Dragon
adminAdmin  2019-02-12 01:09 来源:lsh4ck's Blog 隐藏边栏 |   抢沙发  171 
文章评分 1 次,平均分 5.0

oscp 简介:

官方概述

Oscp exam guide-英文 - Offensive Security.pdf

Oscp 考试指南中文 - 进攻性安全

https://www.offensive-security.com/testimonials-and-reviews/

其他相关认证:

OSCP:https://www.offensive-security.com/information-security-certifications/oscp-offensive-security-certified-professional/
LPT:https://www.eccouncil.org/programs/licensed-penetration-tester-lpt-master/
eCPPT:https://www.elearnsecurity.com/certification/ecppt/
CEH:https://cert.eccouncil.org/certified-ethical-hacker.html

大佬经历篇
OSCP 认证教程第一集:注册教程

OSCP 认证-01 踏上征程(同上)

0xPINGPenetration Testing with Kali (PWK) 课程和 Offensive Security Certified Professional (OSCP) 考试回顾

f4l13n5n0w[经验分享] OSCP 渗透测试认证

先知某牛的经验

abatchyHow to prepare for PWK/OSCP, a noob-friendly guide

Jan Wikholm 的博客全记录视频全记录

上一条视频大神 Jan Wikholm 在git 上的 oscp 专辑

OJ'S PERSPECTIVEoscp-and-me

The Primal Security TeamCourse Review: Penetration Testing with Kali Linux (OSCP)

Julien AhrensOSCP Course and Exam Review

Mike CzumakOffensive Security’s PWB and OSCP — My Experience

leonjzatrying harder oscp and me

Adam BrownMy OSCP Experience

Paranoid Ninja31 days of OSCP Experience

occultsecThe OSCP: A Process Focused Review

考试交流论坛

jpsecnetworks全程学习笔记记录

tulpa-securityPREP GUIDE FOR OFFSEC’S PWK,并附有指导用书 tulpa-pwk-prep-guide1

Jason BernierTry Harder! My Penetration Testing with Kali Linux OSCP Review and course/lab experience

securitychopsOSCE 经验

LEWIS SECURITYOSCP 历程

综合学习资源:

https://www.cybrary.it/course/advanced-penetration-testing/(免费在线课程)

https://github.com/CyDefUnicorn/OSCP-Archives(非常好的资源整理)

Kali 学习笔记-中文这里也可以

老外某牛一个很全的渗透测试 wiki

https://github.com/rewardone/OSCPRepo(A list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study material. Commands in 'Usefulcommands' Keepnote. Bookmarks and reading material in 'BookmarkList' Keepnote. Reconscan in scripts folder.)

https://github.com/burntmybagel/OSCP-Prep(Kristina 大神整合的 OSCP-PWK-Prep-Resources,还有他的博客里2 部分内容中的干货,比较全)

https://github.com/fatwookie/oscp(OSCP certification notes and tools,比较新)

https://github.com/StevenDias33/Offensive-Security-Certified-Professional(综合资料,啥都有)

https://github.com/gh0x0st/Buffer_Overflow(使用 Python 的缓冲区溢出的 OSCP 准备指南)

https://github.com/ferreirasc/oscp(Notes of my Offensive Security Certified Professional (OSCP) study plan)

https://github.com/RustyShackleford221/OSCP-Prep(比较全的过程指南,有脚本、报告、方法论等)

Windows Privilege Escalation Methods for Pentesters(Windows 下比较全的提权方法)

https://www.offensive-security.com/metasploit-unleashed/(Metasploit Unleashed – Free Ethical Hacking Course)

https://sqlwiki.netspi.com/(SQL Injection Wiki)

https://github.com/dostoevskylabs/dostoevsky-pentest-notes(Notes for taking the OSCP in 2097,相关参考书)

https://github.com/security-prince/PWK-OSCP-Preparation-Roadmap(My roadmap for preparing for OSCP)

ncat 的使用详细手册

https://vincentyiu.co.uk/red-team

一个站搞定注入

total-oscp-guide

pWnOS 2.0 靶机玩法

Writing Shellcode to a File

oscp-useful-links

Fuzz FTP Commands

Fuzz Username / Password

LINUX PRIVILEGE ESCALATION 指南

Understanding Nmap Packet Trace(抓包了解 nmap)

https://www.hackingarticles.in/web-penetration-testing/(web 渗透的各种资料)

https://0xdf.gitlab.io/(挺牛的 hackthebox 玩家)

端口的滲透測試總結

hackthebox-youtube-ippsec

OSCP 中所利用到的工具:

脚本类:

https://github.com/utherp0/oscp_scripts(Utils scripts for various OSCP operations)

https://github.com/frizb/Windows-Privilege-Escalation(Windows Privilege Escalation Techniques and Scripts)

https://github.com/mzet-/linux-exploit-suggester

https://github.com/lucyoa/kernel-exploits

关于 msf 提权的视频

提权视频 1

提权视频 2

https://www.securitysift.com/download/linuxprivchecker.py

Windows Privilege Escalation

https://blog.cobaltstrike.com/2014/03/20/user-account-control-what-penetration-testers-should-know/
https://github.com/foxglovesec/RottenPotato
https://github.com/GDSSecurity/Windows-Exploit-Suggester/blob/master/windows-exploit-suggester.py
https://github.com/pentestmonkey/windows-privesc-check

https://github.com/pentestmonkey/unix-privesc-check

Offensive PowerShell for red team
https://github.com/PowerShellMafia/PowerSploit
https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/ATT%26CK-Stuff/Windows/Windows_Privilege_Escalation.md
https://github.com/SecWiki/windows-kernel-exploits
https://hackmag.com/security/elevating-privileges-to-administrative-and-further/
https://pentest.blog/windows-privilege-escalation-methods-for-pentesters/
https://toshellandback.com/2015/11/24/ms-priv-esc/
https://www.gracefulsecurity.com/privesc-unquoted-service-path/
https://www.commonexploits.com/unquoted-service-paths/
https://www.exploit-db.com/dll-hijacking-vulnerable-applications/
https://www.youtube.com/watch?v=kMG8IsCohHA&feature=youtu.be
https://www.youtube.com/watch?v=PC_iMqiuIRQ
https://www.youtube.com/watch?v=vqfC4gU0SnY
https://www.exumbraops.com/penetration-testing-102-windows-privilege-escalation-cheatsheet/X
https://www.fuzzysecurity.com/tutorials/16.html
http://www.labofapenetrationtester.com/2015/09/bypassing-uac-with-powershell.html

https://github.com/ihack4falafel/OSCP(Collection of things made during my OSCP journey)

https://github.com/quentinhardy/msdat(MSDAT: Microsoft SQL Database Attacking Tool)

https://github.com/xapax/oscp(此脚本基于Mike Czumak的脚本。但它被大量重写,有些东西已被添加,其他东西已被删除。该脚本是作为 OSCP 考试的准备而编写的。它从来就不是一般的脚本。因此,如果您想使用它,您必须确保修复所有硬编码路径。该脚本是多线程的,可以同时对多个主机运行。参考书)

https://github.com/adon90/pentest_compilation(Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios)

https://github.com/gajos112/OSCP(一些小手记)

http://pentestmonkey.net/cheat-sheet(认可度最高的 cheat sheet)

https://github.com/xMilkPowderx/OSCP(少量一些 cheat sheet)

metasploit-and-meterpreter cheat cheet

SQL Injection Cheat Sheet

https://github.com/mantvydasb/Offensive-Security-OSCP-Cheatsheets(仍然一些 cheat sheet)

https://github.com/slyth11907/Cheatsheets(各种 Cheatsheets)

https://highon.coffee/blog/penetration-testing-tools-cheat-sheet/(各种 Cheat Sheet)

https://github.com/OlivierLaflamme/Cheatsheet-God(又一个很好的 cheat sheet)

https://github.com/rejoinder/ScanTron(Progressively enumerate an IP address while you do other things)

https://github.com/rejoinder/OSCP(win-priv-check.bat 和 windows-exploit-suggester.py)

https://github.com/my4andle/oveflow_toolkit(A collection of tools to help research buffer overflow exploitation for the Offensive Security OSCP certification)

https://github.com/Chr1st0f/pwk(Reverse_shell 和 port_scanner.py)

https://github.com/tjnull/OSCP-Stuff(一些 smtp 上 110 端口的脚本)

https://github.com/punk-AJ/oscpnotes(These are my notes for OSCP preparation. Hope you'll find them useful.)

https://github.com/dplastico/oscp-study(一些零散脚本,linux 和 win 都有)

https://github.com/CaptBoykin/oscp(1518_auto_setup.sh、waf_x-forwarded-for_cmd.sh、9623_acs_cmd.sh、39161_privesc.py)

https://github.com/MrSquakie/OSCP-Resources/blob/master/useful%20oids(snmpwalk -c public -v1 IP oid#)

https://github.com/0xc0ffeeadd1c7/oscp-tools(gpp_decrypt.py、windowsprivchecker.ps1)

vulnerability-assessment-tools

https://github.com/dostoevskylabs/BufferOverflows(一些溢出小脚本)

https://github.com/1N3/PrivEsc(A collection of Windows, Linux and MySQL privilege escalation scripts and exploits)

https://github.com/ihack4falafel/OSCP(LinuxPrivCheck.sh、PortKnocker.sh、CronJobChecker.sh、WinPrivCheck.bat、SQL Injection Cheatsheet)

Linux Privilege Escalation Scripts

简单的缓冲区溢出

Converting Metasploit Module to Stand Alone

Spawning a TTY Shell

Creating Metasploit Payloads

NETCAT 使用

Basic Linux Privilege Escalation

Port Redirection with Rinetd

Dynamic Port Forwarding (SSH)

Remote Port Forwarding (SSH)

Local Port Forwarding (SSH)

Port Forwarding with Metasploit

成熟的好工具:

https://github.com/commixproject/commix(Automated All-in-One OS command injection and exploitation tool)

快速的侦察扫描和 pentest 模板创建器

SleuthQL is a python3 script to identify parameters and values that contain SQL-like syntax(Python3 Burp History parsing tool to discover potential SQL injection points. To be used in tandem with SQLmap)

Reconnoitre(为 OSCP 实验室制作的侦察工具,用于自动化信息收集和服务枚举,同时创建目录结构以存储用于每个主机的结果,发现和利用,推荐的执行命令和用于存储战利品和标志的目录结构)

Vanquish(Vanquish 是一个基于 Kali Linux 的 Enumeration Orchestrator,用 Python 构建。Vanquish 利用 Kali 上的开源枚举工具执行多个活动信息收集阶段。每个阶段的结果都会被输入下一阶段,以识别可以用于远程 shell 的漏洞。)

VHostScan(顾名思义,A virtual host scanner that can be used with pivot tools, detect catch-all scenarios, aliases and dynamic default pages)

报告相关:

https://github.com/juliocesarfort/public-pentesting-reports(由多家咨询公司和学术安全组织发布的公共渗透测试报告的精选清单)

官方报告

在线实验室推荐:

https://pentesterlab.com

https://www.abatchy.com/2017/02/oscp-like-vulnhub-vms

https://www.vulnhub.com

https://lab.pentestit.ru

https://www.root-me.org

https://www.virtualhackinglabs.com/

https://attackdefense.com

  

本文为原创文章,版权归所有,欢迎分享本文,转载请保留出处!

admin
Admin 关注:0    粉丝:0 最后编辑于:2019-02-21
这个人很懒,什么都没写
×

感谢您对admin的支持,么么哒~

支付宝打赏 admin
请扫码随意打赏

打开支付宝扫一扫,即可进行扫码打赏哦

lsh4ck's Blog - Hacking is endless! Focus on network security!

发表评论

表情 贴图 链接 私密 格式 签到

切换注册

登录

忘记密码 ?

切换登录

注册

验证码

扫一扫二维码分享