Inspired by a conversation I had on twitter today with @Balgan (who has just started his OSCP adventure, so everyone wish him luck), and due to the fact that I’ve now managed to root all the boxes in the lab (thank you, thank you) I thought I would post some of the interweb based resources I’ve found useful during my adventure (without giving anything away about the content of the labs).
You probably already know most of these but here they are anyway..
- Google – yes I know I keep going on about this “Google” thing, but think of it like this, unless you are a InfoSec God that can just look at a machine and get it to pop a shell (a bit like the Fonzie) then you aren’t re-inventing the wheel and the chances are someone has already exploited what you are looking at.
exploit-db.com – Goes without saying that this should be your first port of call when looking for an exploit. I’m not keen on the search feature so see point 3.
/pentest/exploits/exploitdb– This is on your local copy of backtrack and has is a download of the exploit-db.com, exploit archive. I like the
./searchsploittool and you can grep the output etc. etc. You can either download the archive file from the website, or update it manually using wget and some bash magic. Or if you are lazy my update code is below:
echo "Downloading latest exploit-db archive file"
wget http://www.exploit-db.com/archive.tar.bz2 -O /tmp/archive.tar.bz2
echo "File successfully downloaded"
echo "Decompressing archive file to /pentest/exploits/exploitdb/"
tar -xvjf /tmp/archive.tar.bz2 -C /pentest/exploits/exploitdb/
echo "Decompression complete, reseting executable properties for files.csv"
chmod +x /pentest/exploits/exploitdb/files.csv
echo "Tidying up downloaded file"
echo "Update complete."
- g0tmilk.blogspot.co.uk – g0mi1k’s post about basic linux privilege escalation was a live saver for me. Without it I would have been limited to rooting Windows boxes which lets face it can be a bit boring (sorry Mr Microsoft its just too easy).
Got Meterpreter? Pivot! – This really helped me get my head around pivoting through networks, yes it’s only doing it with Metasploit, but you never know when you might need to.
SSH gymnastics with proxychains – Again another really useful blog post about other ways to tunnel, pivot (do a little dance) your way through networks.
7 linux shells using built-in tools – There is a link to this on g0tmi1k’s blog post above but it’s worth a mention by itself because well it’s awesome and getting shell is never a bad thing.
Pivoting into a network using PLINK and FPipe – If you lean more towards Windows, then here is a good post about using the Windows-based tools to pivot. My personal preference was Linux but everyone is different.
Corelan Team – If you want some light reading on exploit writing, check these guys out. Awesome content that even I can understand.
CVE Details – This is a no brainer really, you can find all sorts of exploits (some of the less common ones) here and the nice thing is that down the bottom of the page for an exploit it will tell you if any Metasploit modules relating to it exist.
Well that’s all I can think of, let me know if I’ve missed any obvious ones (no one is perfect remember).