Learn to hack: Difference between revisions

From Enlace Hacktivista
Jump to navigation Jump to search
No edit summary
No edit summary
Line 42: Line 42:
* https://www.blackhillsinfosec.com/webcast-attack-tactics-5-zero-to-hero-attack/
* https://www.blackhillsinfosec.com/webcast-attack-tactics-5-zero-to-hero-attack/
* https://byt3bl33d3r.github.io/practical-guide-to-ntlm-relaying-in-2017-aka-getting-a-foothold-in-under-5-minutes.html
* https://byt3bl33d3r.github.io/practical-guide-to-ntlm-relaying-in-2017-aka-getting-a-foothold-in-under-5-minutes.html
* https://www.trustedsec.com/blog/a-comprehensive-guide-on-relaying-anno-2022/
* https://en.hackndo.com/ntlm-relay/
* https://s3cur3th1ssh1t.github.io/The-most-common-on-premise-vulnerabilities-and-misconfigurations/
* https://s3cur3th1ssh1t.github.io/The-most-common-on-premise-vulnerabilities-and-misconfigurations/
* A very thorough technical background: https://zer1t0.gitlab.io/posts/attacking_ad/
* A very thorough technical background: https://zer1t0.gitlab.io/posts/attacking_ad/
Line 131: Line 133:
* https://book.hacktricks.xyz/phishing-methodology
* https://book.hacktricks.xyz/phishing-methodology
* https://outflank.nl/blog/2020/03/30/mark-of-the-web-from-a-red-teams-perspective
* https://outflank.nl/blog/2020/03/30/mark-of-the-web-from-a-red-teams-perspective
* https://delta.navisec.io/a-pentesters-guide-part-4-grabbing-hashes-and-forging-external-footholds/
* https://www.rootshellsecurity.net/ntlm_theft-a-tool-for-file-based-forced-ntlm-hash-disclosure/


=== Password spraying ===
=== Password spraying ===

Revision as of 19:27, 8 March 2022

This page aims to compile high quality resources for hackers. All books listed on this page can be found on Library Genesis and Z-Library

General Resources

Resources that assume little to no background knowledge:

Resources that assume minimal tech background:

Resources that assume a tech or hacking background:

Practice labs:

General references:

Active Directory

Tools

Office 365 & Azure

Tools

GSuite

https://www.slideshare.net/dafthack/ok-google-how-do-i-red-team-gsuite

C2 Frameworks

Antivirus & EDR Evasion

VMware

RocketChat

Microsoft Exchange

ProxyLogon is dead. It's mitigated by Defender. ProxyShell is not. AMSI catches unmodified public exploits.

Initial Access

Phishing

Password spraying

Scanning and Recon

Opsec