Skip to content

Latest commit

 

History

History
executable file
·
334 lines (263 loc) · 41.4 KB

bookmarks.md

File metadata and controls

executable file
·
334 lines (263 loc) · 41.4 KB

OSCP Course Review

http://www.techexams.net/forums/security-certifications/110760-oscp-jollyfrogs-tale.html

OSCP Inspired VMs and Walkthroughs

Cheat Sheets

http://hackingandsecurity.blogspot.com/2016/04/oscp-related-notes.html

Essentials

Windows Privledge Escalation

CTF Challenges

<TITLE>Bookmarks</TITLE>

Bookmarks Menu

Recent Tags

Mozilla Firefox

Help and Tutorials
Customize Firefox
Get Involved
About Us

Bookmarks Toolbar

Add bookmarks to this folder to see them displayed on the Bookmarks Toolbar

Forums
Offensive Security Training student forums
Support
IRC
Reporting
Control Panel
Exploitdb
The Exploit Database - Exploits, Shellcode, 0days, Remote Exploits, Local Exploits, Web Apps, Vulnerability Reports, Security Articles, Tutorials and more.

Resources

General Cheatsheets

Regex cheatsheet
TL;DR Pages
Simplified, community-driven man pages!
Markdown Cheatsheet
markdown-here - Google Chrome, Firefox, and Thunderbird extension that lets you write email in Markdown and render it before sending.

Discover Vulnerabilities

CVEDetails
Openbsd Openssh security vulnerabilities, exploits, metasploit modules, vulnerability statistics and list of versions

Privilege Escalation

FuzzySecurity | Windows Privilege Escalation Fundamentals
Privilege Escalation - Windows · Security - My notepad

OSCP Survival Guide
OSCP-Survival-Guide - Kali Linux Offensive Security Certified Professional Survival Exam Guide
SecLists
SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types include usernames, passwords, URLs, sensitive data grep strings, fuzzing payloads, and many more.
Guide to Alpha
Welcome to Offensive Security's complete guide to "Alpha".

Warning. This thread contains spoilers. Please note that Alpha cannot be included in your Lab Report

Table of Contents:

Introduction Abstract/Overview Reconnaissance

SSH Bad Keys
ssh-badkeys - A collection of static SSH keys (public and private) that have made their way into software and hardware products.
Port 135 - MSRPC · Pentesting Methodology

Internet Security by Zscaler

https://github.com/frizb

Jim Wilbur's Blog OSCP Links This is a list of links I used while studying for the Offensive Security Certified Professional (OSCP) exam. Reverse Shell Cheat Sheet – http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet Offensive Security’s Exploit Database Archive – https://www.exploit-db.com/ OSCP resource gold mine – https://backdoorshell.gitbooks.io/oscp-useful-links/content/ 0x0 Exploit Tutorial: Buffer Overflow – Vanilla EIP Overwrite – http://www.primalsecurity.net/0x0-exploit-tutorial-buffer-overflow-vanilla-eip-overwrite-2/ Basic Linux Privilege Escalation – https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation Vulnerable by Design – https://vulnhub.com Elevating privileges by exploiting weak folder permissions – www.greyhathacker.net/?p=738/ NSEDoc Reference – https://nmap.org/nsedoc/ Encyclopaedia Of Windows Privilege Escalation – Brett Moore – www.youtube.com/watch?v=kMG8IsCohHA Windows Privilege Escalation Fundamentals – http://www.fuzzysecurity.com/tutorials/16.html 0daysecurity Enumeration – http://0daysecurity.com/penetration-testing/enumeration.html Free Password Hash Cracker – https://crackstation.net/ LinEnum – https://github.com/rebootuser/LinEnum Linux_Exploit_Suggester – https://github.com/PenturaLabs/Linux_Exploit_Suggester Windows-Exploit-Suggester – https://github.com/GDSSecurity/Windows-Exploit-Suggester Windows Privilege Escalation – a cheatsheet – http://it-ovid.blogspot.com/2012/02/windows-privilege-escalation.html unix-privesc-check – http://pentestmonkey.net/tools/audit/unix-privesc-check windows-privesc-check – http://pentestmonkey.net/tools/windows-privesc-check John The Ripper Hash Formats – http://pentestmonkey.net/cheat-sheet/john-the-ripper-hash-formats Microsoft Privilege Escalation – www.toshellandback.com/2015/11/24/ms-priv-esc/ Kali linux Commands Complete List from A to Z – https://geekviews.tech/kali-linux-commands-complete-list/

Resources: Some resources I used for this challenge: http://www.fuzzysecurity.com/tutorials/16.html http://pentestmonkey.net/category/cheat-sheet/shell https://github.com/GDSSecurity/Windows-Exploit-Suggester https://github.com/PenturaLabs/Linux_Exploit_Suggester https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/ http://www.offensive-security.com/metasploit-unleashed/Main_Page I also read the hackers playbook, the Metasploit unleashed book, and the Penetration Testing book by Georgia Weidman. These are all very good resources.