diff --git a/docs/guides/security/vulnerabilities/hackersploit-note-shortguide/index.md b/docs/guides/security/vulnerabilities/hackersploit-note-shortguide/index.md new file mode 100644 index 00000000000..3dda7726d7a --- /dev/null +++ b/docs/guides/security/vulnerabilities/hackersploit-note-shortguide/index.md @@ -0,0 +1,15 @@ +--- +slug: hackersploit-note-shortguide +title: "HackerSploit Red Team Series Deprecated Note" +description: "A note that instructs readers the original repository is no longer available on the internet." +authors: ["Linode"] +contributors: ["Linode"] +published: 2025-09-01 +keywords: [] +license: '[CC BY-ND 4.0](https://creativecommons.org/licenses/by-nd/4.0)' +headless: true +show_on_rss_feed: false +--- +{{< note type="note" >}} +This series has been deprecated. The original repository is no longer available on the internet, and the link has been removed. +{{< /note >}} diff --git a/docs/guides/security/vulnerabilities/hackersploit-red-team-series/index.md b/docs/guides/security/vulnerabilities/hackersploit-red-team-series/index.md index b7178131149..5de70aa4044 100644 --- a/docs/guides/security/vulnerabilities/hackersploit-red-team-series/index.md +++ b/docs/guides/security/vulnerabilities/hackersploit-red-team-series/index.md @@ -8,6 +8,7 @@ published: 2021-11-03 keywords: ['security'] tags: ['security'] license: '[CC BY-ND 4.0](https://creativecommons.org/licenses/by-nd/4.0)' +deprecated: true --- The rate of data breaches and APT attacks has been rapidly increasing during the period of COVID-19. Organizations are starting to recognize that their IT infrastructure has weaknesses and vulnerabilities, at great expense to their operations and customer data. For medium to large enterprise organizations, a defense-in-depth strategy that includes testing your defenses is required. This is where red teaming comes into play. diff --git a/docs/guides/security/vulnerabilities/linux-defense-evasion-hiding-linux-processes/index.md b/docs/guides/security/vulnerabilities/linux-defense-evasion-hiding-linux-processes/index.md index 23d8d949878..f311c8642b3 100644 --- a/docs/guides/security/vulnerabilities/linux-defense-evasion-hiding-linux-processes/index.md +++ b/docs/guides/security/vulnerabilities/linux-defense-evasion-hiding-linux-processes/index.md @@ -8,10 +8,13 @@ published: 2021-11-03 keywords: ['security'] tags: ['security'] license: '[CC BY-ND 4.0](https://creativecommons.org/licenses/by-nd/4.0)' +deprecated: true --- {{% content "hackersploit-red-team-series-note-shortguide" %}} +{{% content "hackersploit-note-shortguide" %}} + {{% content "hackersploit-caution-shortguide" %}} ## Before You Begin diff --git a/docs/guides/security/vulnerabilities/linux-red-team-defense-evasion-rootkits/index.md b/docs/guides/security/vulnerabilities/linux-red-team-defense-evasion-rootkits/index.md index 22d56da21ae..3c3991911ba 100644 --- a/docs/guides/security/vulnerabilities/linux-red-team-defense-evasion-rootkits/index.md +++ b/docs/guides/security/vulnerabilities/linux-red-team-defense-evasion-rootkits/index.md @@ -8,10 +8,13 @@ published: 2021-11-03 keywords: ['security'] tags: ['security'] license: '[CC BY-ND 4.0](https://creativecommons.org/licenses/by-nd/4.0)' +deprecated: true --- {{% content "hackersploit-red-team-series-note-shortguide" %}} +{{% content "hackersploit-note-shortguide" %}} + {{% content "hackersploit-caution-shortguide" %}} ## Before You Begin diff --git a/docs/guides/security/vulnerabilities/linux-red-team-exploitation-techniques/index.md b/docs/guides/security/vulnerabilities/linux-red-team-exploitation-techniques/index.md index 8407bf8a68d..924280a72a4 100644 --- a/docs/guides/security/vulnerabilities/linux-red-team-exploitation-techniques/index.md +++ b/docs/guides/security/vulnerabilities/linux-red-team-exploitation-techniques/index.md @@ -8,10 +8,13 @@ published: 2021-11-03 keywords: ['security'] tags: ['security'] license: '[CC BY-ND 4.0](https://creativecommons.org/licenses/by-nd/4.0)' +deprecated: true --- {{% content "hackersploit-red-team-series-note-shortguide" %}} +{{% content "hackersploit-note-shortguide" %}} + {{% content "hackersploit-caution-shortguide" %}} ## MITRE ATT&CK Exploitation and Initial Access Techniques @@ -202,7 +205,7 @@ It is possible to use the Kali Linux GUI in VirtualBox to perform the instructio ## Port Scanning -The first step in the exploitation phase involves scanning the target server for open ports. The scan lists the services and their respective service versions running on the open ports. Port scanning was briefly explored in the [reconnaissance phase](/docs/guides/red-team-reconnaissance-techniques/). This section shows how to scan open ports and perform enumeration in more detail with the nmap tool. +The first step in the exploitation phase involves scanning the target server for open ports. The scan lists the services and their respective service versions running on the open ports. This section shows how to scan open ports and perform enumeration in more detail with the nmap tool. ### Port Scanning with nmap @@ -276,7 +279,7 @@ Nmap done: 1 IP address (1 host up) scanned in 47.02 seconds | 111 | RPC | | 55995 | RPC | - We are also able to deduce from the service version banners that the target is running Debian. This information is relevant during the [privilege escalation phase](/docs/guides/linux-red-team-privilege-escalation-techniques/). + We are also able to deduce from the service version banners that the target is running Debian. ## Web Server Enumeration @@ -561,8 +564,7 @@ The kernel version on the target system can be found by running: uname -a -The output shows the target system is running an outdated kernel. This information is useful during the [privilege escalation phase](/docs/guides/linux-red-team-privilege-escalation-techniques/): - +The output shows the target system is running an outdated kernel. {{< output >}} Linux Raven 3.16.0-6-amd64 #1 SMP Debian 3.16.57-2 (2018-07-14) x86_64 GNU/Linux {{< /output >}} @@ -693,8 +695,7 @@ mysql> We have now been able to obtain an initial foothold on the target system and take control of the MySQL database server. The next steps for targeting Linux systems include: -- [Elevating your privileges on the target system](/docs/guides/linux-red-team-privilege-escalation-techniques/) +- Elevating your privileges on the target system -- [Establishing persistence to maintain access](/docs/guides/linux-red-team-persistence-techniques/) +- Establishing persistence to maintain access -Visit the [HackerSploit Red Team parent page](/docs/guides/hackersploit-red-team-series/) to navigate to other parts of this guide series. \ No newline at end of file diff --git a/docs/guides/security/vulnerabilities/linux-red-team-persistence-techniques/index.md b/docs/guides/security/vulnerabilities/linux-red-team-persistence-techniques/index.md index 9922cdf55c6..b668a50958d 100644 --- a/docs/guides/security/vulnerabilities/linux-red-team-persistence-techniques/index.md +++ b/docs/guides/security/vulnerabilities/linux-red-team-persistence-techniques/index.md @@ -12,6 +12,8 @@ license: '[CC BY-ND 4.0](https://creativecommons.org/licenses/by-nd/4.0)' {{% content "hackersploit-red-team-series-note-shortguide" %}} +{{% content "hackersploit-note-shortguide" %}} + {{% content "hackersploit-caution-shortguide" %}} ## Before You Begin diff --git a/docs/guides/security/vulnerabilities/linux-red-team-privilege-escalation-techniques/index.md b/docs/guides/security/vulnerabilities/linux-red-team-privilege-escalation-techniques/index.md index 0f0fe3402dd..fe645f4a96f 100644 --- a/docs/guides/security/vulnerabilities/linux-red-team-privilege-escalation-techniques/index.md +++ b/docs/guides/security/vulnerabilities/linux-red-team-privilege-escalation-techniques/index.md @@ -8,10 +8,13 @@ published: 2021-11-03 keywords: ['security'] tags: ['security'] license: '[CC BY-ND 4.0](https://creativecommons.org/licenses/by-nd/4.0)' +deprecated: true --- {{% content "hackersploit-red-team-series-note-shortguide" %}} +{{% content "hackersploit-note-shortguide" %}} + {{% content "hackersploit-caution-shortguide" %}} ## Before You Begin diff --git a/docs/guides/security/vulnerabilities/red-team-adversary-emulation-with-caldera/index.md b/docs/guides/security/vulnerabilities/red-team-adversary-emulation-with-caldera/index.md index 1a3b30e7420..3c9b5156bbc 100644 --- a/docs/guides/security/vulnerabilities/red-team-adversary-emulation-with-caldera/index.md +++ b/docs/guides/security/vulnerabilities/red-team-adversary-emulation-with-caldera/index.md @@ -10,10 +10,13 @@ tags: ['security'] license: '[CC BY-ND 4.0](https://creativecommons.org/licenses/by-nd/4.0)' external_resources: - '[Official Caldera documentation](https://caldera.readthedocs.io/en/latest/index.html)' +deprecated: true --- {{% content "hackersploit-red-team-series-note-shortguide" %}} +{{% content "hackersploit-note-shortguide" %}} + {{% content "hackersploit-caution-shortguide" %}} CALDERA™ is a cybersecurity framework designed to easily automate adversary emulation, assist manual red-teams, and automate incident response. diff --git a/docs/guides/security/vulnerabilities/red-team-reconnaissance-techniques/index.md b/docs/guides/security/vulnerabilities/red-team-reconnaissance-techniques/index.md index 87a9764676b..56150575fbd 100644 --- a/docs/guides/security/vulnerabilities/red-team-reconnaissance-techniques/index.md +++ b/docs/guides/security/vulnerabilities/red-team-reconnaissance-techniques/index.md @@ -8,10 +8,13 @@ published: 2021-11-03 keywords: ['security'] tags: ['security'] license: '[CC BY-ND 4.0](https://creativecommons.org/licenses/by-nd/4.0)' +deprecated: true --- {{% content "hackersploit-red-team-series-note-shortguide" %}} +{{% content "hackersploit-note-shortguide" %}} + {{% content "hackersploit-caution-shortguide" %}} ## Before You Begin diff --git a/docs/guides/security/vulnerabilities/windows-red-team-credential-access-with-mimikatz/index.md b/docs/guides/security/vulnerabilities/windows-red-team-credential-access-with-mimikatz/index.md index 10ba9e15fba..462839fe6ec 100644 --- a/docs/guides/security/vulnerabilities/windows-red-team-credential-access-with-mimikatz/index.md +++ b/docs/guides/security/vulnerabilities/windows-red-team-credential-access-with-mimikatz/index.md @@ -8,10 +8,13 @@ published: 2021-11-03 keywords: ['security'] tags: ['security'] license: '[CC BY-ND 4.0](https://creativecommons.org/licenses/by-nd/4.0)' +deprecated: true --- {{% content "hackersploit-red-team-series-note-shortguide" %}} +{{% content "hackersploit-note-shortguide" %}} + {{% content "hackersploit-caution-shortguide" %}} ## Before You Begin diff --git a/docs/guides/security/vulnerabilities/windows-red-team-defense-evasion-techniques/index.md b/docs/guides/security/vulnerabilities/windows-red-team-defense-evasion-techniques/index.md index 375097fa5f1..3af50df0aea 100644 --- a/docs/guides/security/vulnerabilities/windows-red-team-defense-evasion-techniques/index.md +++ b/docs/guides/security/vulnerabilities/windows-red-team-defense-evasion-techniques/index.md @@ -8,10 +8,13 @@ published: 2021-11-03 keywords: ['security'] tags: ['security'] license: '[CC BY-ND 4.0](https://creativecommons.org/licenses/by-nd/4.0)' +deprecated: true --- {{% content "hackersploit-red-team-series-note-shortguide" %}} +{{% content "hackersploit-note-shortguide" %}} + {{% content "hackersploit-caution-shortguide" %}} ## Before You Begin diff --git a/docs/guides/security/vulnerabilities/windows-red-team-exploitation-techniques/index.md b/docs/guides/security/vulnerabilities/windows-red-team-exploitation-techniques/index.md index 1c56e149f04..fb3da51b3b4 100644 --- a/docs/guides/security/vulnerabilities/windows-red-team-exploitation-techniques/index.md +++ b/docs/guides/security/vulnerabilities/windows-red-team-exploitation-techniques/index.md @@ -8,10 +8,13 @@ published: 2021-11-03 keywords: ['security'] tags: ['security'] license: '[CC BY-ND 4.0](https://creativecommons.org/licenses/by-nd/4.0)' +deprecated: true --- {{% content "hackersploit-red-team-series-note-shortguide" %}} +{{% content "hackersploit-note-shortguide" %}} + {{% content "hackersploit-caution-shortguide" %}} ## Before You Begin diff --git a/docs/guides/security/vulnerabilities/windows-red-team-lateral-movement-techniques/index.md b/docs/guides/security/vulnerabilities/windows-red-team-lateral-movement-techniques/index.md index 33f4d0b4ec1..1748e234dd7 100644 --- a/docs/guides/security/vulnerabilities/windows-red-team-lateral-movement-techniques/index.md +++ b/docs/guides/security/vulnerabilities/windows-red-team-lateral-movement-techniques/index.md @@ -8,10 +8,13 @@ published: 2021-11-03 keywords: ['security'] tags: ['security'] license: '[CC BY-ND 4.0](https://creativecommons.org/licenses/by-nd/4.0)' +deprecated: true --- {{% content "hackersploit-red-team-series-note-shortguide" %}} +{{% content "hackersploit-note-shortguide" %}} + {{% content "hackersploit-caution-shortguide" %}} ## Before You Begin diff --git a/docs/guides/security/vulnerabilities/windows-red-team-persistence-techniques/index.md b/docs/guides/security/vulnerabilities/windows-red-team-persistence-techniques/index.md index 46d8ca6578d..4853f550470 100644 --- a/docs/guides/security/vulnerabilities/windows-red-team-persistence-techniques/index.md +++ b/docs/guides/security/vulnerabilities/windows-red-team-persistence-techniques/index.md @@ -8,10 +8,13 @@ published: 2021-11-03 keywords: ['security'] tags: ['security'] license: '[CC BY-ND 4.0](https://creativecommons.org/licenses/by-nd/4.0)' +deprecated: true --- {{% content "hackersploit-red-team-series-note-shortguide" %}} +{{% content "hackersploit-note-shortguide" %}} + {{% content "hackersploit-caution-shortguide" %}} ## Before You Begin diff --git a/docs/guides/security/vulnerabilities/windows-red-team-privilege-escalation-techniques/index.md b/docs/guides/security/vulnerabilities/windows-red-team-privilege-escalation-techniques/index.md index 6d91fe8a861..dc39e392d53 100644 --- a/docs/guides/security/vulnerabilities/windows-red-team-privilege-escalation-techniques/index.md +++ b/docs/guides/security/vulnerabilities/windows-red-team-privilege-escalation-techniques/index.md @@ -8,10 +8,13 @@ published: 2021-11-03 keywords: ['security'] tags: ['security'] license: '[CC BY-ND 4.0](https://creativecommons.org/licenses/by-nd/4.0)' +deprecated: true --- {{% content "hackersploit-red-team-series-note-shortguide" %}} +{{% content "hackersploit-note-shortguide" %}} + {{% content "hackersploit-caution-shortguide" %}} ## Before You Begin