This is my offensive security blog/repo that’s very much a work in progress meant for students and beginners. Write-ups are nothing new however, I’m aiming to reinforce what I have learned by trying to explain it to others. I will mainly look to grasp on to fundamentals and industry tricks rather than show off fancy techniques. As this blog/repo matures it will look diffrent from when it first started.
I have based my lab documentation on a generalised intrusion kill-chain:
Reconnaissance > Weaponization > Delivery > Exploitation > Installation > Command & Control > Actions on Objective
Activity | Difficulty | Description | Date Completed |
---|---|---|---|
Anthem | Easy | Exploit a Windows machine in this beginner level challenge. | 25 MAR 2022 |
Blueprint | Easy | Hack into this Windows machine and escalate your privileges to Administrator. | 16 MAR 2022 |
Blue | Easy | Deploy & hack into a Windows machine, leveraging common misconfigurations issues. | 18 MAR 2022 |
Bookstore | Medium | A Beginner level box with basic web enumeration and REST API Fuzzing. | 07 JUN 2022 |
Bounty Hacker | Easy | You talked a big game about being the most elite hacker in the solar system. Prove it and claim your right to the status of Elite Bounty Hacker! | In progress |
Dogcat | Medium | I made a website where you can look at pictures of dogs and/or cats! Exploit a PHP application via LFI and break out of a docker container. | 23 AUG 2022 |
Internal | Hard | Penetration Testing Challenge | In progress... |
Investigating Windows | Easy | A windows machine has been hacked, its your job to go investigate this windows machine and find clues to what the hacker might have done. | 26 AUG 2022 |
Kenobi | Easy | Walkthrough on exploiting a Linux machine. Enumerate Samba for shares, manipulate a vulnerable version of proftpd and escalate your privileges with path variable manipulation. | 03 AUG 2022 |
OhSINT | Easy | Are you able to use open source intelligence to solve this challenge? | 16 JUN 2022 |
Overpass | Easy | What happens when some broke CompSci students make a password manager? | In progress... |
PickleRick | Easy | A Rick and Morty CTF. Help turn Rick back into a human! | 01 NOV 2021 |
Retro | Hard | New high score! | 02 DEC 2022 |
RootMe | Easy | A ctf for beginners, can you root me? | 14 JUN 2022 |
Searchlight | Easy | OSINT challenges in the imagery intelligence category | 30 JUN 2022 |
SimpleCTF | Easy | Beginner level ctf | 28 JUN 2022 |
Vulnversity | Easy | Learn about active recon, web app attacks and privilege escalation. | 28 APR 2022 |
Windows Fundamentals 1 | Info | In part 1 of the Windows Fundamentals module, we'll start our journey learning about the Windows desktop, the NTFS file system, UAC, the Control Panel, and more.. | 26 OCT 2022 |
Windows Fundamentals 2 | Info | In part 2 of the Windows Fundamentals module, discover more about System Configuration, UAC Settings, Resource Monitoring, the Windows Registry and more.. | 27 OCT 2022 |
Wonderland | Medium | Fall down the rabbit hole and enter wonderland. | 05 AUG 2022 |
This learning path covers the core technical skills that will allow you to succeed as a junior penetration tester. Upon completing this path, you will have the practical skills necessary to perform security assessments against web applications and enterprise infrastructure.
Module | Activity | Description | Completed |
---|---|---|---|
Introduction to Web Hacking | - | Get hands-on, learn about and exploit some of the most popular web application vulnerabilities seen in the industry today. | Yes |
Introduction to Web Hacking | Walking an Application | Manually review a web application for security issues using only your browsers developer tools. Hacking with just your browser, no tools or scripts. | Yes |
Introduction to Web Hacking | Content Discovery | Learn the various ways of discovering hidden or private content on a webserver that could lead to new vulnerabilities. | Yes |
Introduction to Web Hacking | Subdomain Enumeration | Learn the various ways of discovering subdomains to expand your attack surface of a target. | Yes |
Introduction to Web Hacking | Authentication Bypass | Learn how to defeat logins and other authentication mechanisms to allow you access to unpermitted areas. | Yes |
Introduction to Web Hacking | IDOR | Learn how to find and exploit IDOR vulnerabilities in a web application giving you access to data that you shouldn't have. | Yes |
Introduction to Web Hacking | File Inclusion | This room introduces file inclusion vulnerabilities, including Local File Inclusion (LFI), Remote File Inclusion (RFI), and directory traversal. | Yes |
Introduction to Web Hacking | SSRF | Learn how to exploit Server-Side Request Forgery (SSRF) vulnerabilities, allowing you to access internal server resources. | Yes |
Introduction to Web Hacking | Cross-site Scripting | Learn how to detect and exploit XSS vulnerabilities, giving you control of other visitor's browsers. | Yes |
Introduction to Web Hacking | Command Injection | Learn about a vulnerability allowing you to execute commands through a vulnerable app, and its remediations. | Yes |
Introduction to Web Hacking | SQL Injection | Learn how to detect and exploit SQL Injection vulnerabilities | Yes |
Network Security | - | Learn the basics of passive and active network reconnaissance. Understand how common protocols work and their attack vectors. | Yes |
Network Security | Passive Reconnaissance | Learn about the essential tools for passive reconnaissance, such as whois, nslookup, and dig. | Yes |
Network Security | Active Reconnaissance | Learn how to use simple tools such as traceroute, ping, telnet, and a web browser to gather information. | Yes |
Network Security | Nmap Live Host Discovery | Learn how to use Nmap to discover live hosts using ARP scan, ICMP scan, and TCP/UDP ping scan. | Yes |
Network Security | Nmap Basic Port Scans | Learn in-depth how nmap TCP connect scan, TCP SYN port scan, and UDP port scan work. | Yes |
Network Security | Nmap Advanced Port Scans | Learn advanced techniques such as null, FIN, Xmas, and idle (zombie) scans, spoofing, in addition to FW and IDS evasion. | Yes |
Network Security | Nmap Post Port Scans | Learn how to leverage Nmap for service and OS detection, use Nmap Scripting Engine (NSE), and save the results. | Yes |
Network Security | Protocols and Servers | Learn about common protocols such as HTTP, FTP, POP3, SMTP and IMAP, along with related insecurities. | Yes |
Network Security | Protocols and Servers 2 | Learn about attacks against passwords and cleartext traffic; explore options for mitigation via SSH and SSL/TLS. | Yes |
Network Security | Net Sec Challenge | Practice the skills you have learned in the Network Security module. | Yes |
The aim of this pathway is to show you how to emulate a potential adversary attack in complex environments. Going beyond penetration testing, you will learn to conduct successful Red Team engagements and challenge the defence capability of your clients.
Module | Activity | Description | Completed |
---|---|---|---|
Red Team Fundamentals | - | Learn the core components of a red team engagement, from threat intelligence to OPSEC and C2s. | Yes |
Red Team Fundamentals | Red Team Fundamentals | Learn about the basics of a red engagement, the main components and stakeholders involved, and how red teaming differs from other cyber security engagements. | Yes |
Red Team Fundamentals | Red Team Engagments | Learn the steps and procedures of a red team engagement, including planning, frameworks, and documentation. | Yes |
Red Team Fundamentals | Red Team Threat Intel | Apply threat intelligence to red team engagements and adversary emulation. | Yes |
Red Team Fundamentals | Red Team OPSEC | Learn how to apply Operations Security (OPSEC) process for Red Teams. | Yes |
Red Team Fundamentals | Intro to C2 | Learn the essentials of Command and Control to help you become a better Red Teamer and simplify your next Red Team assessment! | Yes |
Initial Access | - | Explore the different techniques to gain initial access to a target system and network from a Red Teamer’s perspective. | Yes |
Initial Access | Red Team Recon | Learn how to use DNS, advanced searching, Recon-ng, and Maltego to collect information about your target. | Yes |
Initial Access | Weaponization | Understand and explore common red teaming weaponization techniques. You will learn to build custom payloads using common methods seen in the industry to get initial access. | Yes |
Initial Access | Password Attacks | This room introduces the fundamental techniques to perform a successful password attack against various services and scenarios. | Yes |
Initial Access | Phishing | Learn what phishing is and why it's important to a red team engagement. You will set up phishing infrastructure, write a convincing phishing email and try to trick your target into opening your email in a real-world simulation. | Yes |
Post Compromise | - | Learn about the steps taken by an attacker right after gaining an initial foothold on a network. | Yes |
Post Compromise | The Lay of the Land | Learn about and get hands-on with common technologies and security products used in corporate environments; both host and network-based security solutions are covered. | Yes |
Post Compromise | Enumeration | This room is an introduction to enumeration when approaching an unknown corporate environment. | Yes |
Post Compromise | Windows Privilege Escallation | Learn the fundamentals of Windows privilege escalation techniques. | Yes |
Post Compromise | Windows Local Persistence | Learn the most common persistence techniques used on Windows machines. | In Progress |
Sysinternals - Learn to use the Sysinternals tools to analyze Window systems or applications. Core Windows Processes - Explore the core processes within a Windows operating system and understand what is normal behavior. This foundational knowledge will help you identify malicious processes running on an endpoint! Windows Event Logs - Introduction to Windows Event Logs and the tools to query them.
The developers of site request that writeups for Challenges and Investigations only be posted after content has been retired and is no longer worth points.
Challenge | Category | Difficulty | Completed |
---|---|---|---|
PowerShell Analysis - Keylogger | Reverse Engineering | Easy | 09 MAR 2022 |
ThePackage | OSINT | Easy | In progress... |
Investigation | Category | Difficulty | Completed |
---|---|---|---|
N/A | N/A | N/A | x |
Challenges | ||||
---|---|---|---|---|
Basic | Reaslistic | Application | Programming | Phonephreaking |
Javascript | Forensic | Extbasic | Stego | IRC |