Assume Breach, Not Burnout: The New OSCP+ Experience

Like many in the cybersecurity community, I once viewed the OSCP certification as the gatekeeper to many offensive security roles. But for me, it was more than a technical exam—it became a recurring roadblock. I failed the older version of the OSCP twice, before finally getting it with a bit of luck. When the OSCP+ was released, I thought i would attempt as I wanted to see if I was up for “more realistic” challenge.

I’m sharing this story because something changed recently. Offensive Security released the revamped OSCP+, and after diving into this new version, I found something that finally clicked. Here’s what’s different—and why it made all the difference for me.

Enter OSCP+: A Modernized, Realistic Challenge

Coming from a red teaming background, I’ve spent alot of time inside Active Directory environments, abusing domain misconfigurations, and simulating adversarial behavior across enterprise networks.

Trying Harder

So when I first attempted the original OSCP, I expected a challenge—but not one so disconnected from my daily work. The exam and lab environments were overwhelmingly web-heavy, with a strong emphasis on outdated Linux boxes and classic web application vulnerabilities.

More Windows, More Realism

One of the biggest changes was the increased number of Windows machines, especially in the lab and exam environments. In the real world, most of what I see revolves around Windows and Active Directory—not outdated Linux web servers vulnerable to simple exploits. The OSCP+ lab now reflects this reality.

This shift made all the difference for me. Tools like PowerView, BloodHound, and Mimikatz were not the focus and were central to the experience. Finally, the skills I use in real engagements were the same ones I needed to succeed in the exam

Assumed Breach for Active Directory

Another welcome surprise: the Active Directory section starts with an assumed breach. Instead of spending half the exam time just trying to land a basic foothold, I was dropped into a compromised workstation within a corporate domain.

This approach let me focus on lateral movement, privilege escalation, and domain dominance—more like the average network pentesting assessment. It also made the exam more strategic and realistic, instead of being a time sink filled with outdated enumeration.

No Bonus Points, No Gimmicks

One of the most notable changes in the OSCP+ exam is the updated point structure.

In the older version of OSCP, there were bonus points. If you completed a certain number of exercises and lab machines from the course material, you could earn up to 10 extra points on the exam. In theory, it encouraged people to take shortcuts and only complete the required number of exercises and lab machines.

With OSCP+, bonus points are gone, you know exactly what’s needed to pass. Instead of banking on a few extra points, the focus is on demonstrating real-world offensive skills during the exam itself. It shifts the mindset from “padding my score” to “executing a plan.”

What I Did Differently

With OSCP+, I trained like I was prepping for a real engagement:

  • Completed EVERY SINGLE PWK exercise and practise machine
  • Mapped out attack paths across multi-host Windows environments with BloodHound
  • Practiced using NetExec, the all in one tool to Kerberoast, Password Spray, do domain enumeration and pretty much everything else

Final Thoughts: It’s Still Hard, But It’s Fair

To be clear, OSCP+ is no walk in the park. It still demands hours of focused practice, deep technical knowledge, and solid methodology. But the difference now is that the challenge aligns with reality.

If you’ve struggled with the old OSCP—especially if you’re coming from a Windows-heavy or red team background—don’t give up. The new OSCP+ might be exactly what you need.