OSCP Notes
CtrlK
  • OSCP Cheatsheet
  • Sistema de ficheros del OS
  • Web Attacks
    • Web Enumeration
    • SQL Injection
    • CGI
    • CMS
  • DATABASES
    • MSSQL
    • MYSQL
  • Services Enumeration
    • Trucos Generales
    • POP3 - 110
    • SMB - (445-139)
    • DNS
    • NFS - 2049
    • SMTP - 25
    • TFTP - 69
    • SNMP - (161-162-10161-10162)
  • Privilege Escalation
    • Information Gathering - EscPriv
    • Windows Privilege Escalation
    • Linux Privilege Escalation
  • Password Attacks
    • Hash Identification
    • Brute Force
    • Pass in the Hash
    • Password Cracking
  • Port Redirection and Tunneling
    • Port Forwarding
    • SSH Tunneling
  • Active Directory Attacks
    • AD Enumeration
    • AD Authentication
    • AD Lateral Movement
    • AD Vulnerabilidades actuales
    • Powershell Empire
  • Buffer Overflow
    • Linux
    • Windows
  • Client-Side Attacks
    • Windows Office Macros
  • Post-explotacion
    • Trucos Generales
      • Links Utiles
    • Windows
  • CRTP
    • PowerView
    • Notas Generales
Con tecnología de GitBook
En esta página
  1. Post-explotacion
  2. Trucos Generales

Links Utiles

Windows Notes / Cheatsheetm0chan Blog - Info Sec, CTF & Hacking
LogoKerberoasting - Part 1My cool site
LogoPass the Ticket: PTHIT on the Couch
http://www.harmj0y.net/blog/powershell/kerberoasting-without-mimikatzwww.harmj0y.net
LogoKerberoasting Common Tools - Certcube Labs Cyber Security Research Blogs | AD EXploitation TrainingsCertcube labs Cyber Security Research Blogs
LogoKerberos (II): How to attack Kerberos?Tarlogic
LogoDeep Dive into Kerberoasting AttackHacking Articles
LogoGitHub - rewardone/OSCPRepo: A list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study material. Commands in 'Usefulcommands' Keepnote. Bookmarks and reading material in 'BookmarkList' CherryTree. Reconscan Py2 and Py3. Custom ISO building.GitHub
Logoinfosecsanyam.inoscpnotes.infosecsanyam.in
LogoWindows Firewall Post Exploitation with NetshHacking Articles
LogoActive Directory Spotlight: Trusts — Part 2. Operational GuidanceMedium
AnteriorTrucos GeneralesSiguienteWindows

Última actualización hace 3 años