OSEP
Lista de máquinas HTB (Hack the Box) para o OSEP (PEN-300)
Client Side Code Execution With Office
- Attack TypeHTB MachineAttack Used in HTBLink
Phishing with Microsoft Office: RTF Document
REEL
malicious RTF Document (CVE-2017-0199)
Phishing with Microsoft Office: LibreOffice
RE
LibreOffice Macro
Walkthrough : https://youtube.com/watch?v=ob9SgtFm6_g&t=794 Tool: <>
Phishing/Macro
REEL2
Grab NTLMv2 with Malicious link
Walkthrough : https://youtube.com/watch?v=Ro2vXt_WFDQ&t=2350 Tool: <>
Phishing with Microsoft Office: LibreOffice
RABBIT
LibreOffice Macro
Walkthrough : https://youtube.com/watch?v=5nnJq_IWJog&t=1935 Tool: <>
Application Whitelisting
- Attack TypeHTB MachineAttack Used in HTBLink
Applocker Bypass
REEL2
Breaking out of ConstrainedLanguage Mode by creating a function
Walkthrough : https://youtube.com/watch?v=Ro2vXt_WFDQ&t=3600
Applocker Bypass
GIDDY
Escaping powershell constrained mode with PSBypassCLM
Walkthrough : https://youtube.com/watch?v=Ro2vXt_WFDQ&t=3600
Applocker Bypass
SEKHMET
intended way of bypassing applocker
Walkthrough : https://youtube.com/watch?v=vsgPsMZx59w&t=6300
Applocker Bypass
-
AppLocker Bypass COR Profiler
Walkthrough : https://youtube.com/watch?v=Ro2vXt_WFDQ&t=3600
Windows Credentials
- Attack TypeHTB MachineAttack Used in HTBLink
Local Windows Credentials: LSASS Dump
ATOM
Using rundll32 to create a memory dump of LSASS
Walkthrough : https://youtube.com/watch?v=1OC2eRVX0ic&t=1830
Local Windows Credentials: LSASS Dump
BLACKFIELD
running pypykatz to extract credentials
Walkthrough : https://youtube.com/watch?v=1OC2eRVX0ic&t=1830
Local Windows Credentials: SAM Dump
BASTION
Extracting local passwords from SAM and SYSTEM with secretsdump
Walkthrough : https://youtube.com/watch?v=2j3FNp5pjQ4&t=660
Local Windows Credentials: LAPS
STREAMIO
Identifying and Extracting the LAPS Password
Walkthrough : https://youtube.com/watch?v=B9nozi1PrhY&t=11697
Local Windows Credentials: LAPS
PivotAPI
Discovering a user who can add groups to LAPS
Walkthrough : https://youtube.com/watch?v=FbTxPz_GA4o&t=5990
Access Tokens: SeImpersonate
SCRAMBLED
Abusing SeImpersonate Privilege
Walkthrough : https://youtube.com/watch?v=2j3FNp5pjQ4&t=660
Access Tokens: Incognito
HACKBACK
Using incognito to grab our impersonation token for HACKER user
Walkthrough : https://youtube.com/watch?v=B9nozi1PrhY&t=11697
Linux Lateral Movement
- Attack TypeHTB MachineAttack Used in HTBLink
DevOps
INJECT
Ansible enumeration and privilege escalation
Walkthrough: https://www.youtube.com/watch?v=3VuIaUvHsTI&t=1320s
Kerberos on Linux
TENTACLE
Configuring our attacker’s box kerberos to connect to Tentacle’s KDC, and steal keytab
Walkthrough : https://youtube.com/watch?v=kKhuUXPmJ_o&t=3870
Kerberos on Linux
CERBERUS
examine the SSSD configuration and get a domain password
Walkthrough : https://www.youtube.com/watch?v=IX4h5aaSK1g&t=2160s
Kerberos on Linux
SEKHMET
Dumping the sssd.ldb, Using kinit to get a kerberos ticket
Walkthrough : https://youtube.com/watch?v=kKhuUXPmJ_o&t=3870
Microsoft SQL Server
- Attack TypeHTB MachineAttack Used in HTBLink
MS SQL in AD
ESCAPE
Using mssqlclient to login to access MSSQL
Walkthrough: https://youtube.com/watch?v=PS2duvVcjws&t=390
MS SQL Escalation
SCRAMBLED
enabling xp_cmdshell and getting a reverse shell
Walkthrough: https://youtube.com/watch?v=_8FE3JZIPfo&t=1000
MS SQL Escalation
STREAMIO
Using xp_dirtree to make the MSSQL database connect back to us and steal the hash
Walkthrough: https://youtube.com/watch?v=_8FE3JZIPfo&t=1000
Active Diretory Exploitation
- Attack TypeHTB MachineAttack Used in HTBLink
AD Object permission theory
REEL
Explaining Active Directory (AD) Security Objects (GenericWrite, WriteOwner,etc)
walkthrough: https://youtube.com/watch?v=ob9SgtFm6_g&t=3205
Abusing GenericAll
SUPPORT
Abusing GenericAll object permission
walkthrough: https://youtube.com/watch?v=iIveZ-raTTQ&t=970
Abusing GenericAll, WriteDACL
MULTIMASTER
Abusing GenericAll, WriteDACL
Walkthrough: https://youtube.com/watch?v=iwR746pfTEc&t=7410
Abusing GenericWrite, WriteDACL
REEL
Taking ownership and changing other user’s password
Walkthrough: https://youtube.com/watch?v=ob9SgtFm6_g&t=3503
Kerberos Delegation
PivotAPI
Unconstrained delegation with the SQL User. Upload rubeus, use tgtdeleg
Walkthrough: https://youtube.com/watch?v=FbTxPz_GA4o&t=7215
Kerberos Delegation
INTELLIGENCE
Unconstrained delegation
Kerberos Delegation
SUPPORT
RBCD
Last updated