I've wanted the OSCP for as long as I can remember caring about offensive security. In December 2025 I finally had a real window to go after it: a new baby, three months of paternity leave, and enough time carved out to actually commit. I went in with a plan and meant every word of it.
The idea was simple. Eight hours a day, split into sessions around baby duties. Work through all 27 PEN-200 modules, complete the 11 Challenge Labs, and sit the exam before returning to work in March 2026. My DFIR background gave me an edge on the defender side, and I wanted to flip that into a real offensive skillset. I was genuinely excited.
Early on I was locked in. I finished Challenge 0 - Secura on December 22nd and learned something immediately: enumeration is everything. That 80% rule is not a suggestion. Most of my time was spent digging through output, following leads, and just poking around systematically until things connected.
The tools that clicked for me early: nmap for initial scans, WinRM with pywinrm for remote access, secretsdump.py for credential extraction, BloodHound for mapping domain relationships, and pyGPOAbuse for the final domain compromise. The most unexpected moment was finding credentials sitting inside a MySQL database โ nowhere near where I expected them. That kind of thinking, looking everywhere, not just the obvious places, is what the course is really trying to teach.
I worked through chapters 1 through 19 of the PEN-200 content. One lab done. Good momentum early.
And then life took over. Not in a bad way.
Our newborn's first months went fast. I spent more time with my 10- and 8-year-old sons than I had in a long time. We played outside. I was present. The coursework started slipping, and I let it, because the alternative was being somewhere else mentally while something irreplaceable was happening in front of me.
I never came back to the coursework the way I planned. I didn't sit the exam. I failed to complete the goal I set for myself.
Nothing bad to say about the training. The product is genuinely solid, the lab access is excellent, and the course structure makes sense. OffSec built something real here. The fault was entirely in my timing and expectations, not the material.
I may come back to this on weekends at some point. Maybe I'll schedule the exam in a few months when it feels right. But I'm not going to force it. I care more about the skills than the piece of paper, and I picked up real things during the time I did put in.
Back to work in DFIR. That's where I'm most useful right now and where I have the most to contribute. I plan to start writing about what I actually work on โ findings from incident response, patterns I see in ransomware cases, things that might be useful to someone else. No promises on frequency, but that's the direction.
Leaving this post up as an honest record. It didn't go the way I planned, and that's okay.
๐ Progress Tracker
PEN-200 Modules: Chapters 1โ19 complete
Challenge Labs:
| Lab | Status |
|---|---|
| Challenge 0 - Secura | โ Complete (12/22/2025) |
| Challenge 1 - Medtech | โฌ Not started |
| Challenge 2 - Relia | โฌ Not started |
| Challenge 3 - Skylark | โฌ Not started |
| Challenge 4 - OSCP A | โฌ Not started |
| Challenge 5 - OSCP B | โฌ Not started |
| Challenge 6 - OSCP C | โฌ Not started |
| Challenge 7 - Zeus | โฌ Not started |
| Challenge 8 - Poseidon | โฌ Not started |
| Challenge 9 - Feast | โฌ Not started |
| Challenge 10 - Laser | โฌ Not started |
๐ Exam Rules & Scoring
Allowed: Nmap, Gobuster, Nikto, Burp Community, sqlmap, Hydra, John, Hashcat, Impacket, BloodHound, LinPEAS/WinPEAS, MSFvenom (unlimited)
Limited: Metasploit โ one machine only
Prohibited: AI chatbots, Nessus/OpenVAS, Burp Pro, auto-exploitation tools, spoofing attacks
Scoring: AD Set (40pts) + 3 standalones (20+20+20pts) = 100 total. 70 to pass.
๐ง Tools & Resources I Was Using
Knowledge Bases
- HackTricks
- GTFOBins / LOLBAS
- IppSec.rocks
- Exploit-DB + searchsploit
Enumeration
- Nmap, Gobuster/Feroxbuster, Nikto, enum4linux, smbmap
- DNS: dig, dnsrecon, dnsenum | SNMP: snmpwalk, onesixtyone
Privilege Escalation
- LinPEAS/WinPEAS, PowerUp.ps1, Seatbelt
- PrintSpoofer, GodPotato, JuicyPotato
Active Directory
- BloodHound/SharpHound, Rubeus, Mimikatz, Impacket, CrackMapExec