http://pen-testing.sans.org/blog/2017/11/27/understanding-and-exploiting-web-based-ldap
A place to share links and articles that i have found helpful. This blog tends to be more offensive security minded. Basically it is a collection of notes that I will update periodically. None of this is set in stone, and I could very well be wrong on most of it. Just saying.
Rtfdump update
Version 0.0.6 https://blog.didierstevens.com/2017/12/10/update-rtfdump-py-version-0-0-6/
Another S3 leak
Code Execution via CSV file
http://georgemauer.net/2017/10/07/csv-injection.html
https://www.owasp.org/index.php/CSV_Excel_Macro_Injection
https://pentestmag.com/formula-injection/
https://www.contextis.com/blog/comma-separated-vulnerabilities
https://hackerone.com/reports/72785
More on SEC breach
Here's The Latest About What The SEC Hackers Stole, but not a whole lot really
https://packetstormsecurity.com/news/view/28207/Heres-The-Latest-About-What-The-SEC-Hackers-Stole.html
Some fun lately with custom payloads
Here are some of the more recent reads ......
http://e-spohn.com/blog/2012/08/02/pe-crypters-hyperion/
https://www.christophertruncer.com/bypass-antivirus-with-meterpreter-as-the-payload-hyperion-fun/
http://www.exploit-monday.com/2011/11/powersyringe-powershell-based-codedll.html
http://colesec.inventedtheinternet.com/obfuscating-meterpreter-payloads-with-veil/
http://colesec.inventedtheinternet.com/hacking-with-powershell-powersploit-and-invoke-shellcode/
https://github.com/rapid7/metasploit-framework/wiki/How-payloads-work
https://www.citadelo.com/en/how-we-bypassed-nod32-and-hacked-a-paranoid-customer-2/
Course Review: Ethical Hacking For Beginners
https://stackskills.com/p/ethical-hacking-for-beginners
Overall verdict: Stay Away.
Better course for the money, adn this is not that expensive, so please let that tell you something.
Basic lectures are wrong in this course. The information presented about traceroute and DNS is just plain wrong in this course. Everything else is not that much different form similar coursework available from other sources. My suggestion is to look elsewhere.
Etheream heist
Anthem Breach Settlement
WWE fans exposed
Hospitality breaches
Molina Needs some Health
Canada fires tax worker
Qatar state news agency hacked
How was flexispy hacked
Update:
another DIY guide:
https://dl.packetstormsecurity.net/papers/attack/hackback-a-diy-guide.txt
Tinder Investigates After 40,000 Profile Pics Snatched
https://packetstormsecurity.com/news/view/27749/Tinder-Investigates-After-40-000-Profile-Pics-Snatched.html
Microsoft Windows 32-bit / 64-bit cmd.exe Shellcode
https://packetstormsecurity.com/files/142572/wincmdexe-shellcode.txt
French election hack
Hacker Steals Millions of User Account Details from Education Platform Edmodo
https://motherboard.vice.com/en_us/article/hacker-steals-millions-of-user-account-details-from-education-platform-edmodo
India's Zomato Says Data From 17 Million Users Stolen
Https://packetstormsecurity.com/news/view/27822/Indias-Zomato-Says-Data-From-17-Million-Users-Stolen.html
Bell Canada Hack Hits 1.9 Million Customers
Https://packetstormsecurity.com/news/view/27812/Bell-Canada-Hack-Hits-1.9-Million-Customers.html
New card for you
Reset your passwords
Holiday Inn breach
RaaS
Small Linux shellcode
GameStop breach
Analyze Embedded PDF file
Shoney's announces breach
Hotel chain breach bigger
Citadel owner pleads guilty
Russian mastermind of $500m bank-raiding Citadel coughs to crimes
http://www.theregister.co.uk/2017/03/22/russian_citadel_malware_pleads_guilty/
ABTA Website Hacked
43,000 People Affected By Breach
https://packetstormsecurity.com/news/view/27609/ABTA-Website-Hacked-43-000-People-Affected-By-Breach.html
Pwn2Own2017
Chrome Remains the Winner in Browser Security
https://securityzap.com/pwn2own-2017-chrome-remains-winner-browser-security/
Pentesting whiteboards
https://pen-testing.sans.org/blog/2017/03/08/pen-test-poster-white-board-powershell-get-firewall-rules
https://pen-testing.sans.org/blog/2017/03/08/pen-test-poster-white-board-powershell-built-in-port-scanner
https://pen-testing.sans.org/blog/2017/03/08/pen-test-poster-white-board-powershell-add-a-firewall-rule
https://pen-testing.sans.org/blog/2017/03/08/pen-test-poster-white-board-bash-find-juicy-stuff-in-the-file-system
https://pen-testing.sans.org/blog/2017/03/08/pen-test-poster-white-board-bash-sudo-make-me-a-sandwich
https://pen-testing.sans.org/blog/2017/03/08/pen-test-poster-white-board-cmd-exe-c-wmic-process
https://pen-testing.sans.org/blog/2017/03/08/pen-test-poster-white-board-cmd-exe-c-netsh-interface
https://pen-testing.sans.org/blog/2017/03/06/pen-test-poster-white-board-powershell-ping-sweeper
https://pen-testing.sans.org/blog/2017/03/03/got-meterpreter-pivotpowpy
https://pen-testing.sans.org/blog/2017/02/28/pen-test-poster-white-board-bash-make-output-easier-to-read
https://pen-testing.sans.org/blog/2017/02/21/pen-test-poster-white-board-bash-check-service-every-second
Rootkit Tricks
https://msdn.microsoft.com/en-us/library/windows/desktop/ms682489(v=vs.85).aspx
http://stackoverflow.com/questions/4021307/enumprocesses-vs-createtoolhelp32snapshot
https://books.google.com/books?id=ifQPC86G66sC&pg=PA437&lpg=PA437&dq=CreateToolhelp32Snapshot()
https://msdn.microsoft.com/en-us/library/windows/desktop/ms682631(v=vs.85).aspx
A few other windows things:
https://msdn.microsoft.com/en-us/library/windows/desktop/ms724947(v=vs.85).aspx
https://msdn.microsoft.com/en-us/library/windows/desktop/ms646293(v=vs.85).aspx
Hide console shellcode
Linux file read
Create File Shellcode
Directory search shellcode
Windows x86 Executable Directory Search Shellcode
https://packetstormsecurity.com/files/141333/win86execdirsearch-shellcode.txt
Random Linux Shellcode
Explain 'getsystem'
https://blog.cobaltstrike.com/2014/04/02/what-happens-when-i-type-getsystem/
https://www.offensive-security.com/metasploit-unleashed/privilege-escalation/
http://carnal0wnage.attackresearch.com/2010/01/metasploit-getsystem-command.html?m=1
http://www.khromozome.com/windows-privilege-escalation-bypassuac/
https://www.redspin.com/it-security-blog/2010/02/getsystem-privilege-escalation-via-metasploit/
ASLR flaw
Basics of Windows Incident Response
https://jordanpotti.com/2017/01/20/basics-of-windows-incident-response/
AV0id – Anti-Virus Bypass Metasploit Payload Generator Script
Quick Integration of MISP and Cuckoo
https://blog.rootshell.be/2017/01/25/quick-integration-misp-cuckoo/
Detecting Kerberoasting Activity Part 2
Creating a Kerberoast Service Account Honeypot https://adsecurity.org/?p=3513
Microsoft AD hacking tricks
Microsoft Office Word Malicious Macro Execution
https://packetstormsecurity.com/files/140972/office_word_macro.rb.txt
Lynis Auditing Tool 2.4.1
Lynis Auditing Tool 2.4.1
https://packetstormsecurity.com/files/140981/lynis-2.4.1.tar.gz
Question and Answer
https://www.youtube.com/watch?v=sCG-5fluNPo