Learn to hack: Difference between revisions
Jump to navigation
Jump to search
imported>Mediawiki user No edit summary |
imported>Mediawiki user No edit summary |
||
Line 19: | Line 19: | ||
* https://www.hackthebox.com/ | * https://www.hackthebox.com/ | ||
* https://www.pentesteracademy.com/ | * https://www.pentesteracademy.com/ | ||
* https://lab.pentestit.ru/ | |||
General references: | General references: | ||
Line 25: | Line 26: | ||
* https://dmcxblue.gitbook.io/red-team-notes-2-0/ | * https://dmcxblue.gitbook.io/red-team-notes-2-0/ | ||
* https://github.com/swisskyrepo/PayloadsAllTheThings | * https://github.com/swisskyrepo/PayloadsAllTheThings | ||
* https://github.com/S3cur3Th1sSh1t/Pentest-Tools | |||
== Active Directory == | == Active Directory == | ||
Line 37: | Line 39: | ||
* https://www.blackhillsinfosec.com/webcast-attack-tactics-5-zero-to-hero-attack/ | * https://www.blackhillsinfosec.com/webcast-attack-tactics-5-zero-to-hero-attack/ | ||
* https://byt3bl33d3r.github.io/practical-guide-to-ntlm-relaying-in-2017-aka-getting-a-foothold-in-under-5-minutes.html | * https://byt3bl33d3r.github.io/practical-guide-to-ntlm-relaying-in-2017-aka-getting-a-foothold-in-under-5-minutes.html | ||
* https://s3cur3th1ssh1t.github.io/The-most-common-on-premise-vulnerabilities-and-misconfigurations/ | |||
* A very thorough technical background: https://zer1t0.gitlab.io/posts/attacking_ad/ | * A very thorough technical background: https://zer1t0.gitlab.io/posts/attacking_ad/ | ||
* kerberos background: https://www.tarlogic.com/blog/how-kerberos-works/ | |||
=== Tools === | === Tools === | ||
* https://mpgn.gitbook.io/crackmapexec/ | * https://mpgn.gitbook.io/crackmapexec/ | ||
* https://www.secureauth.com/labs/open-source-tools/impacket/ | * https://www.secureauth.com/labs/open-source-tools/impacket/ | ||
* https://github.com/dirkjanm/mitm6 | |||
* https://github.com/lgandx/Responder | * https://github.com/lgandx/Responder | ||
* https://github.com/FuzzySecurity/StandIn | * https://github.com/FuzzySecurity/StandIn | ||
Line 65: | Line 70: | ||
* https://github.com/dafthack/MSOLSpray | * https://github.com/dafthack/MSOLSpray | ||
* https://github.com/dafthack/MFASweep | * https://github.com/dafthack/MFASweep | ||
== C2 Frameworks == | |||
* https://docs.google.com/spreadsheets/d/1b4mUxa6cDQuTV2BPC6aA-GR4zGZi0ooPYtBe4IgPsSc | |||
== Antivirus & EDR Evasion == | == Antivirus & EDR Evasion == | ||
* https://s3cur3th1ssh1t.github.io/Bypass_AMSI_by_manual_modification/ | |||
* https://s3cur3th1ssh1t.github.io/Customizing_C2_Frameworks/ | |||
* https://s3cur3th1ssh1t.github.io/Powershell-and-the-.NET-AMSI-Interface/ | |||
* https://www.blackhillsinfosec.com/tag/sacred-cash-cow-tipping/ | |||
* https://blog.securityevaluators.com/creating-av-resistant-malware-part-1-7604b83ea0c0 | |||
* https://www.ired.team/offensive-security/defense-evasion | |||
* https://www.youtube.com/watch?v=UO3PjJIiBIE | |||
* https://github.com/matterpreter/DefenderCheck | |||
* https://github.com/RythmStick/AMSITrigger | |||
* https://amsi.fail | |||
== Initial Access == | == Initial Access == | ||
Line 73: | Line 94: | ||
=== Phishing === | === Phishing === | ||
* https://0xboku.com/2021/07/12/ArtOfDeviceCodePhish.html | * https://0xboku.com/2021/07/12/ArtOfDeviceCodePhish.html | ||
* https://medium.com/maltrak/com-objects-p-2-your-stealthy-fileless-attack-bf78318d9165 | |||
=== Password spraying === | === Password spraying === | ||
== Opsec == |
Revision as of 13:02, 21 December 2021
This page aims to compile high quality resources for hackers. All books listed on this page can be found on Library Genesis and Z-Library
General Resources
Resources that assume little to no background knowledge:
Resources that assume minimal tech background:
- (book) Penetration Testing: A Hands-On Introduction to Hacking
Resources that assume a tech or hacking background:
- (book) The Hacker Playbook 3
- books by Sparc Flow
- Hack Back! A DIY Guide
- https://github.com/ForbiddenProgrammer/conti-pentester-guide-leak
Practice labs:
General references:
- https://www.ired.team/
- http://pwnwiki.io/
- https://dmcxblue.gitbook.io/red-team-notes-2-0/
- https://github.com/swisskyrepo/PayloadsAllTheThings
- https://github.com/S3cur3Th1sSh1t/Pentest-Tools
Active Directory
- An excellent practical reference
- A practical reference focused on powershell
- https://gist.github.com/TarlogicSecurity/2f221924fef8c14a1d8e29f3cb5c5c4a
- https://m0chan.github.io/2019/07/30/Windows-Notes-and-Cheatsheet.html
- https://casvancooten.com/posts/2020/11/windows-active-directory-exploitation-cheat-sheet-and-command-reference/
- https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet
- https://wadcoms.github.io/
- https://www.blackhillsinfosec.com/webcast-attack-tactics-5-zero-to-hero-attack/
- https://byt3bl33d3r.github.io/practical-guide-to-ntlm-relaying-in-2017-aka-getting-a-foothold-in-under-5-minutes.html
- https://s3cur3th1ssh1t.github.io/The-most-common-on-premise-vulnerabilities-and-misconfigurations/
- A very thorough technical background: https://zer1t0.gitlab.io/posts/attacking_ad/
- kerberos background: https://www.tarlogic.com/blog/how-kerberos-works/
Tools
- https://mpgn.gitbook.io/crackmapexec/
- https://www.secureauth.com/labs/open-source-tools/impacket/
- https://github.com/dirkjanm/mitm6
- https://github.com/lgandx/Responder
- https://github.com/FuzzySecurity/StandIn
- https://www.joeware.net/freetools/tools/adfind/
- Powerview/Sharpview
- Bloodhound/Sharphound
Office 365 & Azure
- Extremely in-depth technical info on everything https://o365blog.com/
- https://www.synacktiv.com/en/publications/azure-ad-introduction-for-red-teamers.html
- https://blog.xpnsec.com/azuread-connect-for-redteam/
- https://www.blackhillsinfosec.com/webcast-getting-started-in-pentesting-the-cloud-azure/
- https://github.com/dafthack/CloudPentestCheatsheets/blob/master/cheatsheets/Azure.md
Tools
- https://github.com/nyxgeek/o365recon
- https://github.com/dirkjanm/ROADtools
- https://github.com/fox-it/adconnectdump
- https://github.com/LMGsec/o365creeper
- https://bloodhound.readthedocs.io/en/latest/data-collection/azurehound.html
- https://github.com/rvrsh3ll/TokenTactics
- https://github.com/nyxgeek/onedrive_user_enum
- https://github.com/dafthack/MSOLSpray
- https://github.com/dafthack/MFASweep
C2 Frameworks
Antivirus & EDR Evasion
- https://s3cur3th1ssh1t.github.io/Bypass_AMSI_by_manual_modification/
- https://s3cur3th1ssh1t.github.io/Customizing_C2_Frameworks/
- https://s3cur3th1ssh1t.github.io/Powershell-and-the-.NET-AMSI-Interface/
- https://www.blackhillsinfosec.com/tag/sacred-cash-cow-tipping/
- https://blog.securityevaluators.com/creating-av-resistant-malware-part-1-7604b83ea0c0
- https://www.ired.team/offensive-security/defense-evasion
- https://www.youtube.com/watch?v=UO3PjJIiBIE
- https://github.com/matterpreter/DefenderCheck
- https://github.com/RythmStick/AMSITrigger
- https://amsi.fail
Initial Access
Phishing
- https://0xboku.com/2021/07/12/ArtOfDeviceCodePhish.html
- https://medium.com/maltrak/com-objects-p-2-your-stealthy-fileless-attack-bf78318d9165