Learn to hack: Difference between revisions
		
		
		
		Jump to navigation
		Jump to search
		
| imported>Mediawiki user No edit summary | imported>Mediawiki user No edit summary | ||
| Line 19: | Line 19: | ||
| * https://www.hackthebox.com/ | * https://www.hackthebox.com/ | ||
| * https://www.pentesteracademy.com/ | * https://www.pentesteracademy.com/ | ||
| * https://lab.pentestit.ru/ | |||
| General references: | General references: | ||
| Line 25: | Line 26: | ||
| * https://dmcxblue.gitbook.io/red-team-notes-2-0/ | * https://dmcxblue.gitbook.io/red-team-notes-2-0/ | ||
| * https://github.com/swisskyrepo/PayloadsAllTheThings | * https://github.com/swisskyrepo/PayloadsAllTheThings | ||
| * https://github.com/S3cur3Th1sSh1t/Pentest-Tools | |||
| == Active Directory == | == Active Directory == | ||
| Line 37: | Line 39: | ||
| * https://www.blackhillsinfosec.com/webcast-attack-tactics-5-zero-to-hero-attack/ | * https://www.blackhillsinfosec.com/webcast-attack-tactics-5-zero-to-hero-attack/ | ||
| * https://byt3bl33d3r.github.io/practical-guide-to-ntlm-relaying-in-2017-aka-getting-a-foothold-in-under-5-minutes.html | * https://byt3bl33d3r.github.io/practical-guide-to-ntlm-relaying-in-2017-aka-getting-a-foothold-in-under-5-minutes.html | ||
| * https://s3cur3th1ssh1t.github.io/The-most-common-on-premise-vulnerabilities-and-misconfigurations/ | |||
| * A very thorough technical background: https://zer1t0.gitlab.io/posts/attacking_ad/ | * A very thorough technical background: https://zer1t0.gitlab.io/posts/attacking_ad/ | ||
| * kerberos background: https://www.tarlogic.com/blog/how-kerberos-works/ | |||
| === Tools === | === Tools === | ||
| * https://mpgn.gitbook.io/crackmapexec/ | * https://mpgn.gitbook.io/crackmapexec/ | ||
| * https://www.secureauth.com/labs/open-source-tools/impacket/ | * https://www.secureauth.com/labs/open-source-tools/impacket/ | ||
| * https://github.com/dirkjanm/mitm6 | |||
| * https://github.com/lgandx/Responder | * https://github.com/lgandx/Responder | ||
| * https://github.com/FuzzySecurity/StandIn | * https://github.com/FuzzySecurity/StandIn | ||
| Line 65: | Line 70: | ||
| * https://github.com/dafthack/MSOLSpray | * https://github.com/dafthack/MSOLSpray | ||
| * https://github.com/dafthack/MFASweep | * https://github.com/dafthack/MFASweep | ||
| == C2 Frameworks == | |||
| * https://docs.google.com/spreadsheets/d/1b4mUxa6cDQuTV2BPC6aA-GR4zGZi0ooPYtBe4IgPsSc | |||
| == Antivirus & EDR Evasion == | == Antivirus & EDR Evasion == | ||
| * https://s3cur3th1ssh1t.github.io/Bypass_AMSI_by_manual_modification/ | |||
| * https://s3cur3th1ssh1t.github.io/Customizing_C2_Frameworks/ | |||
| * https://s3cur3th1ssh1t.github.io/Powershell-and-the-.NET-AMSI-Interface/ | |||
| * https://www.blackhillsinfosec.com/tag/sacred-cash-cow-tipping/ | |||
| * https://blog.securityevaluators.com/creating-av-resistant-malware-part-1-7604b83ea0c0 | |||
| * https://www.ired.team/offensive-security/defense-evasion | |||
| * https://www.youtube.com/watch?v=UO3PjJIiBIE | |||
| * https://github.com/matterpreter/DefenderCheck | |||
| * https://github.com/RythmStick/AMSITrigger | |||
| * https://amsi.fail | |||
| == Initial Access ==   | == Initial Access ==   | ||
| Line 73: | Line 94: | ||
| === Phishing === | === Phishing === | ||
| * https://0xboku.com/2021/07/12/ArtOfDeviceCodePhish.html | * https://0xboku.com/2021/07/12/ArtOfDeviceCodePhish.html | ||
| * https://medium.com/maltrak/com-objects-p-2-your-stealthy-fileless-attack-bf78318d9165 | |||
| === Password spraying === | === Password spraying === | ||
| == Opsec == | |||
Revision as of 13:02, 21 December 2021
This page aims to compile high quality resources for hackers. All books listed on this page can be found on Library Genesis and Z-Library
General Resources
Resources that assume little to no background knowledge:
Resources that assume minimal tech background:
- (book) Penetration Testing: A Hands-On Introduction to Hacking
Resources that assume a tech or hacking background:
- (book) The Hacker Playbook 3
- books by Sparc Flow
- Hack Back! A DIY Guide
- https://github.com/ForbiddenProgrammer/conti-pentester-guide-leak
Practice labs:
General references:
- https://www.ired.team/
- http://pwnwiki.io/
- https://dmcxblue.gitbook.io/red-team-notes-2-0/
- https://github.com/swisskyrepo/PayloadsAllTheThings
- https://github.com/S3cur3Th1sSh1t/Pentest-Tools
Active Directory
- An excellent practical reference
- A practical reference focused on powershell
- https://gist.github.com/TarlogicSecurity/2f221924fef8c14a1d8e29f3cb5c5c4a
- https://m0chan.github.io/2019/07/30/Windows-Notes-and-Cheatsheet.html
- https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference/
- https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet
- https://wadcoms.github.io/
- https://www.blackhillsinfosec.com/webcast-attack-tactics-5-zero-to-hero-attack/
- https://byt3bl33d3r.github.io/practical-guide-to-ntlm-relaying-in-2017-aka-getting-a-foothold-in-under-5-minutes.html
- https://s3cur3th1ssh1t.github.io/The-most-common-on-premise-vulnerabilities-and-misconfigurations/
- A very thorough technical background: https://zer1t0.gitlab.io/posts/attacking_ad/
- kerberos background: https://www.tarlogic.com/blog/how-kerberos-works/
Tools
- https://mpgn.gitbook.io/crackmapexec/
- https://www.secureauth.com/labs/open-source-tools/impacket/
- https://github.com/dirkjanm/mitm6
- https://github.com/lgandx/Responder
- https://github.com/FuzzySecurity/StandIn
- https://www.joeware.net/freetools/tools/adfind/
- Powerview/Sharpview
- Bloodhound/Sharphound
Office 365 & Azure
- Extremely in-depth technical info on everything https://o365blog.com/
- https://www.synacktiv.com/en/publications/azure-ad-introduction-for-red-teamers.html
- https://blog.xpnsec.com/azuread-connect-for-redteam/
- https://www.blackhillsinfosec.com/webcast-getting-started-in-pentesting-the-cloud-azure/
- https://github.com/dafthack/CloudPentestCheatsheets/blob/master/cheatsheets/Azure.md
Tools
- https://github.com/nyxgeek/o365recon
- https://github.com/dirkjanm/ROADtools
- https://github.com/fox-it/adconnectdump
- https://github.com/LMGsec/o365creeper
- https://bloodhound.readthedocs.io/en/latest/data-collection/azurehound.html
- https://github.com/rvrsh3ll/TokenTactics
- https://github.com/nyxgeek/onedrive_user_enum
- https://github.com/dafthack/MSOLSpray
- https://github.com/dafthack/MFASweep
C2 Frameworks
Antivirus & EDR Evasion
- https://s3cur3th1ssh1t.github.io/Bypass_AMSI_by_manual_modification/
- https://s3cur3th1ssh1t.github.io/Customizing_C2_Frameworks/
- https://s3cur3th1ssh1t.github.io/Powershell-and-the-.NET-AMSI-Interface/
- https://www.blackhillsinfosec.com/tag/sacred-cash-cow-tipping/
- https://blog.securityevaluators.com/creating-av-resistant-malware-part-1-7604b83ea0c0
- https://www.ired.team/offensive-security/defense-evasion
- https://www.youtube.com/watch?v=UO3PjJIiBIE
- https://github.com/matterpreter/DefenderCheck
- https://github.com/RythmStick/AMSITrigger
- https://amsi.fail
Initial Access
Phishing
- https://0xboku.com/2021/07/12/ArtOfDeviceCodePhish.html
- https://medium.com/maltrak/com-objects-p-2-your-stealthy-fileless-attack-bf78318d9165