- August 11, 2017Avinash S Mankoo
Avinash S Mankoo
An OSCP has demonstrated the ability to use persistence, creativity, and perceptiveness to identify vulnerabilities and execute organized attacks under tight time constraints. They can:
* Use information gathering techniques to identify and enumerate targets running various operating systems and services
* Write scripts and tools to aid in the penetration testing process
* Analyze, correct, modify, cross-compile, and port public exploit code
* Conduct remote, local privilege escalation, and client-side attacks
* Identify and exploit XSS, SQL injection, and file inclusion vulnerabilities in web applications
* Leverage tunneling techniques to pivot between networks
OSCP holders have also shown they can think outside the box while managing both time and resources.
Skills / Knowledge
- Kali Linux
- Network Vulnerability Scanning
- Buffer Overflow Exploits
- Exploitation
- Client Side Attacks
- Web Exploitation
- Password Attacks
- Pivoting
- Antivirus Exploitation
- Advanced Command Line
- Practical Tools
- Bash Scripting
- Active Information Gathering
- Passive Information Gathering
- Vulnerability Scanning
- Web Application Attacks
- Windows Buffer Overflow
- Linux Buffer Overflow
- Locating Public Exploits
- Fixing Public Exploits
- File Transfers
- Antivirus Evasion
- Port Redirection
- Tunneling
- Active Directory Attacks
- PowerShell Empire
- Privilege Escalation
- Metasploit
- Port Scanning
- Information Gathering
Issued on
August 11, 2017
Expires on
Does not expire