempts cost extra. The course itself covers a broad curriculum: from basic Linux command-line usage through network scanning, web application attacks, buffer overflow exploitation, privilege escalation on both Linux and Windows, Active Directory attacks, and pivoting through networks. The lab environment is a large simulated corporate network where you practice against dozens of machines across different operating systems and configurations.

The exam scoring structure divides 100 points across five target items: three standalone machines worth 20 points each (10 for initial foothold, 10 for root/SYSTEM access), plus an Active Directory set worth 40 points (for domain compromise). A passing score is 70 points. This means you can pass by getting full points on two standalone machines and partial credit on a third, or by dominating the AD set and getting one standalone machine. Many candidates focus heavily on the AD component in preparation because the 40 points it offers can make or break a passing score. Work through oscp kali linux questions and answers to solidify the tool knowledge and command-line competency the exam assumes from the first minutes of exam time.

The 24-hour exam format is deliberately brutal โ€” not as a hazing ritual but because penetration testing in the real world involves sustained focus, problem-solving under pressure, and the ability to pivot your approach when initial vectors don't work. Candidates who fail the OSCP usually fail because they haven't built that sustained operational rhythm in practice. Passing the PEN-200 labs by following walkthroughs isn't sufficient preparation. The candidates who pass have typically rooted the majority of lab machines independently, completed the external practice platforms (Hack The Box, TryHackMe, Proving Grounds), and built a reliable methodology for approaching unknown machines systematically. The buffer overflow module is particularly important โ€” many exam attempts have included buffer overflow machines, and the methodical approach to BOF is highly learnable with structured practice. Review oscp buffer overflow questions and answers to understand the technical concepts behind stack-based buffer overflows before attempting them in the live lab environment.

Network reconnaissance is the first phase of every OSCP exam and lab machine engagement. The methodology is repeatable: full port scan (all 65,535 ports), followed by service version detection and default script scanning on discovered ports, followed by targeted enumeration based on what services you find. nmap is the primary tool; additional enumeration tools vary by service type. For web services, directory enumeration with gobuster or feroxbuster, technology fingerprinting, and manual testing of discovered endpoints. For SMB, enum4linux or enum4linux-ng, anonymous share access testing, and user enumeration. For Windows RPC, NetBIOS, and LDAP, a different set of tools applies. Building a fast, thorough, and consistent enumeration methodology through practice with oscp network scanning practice test questions is the foundation on which every other OSCP skill depends.

๐Ÿ“‹ Exam Structure

  • Total duration: 24 hours of exam time + 24 hours to submit report
  • Targets: 3 standalone machines + 1 Active Directory set (DC + 2 workstations)
  • Scoring: 20 pts each standalone (10 foothold + 10 root) | 40 pts AD set (full compromise required for credit)
  • Passing: 70/100 points minimum
  • Bonus points: 10 extra points available for completing 80% of PEN-200 exercises + 30 lab proofs before exam
  • Report: Professional pentest report required โ€” submitted within 24 hours after exam ends

๐Ÿ“‹ Prerequisites & Eligibility

  • No formal prerequisites โ€” but recommended knowledge: Linux command-line proficiency, basic networking (TCP/IP, ports, protocols), familiarity with programming or scripting concepts
  • Must purchase PEN-200 course bundle (includes lab access + exam attempt)
  • Lab time options: 90 days, 180 days โ€” choose based on your available study hours
  • Recommended prior experience: CompTIA Security+, Network+, or equivalent hands-on practice
  • Platforms like Hack The Box and TryHackMe are widely recommended as pre-OSCP preparation

๐Ÿ“‹ Exam Topics

  • Active Directory attacks: Kerberoasting, AS-REP roasting, pass-the-hash, lateral movement, DCSync
  • Windows privilege escalation: Service misconfigurations, unquoted service paths, DLL hijacking, token impersonation
  • Linux privilege escalation: SUID binaries, sudo misconfigurations, writable cron jobs, kernel exploits
  • Web applications: SQL injection, command injection, file inclusion, file upload vulnerabilities
  • Buffer overflow: Stack-based BOF on 32-bit Windows applications โ€” methodical EIP control and shellcode delivery
๐Ÿ”ด Essential Technical Skills to Build First
๐ŸŸ  PEN-200 Lab Methodology
๐ŸŸก Report Writing Requirements
๐Ÿ”ฌ
PEN-200 + 90-Day Labs
๐Ÿ“…
PEN-200 + 365-Day Labs
๐Ÿ”„
Exam Retake

OSCP Exam Strategy: How to Approach the 24-Hour Challenge

The OSCP exam is as much a test of operational discipline as it is of technical skill. Candidates who fail often have the technical knowledge to pass โ€” they fail because they rabbit-hole on one machine for 6 hours, neglect proper note-taking, run out of time before attempting all targets, or submit an incomplete report. The exam format rewards systematic methodology over brilliant one-off discoveries. Start with the Active Directory set because it's worth 40 points and requires full chain compromise rather than individual machine roots. If you complete the AD set, you have 40 of the 70 points needed to pass and can approach the standalone machines with confidence rather than desperation.

Enumeration is always more valuable than exploitation attempts. When you first connect to an exam machine, run a full-port nmap scan and let it run in the background while you do a faster targeted scan. Don't start throwing exploits at the first service you identify โ€” finish your enumeration first. Candidates who start running exploits on the first open port they find often miss the actual attack vector, which might be on a high-numbered port they haven't scanned yet. Build a checklist: for each machine, document every open port, every service version, every potentially interesting file you find, every credential you discover anywhere. A credential found in a config file on one machine may be the exact thing that gets you into the next machine. This credential re-use and lateral thinking is central to the OSCP methodology. Review oscp linux questions and answers to build comfort with the Linux-based enumeration and privilege escalation techniques that appear consistently across OSCP exam scenarios.

Privilege escalation is where many candidates stall. Getting initial foothold on a machine is often straightforward โ€” a public exploit for a known CVE, a SQL injection to web shell, a file upload vulnerability. Getting from low-privilege access to root or SYSTEM is harder because it requires understanding the specific misconfiguration present on that specific machine. Use automated privilege escalation tools (LinPEAS, WinPEAS) to enumerate the machine thoroughly, but don't just run the tool and wait for a highlighted finding โ€” read through the full output. Misconfigurations that PrivEsc tools score as low severity sometimes turn out to be the exact attack vector on a specific machine configuration. Practice privilege escalation extensively through dedicated labs โ€” the password cracking and credential-based privilege escalation vectors deserve particular attention with oscp password attacks practice test before exam day. Password attacks include brute forcing, credential stuffing, and hash cracking with tools like hashcat and john โ€” all skills that compound with your enumeration and privilege escalation methodology.

Time management across the 24-hour exam needs explicit planning. Many candidates recommend setting hard time limits on each machine: try each machine for no more than 2 hours before moving on. If you're stuck, rotate to the next target. Coming back to a machine with fresh eyes after working on something else often reveals the approach you missed. Keep detailed notes throughout โ€” not just findings but failed attempts too. If a specific exploit syntax didn't work, note exactly what error you got. This prevents you from spending 45 minutes re-running the same failed command you already tried 4 hours ago. Rest during the exam if needed โ€” a 90-minute nap at hour 16 is more valuable than pushing through on 18 hours of exhaustion and missing obvious findings on the final machines.

Pros

  • Hands-on practical exam โ€” actually demonstrates competency rather than memorization
  • Highly respected in penetration testing and red team hiring โ€” often listed as preferred qualification
  • PEN-200 lab environment provides extensive realistic practice against diverse targets
  • The skills built preparing for OSCP transfer directly to real penetration testing work
  • No annual renewal โ€” OSCP does not expire once earned

Cons

  • Expensive compared to most certifications โ€” $1,499+ for the base package
  • Significant time investment required โ€” casual study is not sufficient preparation
  • 24-hour exam is genuinely stressful and physically demanding
  • Prior knowledge gap is steep for candidates without hands-on Linux/networking experience
  • Report writing under time pressure at hour 24+ is underestimated by many candidates
๐Ÿ”ง

Build Linux fluency, practice on TryHackMe beginner paths and Hack The Box Starting Point, learn networking fundamentals and basic scripting

๐Ÿ“š

Work through all course modules in order, complete lab exercises for bonus points, root lab machines independently before checking hints

๐ŸŽฏ

Complete OffSec Proving Grounds Practice machines, practice full Active Directory attack chains, time your enumeration and write a sample report

๐Ÿ•

Start with AD set, enumerate systematically, time-box each machine at 2 hours before rotating, take rest breaks, document everything throughout

๐Ÿ“‹

Write professional pentest report with all required screenshots and exploitation steps โ€” late submissions are automatic failures

Start Free OSCP Practice Test

How hard is the OSCP exam?

OSCP is widely considered one of the hardest certifications to pass on first attempt, with an estimated first-attempt pass rate of 15โ€“30%. Difficulty is high not because the techniques are impossibly advanced, but because the 24-hour format tests sustained technical problem-solving under pressure, and candidates often underestimate the preparation required. Candidates who spend 3โ€“6 months preparing with the PEN-200 labs, complete external practice platforms, and can root machines independently typically have a realistic chance of passing.

What are the prerequisites for OSCP?

There are no formal prerequisites โ€” anyone can purchase the PEN-200 course. However, OffSec recommends candidates have solid knowledge of TCP/IP networking, Linux command-line usage, and basic programming/scripting. Candidates who struggle with basic Linux commands or networking concepts on their first day of lab work typically need 6+ additional months of foundational prep before the PEN-200 course becomes effective preparation.

How much does OSCP cost?

The PEN-200 course with 90 days of lab access and one exam attempt costs $1,499. The 180-day bundle is ~$1,799, and 365-day access costs $2,499. Additional exam attempts after the first cost $249 each. There are no formal study guides or textbooks to purchase โ€” the PEN-200 course materials are the primary resource. External platforms like Hack The Box require separate subscriptions (~$14/month).

Does OSCP expire?

No. The OSCP credential does not expire once earned. There's no annual renewal, no continuing education requirement, and no recertification exam. This is different from many other security certifications. OffSec has introduced a continuing education path called the OffSec Learning Library subscription for professionals who want to continue advancing, but it's not required to maintain the OSCP credential.

What job titles does OSCP qualify for?

OSCP is a preferred or required credential for penetration tester, ethical hacker, red team operator, vulnerability researcher, and security consultant positions. Many bug bounty hunters pursue OSCP to validate their skills formally. It's also valued in internal security team roles where penetration testing skills are needed, including security engineer and purple team positions. The OSCP is less relevant for blue team/defensive security roles, where certifications like GCIH, GCIA, or CCSP are more directly aligned.

Can I study for OSCP without the official course?

Technically yes โ€” Hack The Box, TryHackMe, and OffSec's own Proving Grounds Practice platform cover much of the relevant technical content. However, you cannot take the OSCP exam without purchasing the PEN-200 course, because the exam attempt is bundled with the course. Some candidates spend months on free/cheap platforms to build skills before purchasing PEN-200, which is a legitimate cost-saving strategy. The PEN-200 lab network itself contains unique practice machines not available elsewhere.
โ–ถ Start Quiz