Hey everyone,
In Part 1 of my OSCP+ journey, I shared how my first attempt ended in failure and how that experience taught me more than any success could have.
It was painful, frustrating, and humbling. But it also lit a fire in me.
This blog is Part 2 of that story — the comeback.
The version where I redefined my strategy, rebuilt my mindset, and finally earned the certification I worked so hard for.
Press enter or click to view image in full size
🏋️♀️Picking Myself Back Up
After my first failed attempt, I took a short break to reset mentally. I gave myself space to reflect without rushing into another attempt.
Once I was ready, I came back with a plan and this time, I was ready to execute.
🔄 What Changed?
- I rebuilt my entire notes from scratch, organizing everything by attack vectors from initial access to privilege escalation paths.
- I treated every machine like a mini OSCP exam, applying strict timeboxing and simulating real pressure.