NEKO IN THE SHELL # _

Some OSCP Resources

Getting ready for the OSCP… Again… Linking some resources here.


Good OSCP guidance: https://johnjhacking.com/blog/oscp-reborn-2023

This, in turn links to several other good resources.

NMAPAutomator: https://github.com/21y4d/nmapAutomator/

GTFO and LOL bins:

Reverse Shell generator (you shouldn’t need this, but it can be a good reference for those pesky one-liners): https://www.revshells.com/

Playing with Active Directory: https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Active%20Directory%20Attack.md

PrivEsc classes:


Advice:

  • always try default credentials.
  • with web servers, virtual hosts are a pain in the ass, always check if the response you get from getting the IP is different from getting the hostname.
  • note / != /index.html != /index.php
  • always have a statically compiled busybox binary: https://busybox.net
  • always have a windows vm ready in case you need to compile or test anything.
  • always check both tcp and udp.
  • searchsploit for parts of an app name, they often have multiple names in the database.
  • dirbust subdirectories, you never know what you’ll find.
  • check AppData in post exploitation.
  • with hashes, when you can’t crack it, pass it.
  • write your own exploits. 100% reference other people’s code, but write it yourself so you understand it.

SQL Injection cheat sheets:


Hack The Box Active Directory Practice Machines:

  • Active
  • Forest
  • Sauna
  • Monteverde
  • Timelapse
  • Flight
  • Return
  • Blackfield
  • Cicada
  • Escape

Windows Registry cheat sheet: https://github.com/d3fenderz/windows_reg

Query autologin creds with:

reg query "HKLM\SOFTWARE\Microsoft\Windows NT\CurrentVersion\winlogon"

Kernel exploits: