Skip to main content
Cybersecurity Expert Level

OSCP Study Guide

A complete guide to passing the OSCP exam, covering enumeration, exploitation, privilege escalation, and the 24-hour hands-on challenge.

300+

Study Hours

$1,749

Exam Fee

70/100

To Pass

Why OSCP Matters

The Offensive Security Certified Professional (OSCP) is the gold standard certification for penetration testers worldwide. Unlike multiple-choice exams that test theoretical knowledge, the OSCP demands that you break into live machines in a grueling 24-hour hands-on exam. There is no faking your way through it.

Employers know this. An OSCP on your resume tells hiring managers you can actually find and exploit vulnerabilities, not just talk about them. It is the single most respected credential in offensive security, and it carries weight across government, defense, consulting, and enterprise security teams alike.

The certification embodies the Offensive Security motto: “Try Harder.” This is not just a tagline. It is a mindset. The OSCP training and exam will push you to research independently, think creatively under pressure, and persist through frustration. These are exactly the traits that separate average analysts from elite penetration testers.

If you are serious about a career in offensive security, the OSCP is not optional. It is your entry ticket. View the full OSCP certification profile for current job market data.

Who This Guide Is For

  • Security professionals looking to transition from defensive to offensive roles
  • System administrators and network engineers with strong Linux and networking fundamentals who want to break into pentesting
  • CEH holders ready to upgrade to a hands-on, industry-respected credential (see our CEH guide for comparison)
  • Computer science graduates with scripting ability and a passion for ethical hacking
  • Self-taught hackers who have been practicing on CTF platforms and want formal validation

2026 Market Snapshot

The demand for offensive security professionals continues to accelerate in 2026. Organizations across every sector are investing in proactive security testing as regulatory requirements tighten and breach costs climb. Penetration testers with the OSCP consistently rank among the highest-paid cybersecurity specialists.

According to current job market data, OSCP holders command median salaries well above $125,000 in the United States, with senior roles and consulting positions pushing past $160,000. Remote work opportunities remain strong, particularly for consultants serving multiple clients. Government and defense contractors frequently list OSCP as a hard requirement for red team positions.

The OSCP sits at the expert tier of security certifications. For professionals building a security career from the ground up, the typical progression starts with CompTIA Security+ for foundational knowledge, moves through the CEH or similar intermediate credentials, and culminates with the OSCP as proof of hands-on offensive capability. Those targeting senior architectural or leadership roles may also consider CASP+ for the defensive and governance side.

What sets the OSCP apart in the job market is its practical credibility. Recruiters and technical hiring managers consistently rate it above certifications that rely solely on written exams. In competitive hiring scenarios, an OSCP holder will almost always be shortlisted over a candidate with only theoretical credentials.

Check the live OSCP job demand data for the latest posting counts and market share figures.


Exam Structure

The OSCP exam is a 23-hour and 45-minute practical assessment followed by a 24-hour reporting window. There is nothing else like it in the certification world.

What to Expect

You connect to a proctored VPN environment containing multiple target machines. Your objective is to gain access, escalate privileges, and collect proof flags. Every action must be documented for your professional report.

Point Breakdown

ComponentPointsDetails
3 Standalone Machines20 pts each (60 total)Independent targets requiring full exploit chains
1 Active Directory Set40 ptsMulti-machine domain environment requiring lateral movement
Total Available100 pts70 points required to pass

For standalone machines, you earn 10 points for a low-privilege shell and 20 points for full root/administrator access. The Active Directory set is all-or-nothing: you must compromise the entire chain to earn the 40 points.

The Report

After your exam time ends, you have 24 hours to submit a professional penetration testing report. This report must document every step of your attack path with screenshots, commands, and explanations. Incomplete or poorly written reports can result in a failing grade even if you hit the point threshold.

What You Get With Registration

  • PEN-200 Course: The full “Penetration Testing with Kali Linux” courseware including videos, exercises, and PDF materials
  • 90 Days of Lab Access: A dedicated lab environment with dozens of machines of varying difficulty
  • One Exam Attempt: Additional attempts can be purchased separately

Key Knowledge Areas

The OSCP covers a broad range of offensive techniques. You must be proficient in all of the following areas.

Enumeration and Information Gathering

This is where every engagement starts. You need to be fast and thorough with Nmap, directory brute-forcing, DNS enumeration, SNMP walks, and service fingerprinting. Poor enumeration is the number one reason candidates fail.

Web Application Attacks

Expect to encounter web applications with exploitable vulnerabilities including SQL injection, file inclusion (LFI/RFI), file upload bypasses, command injection, and cross-site scripting. You should be comfortable with Burp Suite and manual testing techniques.

Buffer Overflows

The PEN-200 course covers classic stack-based buffer overflow exploitation. You must be able to develop a working exploit from scratch: fuzzing, finding the offset, controlling EIP, identifying bad characters, locating a JMP ESP instruction, and generating shellcode.

Privilege Escalation

This is a make-or-break skill area. You need deep familiarity with both platforms:

  • Linux: SUID binaries, cron jobs, kernel exploits, writable paths, sudo misconfigurations, capabilities, NFS shares
  • Windows: Service misconfigurations, unquoted service paths, AlwaysInstallElevated, token impersonation, DLL hijacking, kernel exploits

Active Directory Attacks

The AD set is worth 40 points. You must understand Kerberoasting, AS-REP roasting, Pass-the-Hash, credential dumping with Mimikatz, BloodHound enumeration, GPP passwords, delegation attacks, and lateral movement with PsExec/WMI/WinRM.

Tunneling and Pivoting

Once you compromise a dual-homed host, you need to pivot into internal networks. Master SSH tunneling, chisel, ligolo-ng, proxychains, and port forwarding to reach targets that are not directly accessible from your attack machine.


16-Week Study Plan

This plan assumes approximately 15 hours per week (240 total hours of structured study plus additional practice time). Adjust based on your existing skill level.

Phase 1: PEN-200 Course (Weeks 1-6)

WeekFocus AreaActivities
1Setup and FundamentalsInstall Kali, configure tools, complete intro modules
2Information GatheringEnumeration methodology, Nmap mastery, passive recon
3Web AttacksSQL injection, LFI/RFI, command injection, Burp Suite
4Buffer OverflowsStack-based BOF from scratch, practice with custom apps
5Client-Side and TunnelingPivoting techniques, SSH tunneling, port forwarding
6Active DirectoryAD enumeration, Kerberoasting, lateral movement, BloodHound

Complete all course exercises. Do not skip the written exercises, they reinforce your methodology and report-writing skills.

Phase 2: Lab Machines (Weeks 7-12)

WeekFocus AreaActivities
7-8PEN-200 LabsWork through lab machines. Target 3-4 machines per week
9-10External PracticeHackTheBox retired OSCP-like machines, TJ Null’s list
11Proving GroundsOffSec Proving Grounds Practice machines (closest to exam)
12AD PracticeDedicated AD lab sets on HackTheBox and Proving Grounds

Track every machine in a personal knowledge base. Document your methodology, the vulnerabilities found, and any new techniques learned.

Phase 3: Exam Preparation (Weeks 13-16)

WeekFocus AreaActivities
13Weak AreasRevisit topics where you struggled. Redo difficult machines
14Mock Exam #1Simulate a 24-hour exam using 4 Proving Grounds machines
15Report WritingPractice writing a professional pentest report under time pressure
16Mock Exam #2 and ReviewFinal simulation, refine notes, prepare exam-day toolkit
  • Proving Grounds Practice (OffSec): The closest experience to the actual exam. Prioritize this.
  • HackTheBox: Use TJ Null’s curated OSCP preparation list of retired machines.
  • TryHackMe: Useful for filling specific knowledge gaps with guided rooms.

Practice Exam Strategy

Simulating exam conditions is critical. Candidates who run mock exams consistently outperform those who only practice individual machines.

How to Run a Mock Exam

  1. Select 3 standalone machines and 1 AD set from Proving Grounds or HackTheBox
  2. Start a 24-hour timer. No breaks longer than 30 minutes
  3. Document everything as you go, exactly as you would on exam day
  4. After the timer ends, write a full report within 24 hours
  5. Review what worked, what stalled you, and where you wasted time

Building Your Methodology

Create a personal cheat sheet covering:

  • Initial enumeration commands for every common service (HTTP, SMB, FTP, SSH, SNMP, MySQL, RDP)
  • Privilege escalation checklists for both Linux and Windows
  • AD attack flowchart from initial foothold to domain admin
  • Reverse shell one-liners for every language and platform
  • File transfer methods for moving tools to target machines

Time Management on Exam Day

  • Spend the first 30 minutes scanning all machines and reviewing results
  • Start with the machine that looks most approachable to build momentum
  • If you are stuck for more than 45 minutes, move to another target
  • Save the AD set for a focused block of 4-6 hours
  • Take short breaks every 2-3 hours to stay sharp. Eat real meals
  • Reserve the final 2 hours for documentation cleanup

Career Impact

Salary Expectations

OSCP holders in the United States earn a median salary of approximately $125,000, with significant variation based on location, experience, and role type. Senior penetration testers and red team leads with the OSCP regularly earn $140,000 to $170,000. Independent consultants can exceed $200,000 annually.

Career Pathways

The OSCP opens the door to dedicated offensive security roles:

  • Penetration Tester: The direct career path. Test organizations for vulnerabilities
  • Red Team Operator: Simulate advanced threat actors against enterprise defenses
  • Security Consultant: Deliver pentesting engagements for consulting firms
  • Vulnerability Researcher: Hunt for zero-day vulnerabilities in software and hardware

Advanced Certifications After OSCP

CertificationFocusPrerequisite
OSEP (PEN-300)Advanced evasion and breach techniquesOSCP recommended
OSED (EXP-301)Windows exploit developmentOSCP recommended
OSWE (WEB-300)Advanced web application attacks (white-box)OSCP recommended

The typical progression is OSCP first, then OSEP for those pursuing red team roles, or OSWE for those specializing in application security.


Common Mistakes

  • Rushing past enumeration. The majority of failed attempts trace back to incomplete initial scanning. If you cannot find an entry point, you have not enumerated enough. Run multiple tools. Check every port. Read every web page.

  • Neglecting the report. Candidates who treat documentation as an afterthought lose points they already earned. Take screenshots after every significant step. Note every command. A passing score means nothing if your report does not support it.

  • Ignoring Active Directory practice. The AD set is worth 40 points and is effectively mandatory for most candidates. If you are not comfortable with BloodHound, Kerberoasting, and lateral movement, you are leaving almost half the exam on the table.

  • Burning out before exam day. Studying 60 hours per week for a month and then sitting a 24-hour exam exhausted is a recipe for failure. Follow a sustainable study schedule and arrive at the exam well-rested.


Frequently Asked Questions

How hard is the OSCP compared to the CEH?

The OSCP is significantly more difficult than the CEH. The CEH is a multiple-choice exam focused on theoretical knowledge and terminology. The OSCP requires you to actually exploit live machines under time pressure and write a professional report. They test fundamentally different skill sets. The CEH can be passed with study guides alone; the OSCP requires months of hands-on practice.

Can I pass the OSCP with no prior experience?

It is possible but not recommended as your first certification. You should be comfortable with Linux command-line operations, basic networking (TCP/IP, DNS, HTTP), and at least one scripting language (Python or Bash). If these areas are weak, start with CompTIA Security+ and spend time on TryHackMe before attempting the OSCP.

Is the PEN-200 course material enough to pass?

The PEN-200 course provides a solid foundation, but most successful candidates supplement it with external practice. Proving Grounds Practice and HackTheBox retired machines are essential. The course teaches the techniques; the extra practice builds the speed and pattern recognition you need under exam pressure.

How many attempts do most people need?

Offensive Security does not publish official pass rates, but community surveys suggest that many candidates pass on their second attempt. First-attempt failures are common and should not be discouraging. Each attempt teaches you something about your weak areas and time management.

Is the OSCP worth the cost in 2026?

At $1,749 for the course, lab access, and one exam attempt, the OSCP is a significant investment. However, the return is substantial. OSCP holders consistently earn $20,000 to $40,000 more annually than non-certified peers in similar roles. Most candidates recoup the cost within the first few months of their post-certification salary increase.


The Bottom Line

The OSCP is not the easiest certification you will ever pursue. It is arguably the most valuable. In a field crowded with theoretical credentials, the OSCP proves that you can sit down in front of a network and break into it. That practical validation is why employers consistently rank it as the top offensive security certification.

Your path forward is straightforward: commit to the 16-week study plan, prioritize hands-on practice over passive learning, and simulate exam conditions before the real thing. Build your enumeration methodology until it is second nature. Practice privilege escalation until you can spot misconfigurations in your sleep. Master Active Directory attacks because they are worth nearly half your exam score.

The OSCP rewards persistence, curiosity, and methodical thinking. If you bring those qualities to the table, you will earn those four letters after your name. Start with the OSCP certification page for current market data, then begin your preparation today.

Ready to start your OSCP journey?

View real-time job market data plus salary trends for this certification.

View Market Data