This is a repository of notes and material that I consider necessary in advance to opt for the course and the OSEP certification (Techniques of Evasion and Breaching Defenses)
This compilation of material is very much influenced by nullg0re (GIT) and more!
######## ##### ######## ##### ## ##
## ## ## ## ## ## ## ## ## ##
## ## ## ## ## ## ## ## ## ##
######## ## ## ######## ## ## ###
## ## ## ## ## ## ## ## ## ##
## ## ## ## ## ## ## ## ## ##
## ## ##### ## ## ##### ## ##
- Programming languages
- Operating System
- Client Side Code Execution
- Process Injection and Migration
- Introduction to Antivirus Evasion
- Advanced Antivirus Evasion
- Application Whitelisting
- Bypassing Network Filters
- Linux Post-Exploitation
- Kiosk Breakouts
- Windows Credentials
- Windows Lateral Movement
- Linux Lateral Movement
- Microsoft SQL Attacks
- Active Directory Exploitation
For this certification it is very important to have a knowledge base in the following programming languages:
Bash: https://www.youtube.com/watch?v=smbeKPDVs2I
Python: https://www.youtube.com/playlist?list=PLBf0hzazHTGM_dncTqO9l-0zUQYP0nNPU
C#: https://www.youtube.com/watch?v=GhQdlIFylQ8
Introduction to VBA: https://docs.microsoft.com/en-us/office/vba/library-reference/concepts/getting-started-with-vba-in-office
Win32 API's
Offensive P/Invoke: https://posts.specterops.io/offensive-p-invoke-leveraging-the-win32-api-from-managed-code-7eef4fdef16d
Process Injection: https://rastamouse.me/blog/process-injection-dinvoke/
Wiki for .NET developers: https://www.pinvoke.net/
Windows Registry
Win register: https://docs.microsoft.com/en-us/troubleshoot/windows-server/performance/windows-registry-advanced-users
Staged VS Stageless handlers (Payloads): https://buffered.io/posts/staged-vs-stageless-handlers/
HTML Smuggling: https://outflank.nl/blog/2018/08/14/html-smuggling-explained/
Embed in HTML: https://github.com/Arno0x/EmbedInHTML
Macro Malware: https://docs.microsoft.com/en-us/windows/security/threat-protection/intelligence/macro-malware
Automatically Macro: https://support.microsoft.com/en-us/office/automatically-run-a-macro-when-opening-a-workbook-1e55959b-e077-4c88-a696-c3017600db44
Working Windows API in VBA: https://www.aeternus.sg/how-to-use-windows-api-in-vba/
Powershell Shellcode: https://www.powershellgallery.com/packages/PowerSploit/1.0.0.0/Content/CodeExecution%5CInvoke-Shellcode.ps1
Code Execution in VBA Macro: https://www.bitdam.com/2018/05/22/propertybomb-an-old-new-technique-for-arbitrary-code-execution-in-vba-macro/
MSBuild Generator: https://github.com/infosecn1nja/MaliciousMacroMSBuild
PowerShell & Windows API: https://devblogs.microsoft.com/scripting/use-powershell-to-interact-with-the-windows-api-part-1/
PowerSploit: https://github.com/PowerShellMafia/PowerSploit
PowerShell in Memory: https://isc.sans.edu/forums/diary/Fileless+Malicious+PowerShell+Sample/23081/
DelegateType Reflection: https://docs.microsoft.com/en-us/dotnet/framework/reflection-and-codedom/how-to-hook-up-a-delegate-using-reflection
Get Delegate: https://www.powershellgallery.com/packages/poke/1.0.0.2/Content/delegate.ps1
Proxy-Aware PowerShell Communications: https://powershell.org/forums/topic/set-dsclocalconfigurationmanager-and-proxy-awareness/
PowerShell Proxy with Authentication: https://medium.com/river-yang/powershell-working-behind-a-proxy-with-authentication-eb68a337f222
JScript Execution: https://docs.microsoft.com/en-us/previous-versions/windows/desktop/indexsrv/running-a-jscript-query
JScript Basic Dropper: https://github.com/hlldz/SpookFlare
Payload Creation and Obfuscation: https://github.com/tyranid/DotNetToJScript
SharpShooter: https://github.com/mdsecactivebreach/SharpShooter
Process Injection:
https://github.com/3xpl01tc0d3r/ProcessInjection https://rastamouse.me/blog/process-injection-dinvoke/
DLL Injection:
http://blog.opensecurityresearch.com/2013/01/windows-dll-injection-basics.html
https://medium.com/bug-bounty-hunting/dll-injection-attacks-in-a-nutshell-71bc84ac59bd
Reflective DLL Injection: https://github.com/stephenfewer/ReflectiveDLLInjection
DLL Injection via PowerShell: https://clymb3r.wordpress.com/2013/04/06/reflective-dll-injection-with-powershell/
Process Hollowing: https://gist.github.com/smgorelik/9a80565d44178771abf1e4da4e2a0e75
Metasploit Encryptors: https://blog.rapid7.com/2019/11/21/metasploit-shellcode-grows-up-encrypted-and-authenticated-c-shells/
Payload Encryption: https://sevrosecurity.com/2019/05/25/bypass-windows-defender-with-a-simple-shell-loader/
Antiscan.me: https://antiscan.me/
ASB Bbypass:
https://rastamouse.me/blog/asb-bypass-pt2/ https://rastamouse.me/blog/asb-bypass-pt3/ https://rastamouse.me/blog/asb-bypass-pt4/
Intro: https://searchsecurity.techtarget.com/definition/application-whitelisting
Bypasses: https://github.com/api0cradle/UltimateAppLockerByPassList
Domain Fronting:
https://attack.mitre.org/techniques/T1090/004/
https://medium.com/@malcomvetter/simplifying-domain-fronting-8d23dcb694a0
DNS Tunneling
https://www.paloaltonetworks.com/cyberpedia/what-is-dns-tunneling
https://unit42.paloaltonetworks.com/dns-tunneling-how-dns-can-be-abused-by-malicious-actors/
Command List: https://github.com/mubix/post-exploitation/wiki/Linux-Post-Exploitation-Command-List
Kiosk Breakouts / Attacks: https://www.trustedsec.com/blog/kioskpos-breakout-keys-in-windows/
Kiosk Windows: https://www.engetsu-consulting.com/blog/kiosk-breakout-windows
Shared DLL Hijacking: : https://www.boiteaklou.fr/Abusing-Shared-Libraries.html
MITRE: https://attack.mitre.org/tactics/TA0006/
SAM Dump: https://www.hackingarticles.in/credential-dumping-sam/
Hardening the Local Admin Account (LAPS):
https://rastamouse.me/blog/laps-pt1/ https://rastamouse.me/blog/laps-pt2/
LAPSPasswords: https://github.com/kfosaaen/Get-LAPSPasswords
Microsoft Defender Lateral Movement Paths: https://docs.microsoft.com/en-us/defender-for-identity/use-case-lateral-movement-path
Offensive Lateral Movement: https://posts.specterops.io/offensive-lateral-movement-1744ae62b14f
Restricting SMB: https://medium.com/palantir/restricting-smb-based-lateral-movement-in-a-windows-environment-ed033b888721
MITRE: https://attack.mitre.org/matrices/enterprise/linux/
Lateral Movement with shell: https://redcanary.com/blog/lateral-movement-with-secure-shell/
Post exploit: https://mrw0r57.github.io/2020-05-31-linux-post-exploitation-10-4/
MS SQL Enumeration:
https://www.mssqltips.com/sqlservertip/4181/inventory-sql-logins-on-a-sql-server-with-powershell/
NC Path Injection
https://gist.github.com/nullbind/7dfca2a6309a4209b5aeef181b676c6e
https://blog.netspi.com/executing-smb-relay-attacks-via-sql-server-using-metasploit/
https://hackingandsecurity.blogspot.com/2017/07/10-places-to-stick-your-unc-path.html
BloodHound: https://github.com/BloodHoundAD/BloodHound
Ingestors: https://github.com/BloodHoundAD/SharpHound
https://github.com/BloodHoundAD/BloodHound/blob/master/Collectors/AzureHound.ps1
https://github.com/BloodHoundAD/BloodHound/blob/master/Collectors/SharpHound.ps1
Abusing Object Security Permissions: https://www.ired.team/offensive-security-experiments/active-directory-kerberos-abuse/abusing-active-directory-acls-aces
Unconstrained Delegation:
https://dirkjanm.io/krbrelayx-unconstrained-delegation-abuse-toolkit/
https://www.qomplx.com/qomplx-knowledge-kerberos-delegation-attacks-explained/
Constrained Delegation:
Resource-Based Constrained Delegation:
https://shenaniganslabs.io/2019/01/28/Wagging-the-Dog.html
Active Directoy Inter-Forest Exploitation:
http://www.harmj0y.net/blog/redteaming/a-guide-to-attacking-domain-trusts/
https://www.harmj0y.net/blog/redteaming/not-a-security-boundary-breaking-forest-trusts/
https://adsecurity.org/?p=1588
https://github.com/S1ckB0y1337/Active-Directory-Exploitation-Cheat-Sheet
https://book.hacktricks.xyz/windows/active-directory-methodology/acl-persistence-abuse
##Tools & Scripts:
BloodHoundL: https://github.com/BloodHoundAD/BloodHound
CrackMapExec: https://github.com/byt3bl33d3r/CrackMapExec
JAWS: https://github.com/411Hall/JAWS
Linux priv checker: https://github.com/sleventyeleven/linuxprivchecker