專項(xiàng)學(xué)習(xí)資源:
INE機(jī)構(gòu)OSCP課程<價(jià)值999美元>已翻譯版:
????嗶哩嗶哩(未翻譯版)
????OSCP教學(xué)部分
????下載地址(已翻譯版)?提取碼:?agvm?
OSCP certification notes and tools,比較新
使用Python的緩沖區(qū)溢出的OSCP準(zhǔn)備指南
Notes of my Offensive Security Certified Professional (OSCP) study plan
一個(gè)充滿tip和cheat sheets的網(wǎng)站
Windows Privilege Escalation Methods for Pentesters_Windows下比較全的提權(quán)方法
Metasploit Unleashed – Free Ethical Hacking Course
Notes for taking the OSCP in 2097
My roadmap for preparing for OSCP
https://vincentyiu.co.uk/red-team
user-account-co(ntrol-what-penetration-testers-should-know
專題練習(xí)平臺(tái)(對(duì)某一種類型的漏洞或技術(shù)做專項(xiàng)訓(xùn)練)
Root Me(官網(wǎng)提供的資料超級(jí)好兵迅,建議多看看)
相關(guān)書籍
報(bào)告編寫
由多家咨詢公司和學(xué)術(shù)安全組織發(fā)布的公共滲透測試報(bào)告的精選清單
在線實(shí)驗(yàn)室推薦(跟Lab環(huán)境類似)
https://pentesterlab.com
https://www.abatchy.com/2017/02/oscp-like-vulnhub-vms
https://www.vulnhub.com
https://lab.pentestit.ru
https://www.root-me.org
https://www.virtualhackinglabs.com/
https://attackdefense.com
基礎(chǔ)學(xué)習(xí)
基礎(chǔ)知識(shí)
1. 熟練使用Linux, 參考?http://linuxcommand.org?練習(xí)常用的命令如果你有充足的時(shí)間薪贫,并且希望linux學(xué)習(xí)的過程不是那么枯燥的話恍箭,可以試試?http://overthewire.org/wargames/
2. 如果大家沒有編程經(jīng)驗(yàn),還是建議大家還是學(xué)一門編程語言瞧省, 推薦學(xué)習(xí) Python扯夭, 可以參考這個(gè)課程?http://www.pentesteracademy.com/course?id=1
3. Metasploit,Metasploit是一個(gè)非常強(qiáng)大的工具,所有滲透測試人員都必須知道如何使用它鞍匾,沒有例外交洗。參考材料:?https://www.offensive-security.com/metasploit-unleashed/?雖然Metasploit在考試中的使用僅限于一臺(tái)機(jī)器,但是仍然可以在實(shí)驗(yàn)室中進(jìn)行實(shí)踐橡淑,以便深入了解該工具构拳。
4. 緩存/緩沖區(qū)溢出(Buffer overflow)緩沖區(qū)溢出是你應(yīng)該熟悉的一個(gè)非常重要的概念。如果你善于利用緩沖區(qū)溢出梁棠,那么在實(shí)際考試中一定會(huì)得到不錯(cuò)的分?jǐn)?shù)置森。但如果對(duì)緩沖區(qū)溢出一無所知,也不必?fù)?dān)心掰茶。下面的步驟將使你不僅理解緩沖區(qū)溢出的概念暇藏,而且還可以學(xué)會(huì)如何利用。這個(gè)視頻是個(gè)簡單的介紹:https://www.youtube.com/watch?v=1S0aBV-Waeo?什么是緩沖區(qū)溢出?濒蒋⊙渭睿看完這個(gè)視頻后,你將了解緩沖區(qū)溢出背后的概念沪伙。同時(shí)瓮顽,也會(huì)增加你學(xué)習(xí)緩沖區(qū)溢出的沖動(dòng)。緩沖區(qū)溢出的實(shí)時(shí)利用將是非常有趣的围橡,其中的利用是逐步清楚地解釋暖混。你甚至可以自己試一試,就像視頻中提到的那樣翁授。更多材料拣播,請(qǐng)學(xué)習(xí) Vivek Ramachandran的視頻https://www.youtube.com/channel/UCV61whKVQpEmHVgFd_-Y7kQ/feed
方法與提示:
1. 只有使用適當(dāng)?shù)拿杜e晾咪,你才能成功地利用任何目標(biāo)。參考 “nmap: scanning the internet”?https://www.youtube.com/watch?v=Hk-21p2m8YY
2. 列舉每一個(gè)端口贮配。查找正在運(yùn)行的服務(wù)谍倦。如果你不知道,只需輸入端口谷歌/百度即可泪勒。也請(qǐng)參閱下面的文章http://www.0daysecurity.com/penetration-testing/enumeration.html
3. 了解目標(biāo)之后昼蛀,現(xiàn)在嘗試找出漏洞。某些目標(biāo)可能具有不止一種方式
如果您發(fā)現(xiàn)了一個(gè)漏洞圆存,請(qǐng)閱讀該漏洞叼旋。如果不進(jìn)行修改,許多漏洞將無法工作沦辙。因此夫植,了解漏洞并仔細(xì)閱讀漏洞利用。
? 在拿到命令殼(shell)時(shí)應(yīng)該升級(jí)為完全交互式TTY:https://blog.ropnop.com/upgrading-simple-shells-to-fully-interactive-ttys/
? 如何使用調(diào)試器plugin?mona.py:https://www.2cto.com/article/201211/169842.html
其他參考資料匯總
Enumeration
http://www.0daysecurity.com/penetration-testing/enumeration.html
https://nmap.org/nsedoc/
https://www.youtube.com/watch?v=Hk-21p2m8YY
Shell Exploitation
http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet
http://www.lanmaster53.com/2011/05/7-linux-shells-using-built-in-tools/
https://netsec.ws/?p=331
Utils scripts for various OSCP operations
Windows Privilege Escalation
Windows_Privilege_Escalation.md
Offensive PowerShell for red team
SecWiki/windows-kernel-exploits
elevating-privileges-to-administrative-and-further
win-priv-check.bat和windows-exploit-suggester.py
windows-privilege-escalation-methods-for-pentesters
dll-hijacking-vulnerable-applications
penetration-testing-102-windows-privilege-escalation-cheatsheet
https://www.youtube.com/watch?v=kMG8IsCohHA&feature=youtu.be
https://www.youtube.com/watch?v=PC_iMqiuIRQ
https://www.youtube.com/watch?v=vqfC4gU0SnY
Windows Privilege Escalation Fundamentals
Windows Privilege Escalation Techniques and Scripts
Linux Privilege Escalation
https://www.youtube.com/watch?v=dk2wsyFiosg
Linux Privilege Escalation Scripts
Basic Linux Privilege Escalation
A quick LKM rootkit that executes a reverse TCP netcat shell with root privileges
An example rootkit that gives a userland process root permissions
https://www.securitysift.com/download/linuxprivchecker.py
https://github.com/HappyTreeFriend/linux-exploit-suggester
Privilege escalation recon scripts
http://www.securitysift.com/download/linuxprivchecker.py
http://pentestmonkey.net/tools
工具
成熟工具:
Automated All-in-One OS command injection and exploitation tool
SleuthQL is a python3 script to identify parameters and values that contain SQL-like syntax
Some Tools && Cheat Sheet && Py && Payloads
OSCP常用cheatsheet(幾乎OSCP里面常用的命令在這里都可以找到)
Collection of things made during my OSCP journey
A tool for fuzzing for ports that allow outgoing connections
ROP Emporium proof of concept exploits
ROPPrimer v2 Proof of Concepts
MSDAT: Microsoft SQL Database Attacking Tool
此腳本基于Mike Czumak的腳本但它被大量重寫,有些東西已被添加为居,其他東西已被刪除碌宴。該腳本是作為OSCP考試的準(zhǔn)備而編寫的。它從來就不是一般的腳本蒙畴。因此贰镣,如果您想使用它,您必須確保修復(fù)所有硬編碼路徑膳凝。該腳本是多線程的碑隆,可以同時(shí)對(duì)多個(gè)主機(jī)運(yùn)行。參考書
metasploit-and-meterpreter cheat cheet
Progressively enumerate an IP address while you do other things
These are my notes for OSCP preparation. Hope you'll find them useful
1518_auto_setup.sh上煤、waf_x-forwarded-for_cmd.sh、9623_acs_cmd.sh著淆、39161_privesc.py
snmpwalk -c public -v1 IP oid#
gpp_decrypt.py劫狠、windowsprivchecker.ps1
vulnerability-assessment-tools
A collection of Windows, Linux and MySQL privilege escalation scripts and exploits
LinuxPrivCheck.sh拴疤、PortKnocker.sh、CronJobChecker.sh独泞、WinPrivCheck.bat遥赚、SQL Injection Cheatsheet
Converting Metasploit Module to Stand Alone