├── CODE-OF-CONDUCT.md ├── README.md ├── images ├── daena-key-purplestorm.png ├── daena-key-purplestorm2.png ├── dominik-mayer-purplestorm.png ├── htb-purplestorm.png ├── htb_logo.png ├── thm_logo.png └── vulnlab_logo.png └── scripts └── rdp /CODE-OF-CONDUCT.md: -------------------------------------------------------------------------------- 1 | 2 | # Contributor Covenant Code of Conduct 3 | 4 | ## Our Pledge 5 | 6 | In the interest of fostering an open and welcoming environment, we as 7 | contributors and maintainers pledge to make participation in our project and 8 | our community a harassment-free experience for everyone, regardless of age, body 9 | size, disability, ethnicity, sex characteristics, gender identity and expression, 10 | level of experience, education, socio-economic status, nationality, personal 11 | appearance, race, religion, or sexual identity and orientation. 12 | 13 | ## Our Standards 14 | 15 | Examples of behavior that contributes to creating a positive environment 16 | include: 17 | 18 | * Using welcoming and inclusive language 19 | * Being respectful of differing viewpoints and experiences 20 | * Gracefully accepting constructive criticism 21 | * Focusing on what is best for the community 22 | * Showing empathy towards other community members 23 | 24 | Examples of unacceptable behavior by participants include: 25 | 26 | * The use of sexualized language or imagery and unwelcome sexual attention or 27 | advances 28 | * Trolling, insulting/derogatory comments, and personal or political attacks 29 | * Public or private harassment 30 | * Publishing others' private information, such as a physical or electronic 31 | address, without explicit permission 32 | * Other conduct which could reasonably be considered inappropriate in a 33 | professional setting 34 | 35 | ## Our Responsibilities 36 | 37 | Project maintainers are responsible for clarifying the standards of acceptable 38 | behavior and are expected to take appropriate and fair corrective action in 39 | response to any instances of unacceptable behavior. 40 | 41 | Project maintainers have the right and responsibility to remove, edit, or 42 | reject comments, commits, code, wiki edits, issues, and other contributions 43 | that are not aligned to this Code of Conduct, or to ban temporarily or 44 | permanently any contributor for other behaviors that they deem inappropriate, 45 | threatening, offensive, or harmful. 46 | 47 | ## Scope 48 | 49 | This Code of Conduct applies within all project spaces, and it also applies when 50 | an individual is representing the project or its community in public spaces. 51 | Examples of representing a project or community include using an official 52 | project e-mail address, posting via an official social media account, or acting 53 | as an appointed representative at an online or offline event. Representation of 54 | a project may be further defined and clarified by project maintainers. 55 | 56 | ## Enforcement 57 | 58 | Instances of abusive, harassing, or otherwise unacceptable behavior may be 59 | reported by contacting the project team at syr0@protonmail.com. All 60 | complaints will be reviewed and investigated and will result in a response that 61 | is deemed necessary and appropriate to the circumstances. The project team is 62 | obligated to maintain confidentiality with regard to the reporter of an incident. 63 | Further details of specific enforcement policies may be posted separately. 64 | 65 | Project maintainers who do not follow or enforce the Code of Conduct in good 66 | faith may face temporary or permanent repercussions as determined by other 67 | members of the project's leadership. 68 | 69 | ## Attribution 70 | 71 | This Code of Conduct is adapted from the [Contributor Covenant][homepage], version 1.4, 72 | available at https://www.contributor-covenant.org/version/1/4/code-of-conduct.html 73 | 74 | [homepage]: https://www.contributor-covenant.org 75 | 76 | For answers to common questions about this code of conduct, see 77 | https://www.contributor-covenant.org/faq 78 | -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- 1 |

2 | 3 |

4 | 5 | # CTF-Notes 6 | 7 | ### From Zero To Hero 8 | 9 | #### About this repository 10 | 11 | This repository will contain various notes, code snippets, hints and different sources related to all kinds of cybersecurity topics, dropped by our team members. 12 | 13 | ### Table of Contents 14 | 15 | - [Where to start](#where-to-start) 16 | - [Basic Knowledge](#basic-knowledge) 17 | - [First Steps](#first-steps) 18 | - [Checklist](#checklist) 19 | - [Tool Recommendations](#tool-recommendations) 20 | - [Trainings](#trainings) 21 | - [Hacking Resources & Tutorials](#hacking-resources--tutorials) 22 | - [Purplestorm Wallpapers](#purplestorm-wallpapers) 23 | 24 | ### Where to Start 25 | 26 | #### Basic Knowledge 27 | 28 | - It is recommended to work in a virtual environment like an `Kali Linux` instance running on `VirtualBox` or `VMware Player`. 29 | - Make sure you downloaded the correct `.ovpn` file to connect to the network and access your box. 30 | 31 | ```console 32 | $ sudo openvpn /PATH/TO/OVPNFILE/.ovpn 33 | ``` 34 | 35 | - Wordlists are usually located in `/usr/share/wordlists/`. The mostly used ones are: 36 | - rockyou.txt (sudo gunzip /usr/share/wordlists/rockyou.txt.gz) 37 | - /usr/share/wordlists/seclists (https://github.com/danielmiessler/SecLists) 38 | - If you are missing some tools, try to install them from the `Kali Linux repository`. 39 | 40 | ```console 41 | $ sudo apt-get install kali-linux-everything 42 | ``` 43 | 44 | - If a website is not reachable via `IP address` and redirects you, try to add it to the `/etc/hosts` file. 45 | - Always familiarize yourself with the tools you use and checkout their documentation as well as the parameter `-h`. 46 | - Don't run exploits from the internet without understanding what they are doing. 47 | 48 | #### First Steps 49 | 50 | There are some basic things you should be aware about when you approaching a new box. 51 | 52 | - Make sure to take proper `notes`. Probably you want to concider to write them in `Markdown` and `Obsidian` for example. Here are a few alternatives: 53 | - [cherrytree](https://github.com/giuspen/cherrytree) 54 | - [Sublime Text](https://www.sublimetext.com) 55 | - [Notion](https://www.notion.com) 56 | - [Capacities](https://capacities.io) 57 | - Always keep some sort of `reconnaissance` running in the background like `directory busting` with `Gobuster`, which can take some time. 58 | - Make sure to `enumerate` every service and every endpoint properly. On a website for example, check for `usernames`, `email address schemes`, check the `source` of the website `click` or `hover over` every `link` you can find to see if they lead to something. 59 | - Check for already known `vulnerabilities` and `exploits`. Therefore you can just use `Google`. Here are a few examples: 60 | - ` vulnerability` 61 | - ` vulnerability` 62 | - ` exploit` 63 | - ` poc` 64 | - ` github` 65 | - ` github poc` 66 | Alternatively check [Exploit Database](https://www.exploit-db.com), [Sploitus](https://sploitus.com) or use `searchsploit` from the command line. 67 | 68 | ```console 69 | $ searchsploit 70 | ``` 71 | 72 | - Try `default credentials` (https://github.com/ihebski/DefaultCreds-cheat-sheet) or `admin:admin`. Especially on `web applications`. 73 | - If you find credentials or just a password, always go for `credential reuse` and try if they work for another user as well. 74 | 75 | #### Checklist 76 | 77 | Depending on what a box offers to you, you can go through the following checklist. 78 | 79 | 1. Run nmap! 80 | 81 | ```console 82 | $ sudo nmap -sC -sV -p- 83 | $ sudo nmap -sC -sV -Pn -p- 84 | $ sudo nmap -sV -sU 85 | ``` 86 | 87 | 2. If a webserver is available, check `robots.txt`. 88 | 89 | > http://RHOST/robots.txt 90 | 91 | 3. Also, give `whatweb` a try. 92 | 93 | ```console 94 | $ whatweb http:// 95 | ``` 96 | 97 | 4. Ob websites, try `directory busting` with different wordlists. 98 | 99 | ```console 100 | $ gobuster dir -w /usr/share/wordlists/seclists/Discovery/Web-Content/big.txt 101 | ``` 102 | 103 | 5. Checking for `subdomains`. If a box offers you a `vhost` entry like `http://openadmin.htb/` for example, it is always worth it to see if there are more `vhosts` configured. 104 | 105 | ```console 106 | $ gobuster vhost -u -t 50 -w /usr/share/wordlists/seclists/Discovery/DNS/subdomains-top1million-110000.txt 107 | $ gobuster vhost -u -t 50 -w /usr/share/wordlists/seclists/Discovery/DNS/subdomains-top1million-110000.txt --append-domain 108 | ``` 109 | 110 | ```console 111 | $ ffuf -w /usr/share/wordlists/seclists/Discovery/DNS/subdomains-top1million-110000.txt -H "Host: FUZZ.openadmin.htb" -u http://openadmin.htb --mc all --fs 112 | ``` 113 | 114 | 6. Intercept `web requests` with `Burp Suite`. Without getting to deep into the usage of `Burp Suite`, here are the steps to configure it in your browser. 115 | - Start `Burp Suite` and open your browser on `http://burp`. 116 | - Then download the `CA Certificate`. 117 | - Depending on your browser, switch to `settings` and then to `certificates`. 118 | - Import the `certificate`. 119 | - We recommend to use [FoxyProxy](https://addons.mozilla.org/en-US/firefox/addon/foxyproxy-standard) and configure it there but you can also go with the `proxy settings` of your browser. 120 | 121 | | Setting | Value | 122 | | --- | --- | 123 | | Proxy Type | HTTP | 124 | | Proxy IP address or DNS name | 127.0.0.1 | 125 | | Port | 8080 | 126 | 127 | - In `Burp Suite` switch to `Target` > `Proxy settings` and select `Use advanced scope control`. 128 | - Add the `IP address` of the box you are approaching. 129 | - Switch to the `Proxy` tab, move to `Intercept` and click on `Intercept is off` to enable it. 130 | - At last switch the proxy in `FoxyProxy` to the `Burp Suite configuration` and access the website. Now you can intercept the web traffic coming from and going to the box and modify as you want. 131 | 132 | #### Tool Recommendations 133 | 134 | Below you find just a few tools to start with. Of course this is not a complete list and there are always better tools for the job out there. Take small steps and get comfy with tools and techniques to develop and at last improve your unique approach on a system. 135 | 136 | ###### Information Gathering 137 | 138 | - [Nmap](https://github.com/nmap/nmap) 139 | - [masscan](https://github.com/robertdavidgraham/masscan) 140 | - [RustScan](https://github.com/RustScan/RustScan) 141 | 142 | ###### Vulnerability Analysis 143 | 144 | - [nikto](https://github.com/sullo/nikto) 145 | 146 | ###### Web Application Analysis 147 | 148 | - [WhatWeb](https://github.com/urbanadventurer/WhatWeb) 149 | - [Burp Suite](https://portswigger.net/burp/communitydownload) 150 | - [Gobuster](https://github.com/OJ/gobuster) 151 | - [dirsearch](https://github.com/maurosoria/dirsearch) 152 | - [ffuf](https://github.com/ffuf/ffuf) 153 | - [wfuzz](https://github.com/asciimoo/wuzz) 154 | - [WPScan](https://github.com/wpscanteam/wpscan) 155 | 156 | ###### Database Assessment 157 | 158 | - [sqlmap](https://github.com/sqlmapproject/sqlmap) 159 | 160 | ###### Password Attacks 161 | 162 | - [thc-hydra](https://github.com/vanhauser-thc/thc-hydra) 163 | - [hashcat](https://hashcat.net/hashcat) 164 | - [NetExec](https://github.com/Pennyw0rth/NetExec) 165 | 166 | ###### Exploitation / Post Exploitation Tools 167 | 168 | - [Metasploit](https://github.com/rapid7/metasploit-framework) 169 | - [BloodHound](https://github.com/SpecterOps/BloodHound) 170 | - [Impacket](https://github.com/fortra/impacket) 171 | - [enum4Linux-ng](https://github.com/cddmp/enum4linux-ng) 172 | - [PEASS-ng](https://github.com/carlospolop/PEASS-ng) 173 | - [PSPY](https://github.com/DominicBreuker/pspy) 174 | - [Evil-WinRM](https://github.com/Hackplayers/evil-winrm) 175 | 176 | #### Trainings 177 | 178 | If you feel you need to learn fundamentals of a new topic or to improve you knowledge in specific areas, I would recommend checking out [TryHackMe](https://tryhackme.com) which provides valuable learning paths to various topics. 179 | 180 | Here are a few room recommendations for beginners. 181 | 182 | - [Learning Cyber Security](https://tryhackme.com/room/beginnerpathintro) 183 | - [Introductory Networking](https://tryhackme.com/room/introtonetworking) 184 | - [Intro to Offensive Security](https://tryhackme.com/room/introtooffensivesecurity) 185 | - [Linux Fundamentals Part 1](https://tryhackme.com/room/linuxfundamentalspart1) 186 | - [Linux Fundamentals Part 2](https://tryhackme.com/room/linuxfundamentalspart2) 187 | - [Linux Fundamentals Part 3](https://tryhackme.com/room/linuxfundamentalspart3) 188 | - [Windows Fundamentals 1](https://tryhackme.com/room/windowsfundamentals1xbx) 189 | - [Windows Fundamentals 2](https://tryhackme.com/room/windowsfundamentals2x0x) 190 | - [Windows Fundamentals 3](https://tryhackme.com/room/windowsfundamentals3xzx) 191 | - [Pentesting Fundamentals](https://tryhackme.com/room/pentestingfundamentals) 192 | - [Active Reconnaissance](https://tryhackme.com/room/activerecon) 193 | - [Nmap](https://tryhackme.com/room/furthernmap) 194 | - [Burp Suite: The Basics](https://tryhackme.com/room/burpsuitebasics) 195 | - [Web Application Security](https://tryhackme.com/room/introwebapplicationsecurity) 196 | - [OWASP Top 10](https://tryhackme.com/room/owasptop10) 197 | - [SQL Injection](https://tryhackme.com/room/sqlinjectionlm) 198 | - [Hydra](https://tryhackme.com/room/hydra) 199 | - [Metasploit: Introduction](https://tryhackme.com/room/metasploitintro) 200 | 201 | #### Hacking Resources & Tutorials 202 | 203 | Here are a few resources and knowledgebases to cover various topics. Starting with writeup videos of `IppSec` is always a good call. 204 | 205 | - [ippsec.rocks](https://ippsec.rocks/) 206 | - [Hacking Articles](https://www.hackingarticles.in/) 207 | - [HackTricks](https://book.hacktricks.xyz/welcome/readme) 208 | - [netbiosX/checklists](https://github.com/netbiosX/Checklists) 209 | - [The Penetration Testing Grimoire](https://github.com/RackunSec/Penetration-Testing-Grimoire) 210 | - [pentestmonkey](https://pentestmonkey.net/) 211 | - [PayloadsAllTheThings](https://github.com/swisskyrepo/PayloadsAllTheThings) 212 | - [GTFOBins](https://gtfobins.github.io/) 213 | 214 | ### Purplestorm Wallpapers 215 | 216 | With a little modifications to gorgeus Daena Key and Dominik Mayer art, we present you to use and download `Purplestorm Wallpapers`. 217 | 218 |

219 | 220 |

221 |

222 | 223 |

224 |

225 | 226 |

227 |

228 | 229 |

230 | 231 | Also feel free to get in touch with us on our [Discord](https://discord.gg/JbGr5gA3KY), we are all willing to help! 232 | -------------------------------------------------------------------------------- /images/daena-key-purplestorm.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/0xsyr0/CTF-Notes/028afd7157cfa49dc8042876e58e48a8fedab659/images/daena-key-purplestorm.png -------------------------------------------------------------------------------- /images/daena-key-purplestorm2.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/0xsyr0/CTF-Notes/028afd7157cfa49dc8042876e58e48a8fedab659/images/daena-key-purplestorm2.png -------------------------------------------------------------------------------- /images/dominik-mayer-purplestorm.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/0xsyr0/CTF-Notes/028afd7157cfa49dc8042876e58e48a8fedab659/images/dominik-mayer-purplestorm.png -------------------------------------------------------------------------------- /images/htb-purplestorm.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/0xsyr0/CTF-Notes/028afd7157cfa49dc8042876e58e48a8fedab659/images/htb-purplestorm.png -------------------------------------------------------------------------------- /images/htb_logo.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/0xsyr0/CTF-Notes/028afd7157cfa49dc8042876e58e48a8fedab659/images/htb_logo.png -------------------------------------------------------------------------------- /images/thm_logo.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/0xsyr0/CTF-Notes/028afd7157cfa49dc8042876e58e48a8fedab659/images/thm_logo.png -------------------------------------------------------------------------------- /images/vulnlab_logo.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/0xsyr0/CTF-Notes/028afd7157cfa49dc8042876e58e48a8fedab659/images/vulnlab_logo.png -------------------------------------------------------------------------------- /scripts/rdp: -------------------------------------------------------------------------------- 1 | #!/bin/bash 2 | 3 | # simple rdp wrapper for xfreerdp to switch to evil-winrm faster (yes i am that lazy) 4 | 5 | usage() { 6 | echo "usage: $(basename $0) -i '10.129.16.128' -u 'Administrator' -p 'P@s\$w0rd!' [-H 'NTLMHash']" >&2 7 | } 8 | 9 | if [ $# -eq 0 ] 10 | then 11 | usage 12 | exit 0 13 | fi 14 | 15 | while getopts ':i:u:p:H:' OPTION; do 16 | case "$OPTION" in 17 | i) host="$OPTARG" ;; 18 | u) user="$OPTARG" ;; 19 | p) 20 | pass="$OPTARG" 21 | xfreerdp /v:"$host" /u:"$user" /p:"$pass" /cert:ignore /dynamic-resolution +clipboard 22 | ;; 23 | H) 24 | hash="$OPTARG" 25 | xfreerdp /v:"$host" /u:"$user" /pth:"$hash" /cert:ignore /dynamic-resolution +clipboard 26 | ;; 27 | ?) 28 | usage 29 | ;; 30 | esac 31 | done 32 | shift "$(($OPTIND -1))" 33 | --------------------------------------------------------------------------------