January 21, 2018
2 - Social Engineering
This page is a menu placeholder
Penetration Testing
0 - Knowledge and Resources
Wireless hacking
Various Tools
Useful Commands - Windows
Useful Commands - Linux
Transfer Files - Windows
Transfer Files - Linux
tcpdump examples
Kali - msfvenom
Kali - msfconsole (Metasploit)
Jollyfrogs' pedantic guide to pivoting - part 1: SSH local port forwarding
Create customized wordlist
Bypassing filters
1 - Passive Information Gathering
2 - Social Engineering
3 - Remote Recon and Enumeration
NMAP
4 - Remote Exploitation
5 - Local Recon and Enumeration
6 - Local Privilege Escalation
Escape restricted or limited shells
7 - Loot, Persistence and Cleanup
Installation Guides: Lab setups, Kali, etc.
Pivoting - Installation guide of "target-1"
Pivoting - Installation guide of "pivot-host-1"
Kali2017.3 64-bit installation guide on VirtualBox in Windows 10
Kali 64-bit installation guide on VirtualBox in Windows 10
Certification: SLAE, OSCP, OSCE, OSEE, etc.
Certification: SLAE
SLAE: Assignment 1 of 7
SLAE: Assignment 2 of 7
SLAE: Assignment 3 of 7
SLAE: Assignment 4 of 7
SLAE: Assignment 5 of 7
SLAE: Assignment 6 of 7
SLAE: Assignment 7 of 7
Review - SecurityTube Linux Assembly Expert (SLAE)
Certification: OSCP
OSCP
Certification: OSCE
OSCE
Certification: OSEE
OSEE
Capture The Flag (CTF) write-ups
SANS Holiday Hack Challenge 2018 - KringleCon walkthrough
Elf #1 - Bushy Evergreen: Essential Editor Skills Cranberry Pi terminal
Elf #2 - Minty Candycane: The Name Game Cranberry Pi terminal
Elf #3 - Tangle Coalbox - Lethal ForensicELFication Cranberry Pi terminal
Elf #4 - Wunorse Openslae - Stall Mucking Report Cranberry Pi terminal
Elf #5 - Holly Evergreen - CURLing Master Cranberry Pi terminal
Elf #6 - Pepper Minstix: Yule Log Analysis Cranberry Pi terminal
Elf #7 - Sparkle Redberry - Dev Ops Fail Cranberry Pi terminal
Elf #8 - SugarPlum Mary - Python Escape from LA Cranberry Pi terminal
Elf #9 - Shinny Upatree - Sleigh Bell Lottery Cranberry Pi terminal
Objective 1: Orientation Challenge
Objective 2: Directory Browsing
Objective 3: De Bruijn Sequences
Objective 4: Data Repo Analysis
Objective 5: AD Privilege Discovery
Objective 6: Badge Manipulation
Objective 7: HR Incident Response
Objective 8: Network Traffic Forensics
Objective 9.1: Catch the malware
Objective 9.2: Identify the Domain
Objective 9.3: Stop the Malware
Objective 9.4: Recover Alabaster's Password
Objective 10: Who Is Behind It All?
Easter Eggs