Hello folks, in today’s blog I am going to cover my journey through earning my Offensive Security Certified Professional (OSCP) certification and the process that went behind the scenes.
When I initially started out, one of the first questions I had in my head was How long will it take to get my OSCP? Since it is considered one of the best in the industry for what it has to offer, as a learner you want to obtain it as quickly as possible because we know that it’s a massive milestone (at least for myself) and it will help boost the chances of getting a job.

To answer the question, I think the exam demands anywhere between 4-6 months of dedicated learning. Shorter if you’ve been solving boxes consistently on HackTheBox or some other platform of choice. OSCP is designed to be CTF-styled so there are quite some similarities between what goes into the process while solving boxes on other platforms. The time will surely vary based on learner’s experience and time given to practice. I had laid out a plan to do it over a span of 5 months that included 90 days of OSCP course material along with labs.
You can view my credentials here.
| Month | Duration | Module |
|---|---|---|
| February 2024 | 1 month | OffSec Playground Play & Practice machines |
| March 2024 | 1 month | HackTheBox & TryHackMe |
| 12th April to 12th July 2024 | 3 months | Official PEN-200 |
While the official PEN-200 coursework systematically guides learners through the entire penetration testing process, the journey leading up to that point is quite challenging. There’s no tracking of progress, and there’s nothing to help learners stay focused on the necessary skills and knowledge required for OSCP. In this case, a list of vulnerable OSCP-like machines were extremely valuable.
TJ null’s list (NetSecFocus Trophy Room) is quite well-known in the community and is regularly maintained, kept up-to-date with latest exam changes. Offers a big list for multiple training platforms in ranging difficulty levels. Some can also go beyond the scope of OSCP for better practice. It also offers list of machines for other OffSec certifications.
Another one is a hidden gem that I found via a Reddit post and is made by LainKusanagi (Lainkusanagi OSCP list). I have found these machines to be more in line with similarities to OSCP machines. While this is a fairly recently made, it’s being constantly updated as new machines get released on HackTheBox or any other platform.
Now that I’ve got the timeline out of the way, next important thing is notes. I cannot stress enough how crucial this part is through the process. Not just with respect to the exam, but just as a general rule of thumb when conducting penetration testing exercise. In a professional setting, you want to make a note of everything you see during your pentest to be included in the report.

The journey has taught me a lot; one of which includes developing the right mindset. OffSec wants the learner to build “Try Harder” mantra. They want you to be persistent, creative, and perceptive. These are key to cracking any OffSec Certifications as it teaches the learner to be patient, to trust the process, and to keep trying harder. These 5 months have been pivotal to discover flaws in my methods, fix, and surpass the hurdles. I used to make the rookie mistake of not spending time on enumerating a target, but instead jump onto the exciting part of running an exploit and gaining access to a system. But I have learnt to be patient, gather as much information as possible, rationally think about possible attack vectors before proceeding to the next stage.

Here are a few pointers that I would like you to keep in mind as you embark on your journey.
In the first month of practice, I targeted OffSec Playground that host free & paid machines. The free machines are taken from VulnHub but hosted by OffSec for ease of use. The free access allows you to gain access for 3 hours in a 24 hour period. Whenever I was in a cooldown period, I would spin it up locally on VMware or Virtual Box. I followed the list provided by TJ null to target these machines one by one. I solved about 50-odd Playground machines and took notes using CherryTree. Check them out here.
After doing a decent amount of machines on OffSec Playground, I moved onto HackTheBox & TryHackMe to solve vulnerable machines mentioned under TJ null & LainKusanagi list. I would recommend you to get premium subscription on both of these platforms as most of the machines have retired and will require premium subscription to gain access. Over a period of time, I solved about 35 machines on HackTheBox and 18 on TryHackMe. I moved over to Obsidian to take down my notes and it was an absolute blessing!
I took the 90-day lab access that gave me access to course content and lab exercises for 90 days. Once I got the access, I set out a plan for myself to try & finish the coursework within the first 60 days. This includes modules and assignments provided within the modules. And 30 days for labs provided by OffSec - that includes 3 mock exam sets and 3 sets of challenge labs. The challenge labs gives you a mock scenario mimicking a small enterprise company. They provide great experience to prepare yourself before the exam!
Official Lab Set:
In my approach, I completed MEDTECH & RELIA to get comfortable with the style of challenge labs. I thoroughly enjoyed doing them as it provides a great exposure to Active Directory environments and how you can navigate your way around it to gather information and move ahead. Now that I was ready to take the mock exam, I limited myself to a 24-hour window. OSCP-A took me about 14 hours to finish, OSCP-B felt relatively easier and took me 10 hours and I managed to successfully finish OSCP-C within 8 hours. I made sure to give myself a day or two off after taking mock exam attempt. I couldn’t finish all of SKYLARK but managed to finish half of it before losing access to OSCP lab environment.
I am planning to make a post about my exam experience soon!

This is just a list of links that I have found to be important. I will also be posting a cheatsheet covering my own list of important commands that I made use of.
The journey to trying harder has been one full of multiple challenges, but I do appreciate the process I have gone through. I have learnt a lot, improved a lot, and it only makes me want to keep growing. Next step - OSWE!

2024 - 2026 | Hemal Maniar