Skip to content

Latest commit

 

History

History
93 lines (91 loc) · 5.92 KB

RedBootcamp.md

File metadata and controls

93 lines (91 loc) · 5.92 KB

⭐️Goals

  • Starting point if you want to grind, but aren't sure where to start
  • Start a good foundation in the three main pentesting areas (web, linux, windows)
  • Learn how to research and grow on your own
  • Learn when to ask for help/look for a writeup or hint

📝Note Taking

This is quite literally the most import thing you can take away from this document. Taking notes on techniques, tactics, and procedures (TTPs) is your new religion. All hail your notes 🙏

  • As you you go through these labs and start getting hands on experience, make sure to take notes on TTPs as you come across them
  • These in no way need to be complete right off the bat, they should be living documents that you update as you learn
  • Stick to a good note taking tool
    • I like obsidian because I can format things nicely and publish them to my github :)

🌐Web

Portswigger will be your bestie. Learn her, love her, cherish her 😍

🔴Linux

Linux is pretty straightforward, especially if you are familiar with the command line. I don't have specific htb's to recommend because the ones I really like are paywalled, but you can apply these TTPs to any box you do! *

🟦Windows

Windows can be really intimidating (it literally took me halfway through my internship to bite the bullet and dive into it head first; you're not alone). The great thing about Windows is that is a glorified mess, and once you learn some TTPs you can start to see how easy it is to break. Like Linux, I don't have specific htb's to recommend because the ones I really like are paywalled, but you can apply these TTPs to any box you do!

impacket-GetNPUsers htb.local/ -usersfile users.txt -format hashcat -outputfile output.hash -dc-ip <IPADDR>
hashcat -m 18200 -a 0 output.hash /usr/share/wordlists/rockyou.txt.gz
  • Kerberoasting
  • ldapsearch
  • bloodhound
    • need to start a neo4j instance
    • need to run bloodhound
    • need to run sharphound on
  • Secretsdump
impacket-secretsdump 'FOREST.HTB.LOCAL'/'user':'pass'@'DC' -target-ip <IPADDR>

📖Resources

Resource Link
Hack Tricks https://book.hacktricks.xyz/
Port Swigger https://portswigger.net/web-security
Payloads https://github.com/swisskyrepo/PayloadsAllTheThings
Hack the Box https://app.hackthebox.com/