Learn to hack: Difference between revisions

From Enlace Hacktivista
Jump to navigation Jump to search
imported>Mediawiki user
No edit summary
imported>Mediawiki user
No edit summary
Line 19: Line 19:
* https://www.hackthebox.com/
* https://www.hackthebox.com/
* https://www.pentesteracademy.com/
* https://www.pentesteracademy.com/
* https://lab.pentestit.ru/


General references:
General references:
Line 25: Line 26:
* https://dmcxblue.gitbook.io/red-team-notes-2-0/
* https://dmcxblue.gitbook.io/red-team-notes-2-0/
* https://github.com/swisskyrepo/PayloadsAllTheThings
* https://github.com/swisskyrepo/PayloadsAllTheThings
* https://github.com/S3cur3Th1sSh1t/Pentest-Tools


== Active Directory ==
== Active Directory ==
Line 37: Line 39:
* https://www.blackhillsinfosec.com/webcast-attack-tactics-5-zero-to-hero-attack/
* https://www.blackhillsinfosec.com/webcast-attack-tactics-5-zero-to-hero-attack/
* https://byt3bl33d3r.github.io/practical-guide-to-ntlm-relaying-in-2017-aka-getting-a-foothold-in-under-5-minutes.html
* https://byt3bl33d3r.github.io/practical-guide-to-ntlm-relaying-in-2017-aka-getting-a-foothold-in-under-5-minutes.html
* https://s3cur3th1ssh1t.github.io/The-most-common-on-premise-vulnerabilities-and-misconfigurations/
* A very thorough technical background: https://zer1t0.gitlab.io/posts/attacking_ad/
* A very thorough technical background: https://zer1t0.gitlab.io/posts/attacking_ad/
* kerberos background: https://www.tarlogic.com/blog/how-kerberos-works/


=== Tools ===
=== Tools ===
* https://mpgn.gitbook.io/crackmapexec/
* https://mpgn.gitbook.io/crackmapexec/
* https://www.secureauth.com/labs/open-source-tools/impacket/
* https://www.secureauth.com/labs/open-source-tools/impacket/
* https://github.com/dirkjanm/mitm6
* https://github.com/lgandx/Responder
* https://github.com/lgandx/Responder
* https://github.com/FuzzySecurity/StandIn
* https://github.com/FuzzySecurity/StandIn
Line 65: Line 70:
* https://github.com/dafthack/MSOLSpray
* https://github.com/dafthack/MSOLSpray
* https://github.com/dafthack/MFASweep
* https://github.com/dafthack/MFASweep
== C2 Frameworks ==
* https://docs.google.com/spreadsheets/d/1b4mUxa6cDQuTV2BPC6aA-GR4zGZi0ooPYtBe4IgPsSc




== Antivirus & EDR Evasion ==
== Antivirus & EDR Evasion ==
* https://s3cur3th1ssh1t.github.io/Bypass_AMSI_by_manual_modification/
* https://s3cur3th1ssh1t.github.io/Customizing_C2_Frameworks/
* https://s3cur3th1ssh1t.github.io/Powershell-and-the-.NET-AMSI-Interface/
* https://www.blackhillsinfosec.com/tag/sacred-cash-cow-tipping/
* https://blog.securityevaluators.com/creating-av-resistant-malware-part-1-7604b83ea0c0
* https://www.ired.team/offensive-security/defense-evasion
* https://www.youtube.com/watch?v=UO3PjJIiBIE
* https://github.com/matterpreter/DefenderCheck
* https://github.com/RythmStick/AMSITrigger
* https://amsi.fail


== Initial Access ==  
== Initial Access ==  
Line 73: Line 94:
=== Phishing ===
=== Phishing ===
* https://0xboku.com/2021/07/12/ArtOfDeviceCodePhish.html
* https://0xboku.com/2021/07/12/ArtOfDeviceCodePhish.html
* https://medium.com/maltrak/com-objects-p-2-your-stealthy-fileless-attack-bf78318d9165
=== Password spraying ===
=== Password spraying ===
== Opsec ==

Revision as of 13:02, 21 December 2021

This page aims to compile high quality resources for hackers. All books listed on this page can be found on Library Genesis and Z-Library

General Resources

Resources that assume little to no background knowledge:

Resources that assume minimal tech background:

  • (book) Penetration Testing: A Hands-On Introduction to Hacking

Resources that assume a tech or hacking background:

Practice labs:

General references:

Active Directory

Tools

Office 365 & Azure

Tools

C2 Frameworks


Antivirus & EDR Evasion


Initial Access

Phishing

Password spraying

Opsec