Are you ready to level up your game?
Ready for the hardest boxes to hack?
Want a challenge without feeling overwhelmed or confused?
I finally did it. I finally decided to create the last series in my three part collection on pwning Hack The Box machines.
There are tons of free write-ups and Youtube videos on-line that will show you how to breach a box but almost none of them break down the process step by step.
And almost none of them include all the commands as a tidy reference.
And even fewer map all attacks to the
Are you ready to level up your game?
Ready for the hardest boxes to hack?
Want a challenge without feeling overwhelmed or confused?
I finally did it. I finally decided to create the last series in my three part collection on pwning Hack The Box machines.
There are tons of free write-ups and Youtube videos on-line that will show you how to breach a box but almost none of them break down the process step by step.
And almost none of them include all the commands as a tidy reference.
And even fewer map all attacks to the
What I’ve done is taken you on a journey into my mind as I help you understand how an expert hacker thinks. You will get the behind-the-curtain view into my thought process as I think through difficult scenarios and carefully step through each obstacle until the box is pwned.
In addition, after we pop the box, we’ll take a step back and understand what vulnerabilities led to the initial intrusion vector by exploring host logs, vulnerable application source code and event logs.
I’ve prepared everything you need for learning success in one convenient package.
So, I’m going to ask again - are you ready to level up your game?
You are about to learn the following tools and techniques from an offensive perspective:
MITRE ATT&CK Enterprise Framework TTPs
ping
nmap
rpcdump
rpcclient
smbmap
smbclient
crackmapexec
whatweb
Wappalyzer
curl
openssl
gowitness
Burp Proxy
Burp Embedded Chromium Browser
feroxbuster
wfuzz
Web Application Attacks: SQLi
Web Application Attacks: Reflected XSS
Web Application Attacks: SSTI
Polyglot Payloads
Web Application Attacks: Command Injection
Reverse Shells: Powershell
Reverse Shells: Powershell Upgrade
Reverse Shells: Netcat
Reverse Shells: Meterpeter
Reverse Shells: PSExec
Reverse Shells: NoPAC
Base64 Encoded Powershell Payloads
rlwrap
PEASS-ng
Blue Team: wmic
Blue Team: tasklist
Blue Team: Get-WmiObject
CSRs
Chisel
ProxyChains
FoxyProxy SOCKS Proxies
tshark
responder
hashcat
Lateral Movement
Resource Development: Commando VM.
Resource Development: Exploit Testing and Maldoc creation
Defense Evasion: charlotte
Defense Evasion: Meterpreter
certutil
SharpCollection
PowerView
Rubeus
Certify
date (sounds lame but we actually use it in a way you've never seen before)
Detection Engineering: Log Review
Secure Coding Principles: Source Code Review
If this doesn't excite you, you are not the right person for this course.
But if you're ready to freggin' have a blast and take your learning and skills to beast mode click Buy Now and let's begin.
In this quick lecture I'm going to show you how to sign up for Hack The Box, setup your Linux VM and configure TMUX so you can start hacking like a pro! Let's go!
Learn how to use ping TTL response times to discover the target OS and how to use nmap to conduct the fastest most useful scan against a target
Use rpcdump and rpcclient to quickly gain details about a target even before gaining credential access!
Quickly leverage smbmap, smbclient and crackmapexec to scan the attack surface of a target listening on port 445.
Attacking websites is where I thrive! In this lecture you'll learn how to use whatweb, curl, openssl, Burp Community Browser, Burp Proxy History, Wappalyzer, gowitness, wfuzz, and feroxbuster! Are you kidding me!!?? Nope! It's going to be awesome!!! Let's go!
W00t! In this lecture we will manually test form fields for SQL injection and Cross Site Scripting vulnerabilities. We will use a modern approach for manual XSS testing (hint: doesn't include alert( )) and then we'll flip things up a bit by using Burp to conduct the same test. Two for the price of one! Let's go!
Ever wonder how to go from a benign finding to PoC to full scale weaponization? This lecture shows the first half of the process. In the second lecture we'll modify our PoC into a Powershell based reverse shell. We're also going to talk about how these kinds of vulnerabilities arise in the first place: it really comes down to the difference between CODE and DATA. Let's learn!
In this lecture you're going to use nishang, rlwrap, netcat, a Powershell Download Cradle and a Base64 encoded payload to get a shell on the box!! Are you ready for this? It's time to go from PoC to RCE baby!!!
So you popped a shell using nishang but formatting is busted, characters are missing, errors abound and the shell is unstable. In this lecture, I'll show you a trick for upgrading nishang to a fully-interactive Windows shell. We'll read through the github page documentation, encounter a few errors along the way and then I'll "think out-loud" so you can enter into my troubleshooting process and watch how I tackle the problem and get a quick resolution - one. step. at. a. time. Let's go!! It's going to be a great learning experience for ya. :)
Yes! Netcat all the way! In this lecture we'll get a pure netcat reverse shell. As a consequence we'll leave an artifact on the victim and I'll show you how Blue Teamers and Cyber Threat Hunters can leverage this observable to find attacker tools when applicable. Let's go!
Now it's time to use PEASS-ng (formerly winPEAS) to fine escalation vectors. Along they way we'll find cleartext credentials and some opportunities for our next action. Let's go!!!
We're going to run four MITRE ATT&CK techniques in this one lecture! And it's all about discovery baby! We're going to play with Powershell, tasklist, wmic and more! Let's go! NOW! LOL
So we discovered a certificate signing request (CSR) document on the victim server. What can we do with it? What exactly is a CSR anyway? After watching this lecture all ambiguity will be flushed from your mind! Let's go!
What exactly does it mean to tunnel a remote port via a reverse proxy? And how exactly can we pull this off? After completing this lecture you will know! You're going to learn how to use chisel, proxychains to create a reverse proxy to send a remote, private, internal IP to our attacking machine so we can inspect the internal web application using curl, html2text and Firefox! Let's go! This one is going to be a lot of fun
In this lecture we discover the software portal is sending credentials via WinRM to connected clients in an effort to auto-install software when a link is clicked. By carefully modifying the URL and spying on the request with tshark and netcat, we can capture the request and verify NTLM credentials are sent in the request! Check it out! You don't want to miss this one.
We're going to use Responder, Proxychains, Curl and Hashcat to capture and crack credentials which will support our lateral movement efforts in the following lecture! Let's go!
Let's attempt to use our capture credentials to pivot and pwn! In this lecture we'll try to expand influence in the target network leveraging crackmapexec and smbclient. Let's go!
W00t! Now we build out the best offensive Windows distribution on the planet! Commando VM! If you haven't heard of this one you definitely need to check this lecture out. The reason we're building this VM is to support our action on objectives: we need an offensive Windows server or workstation so we can test our exploit chains before the final delivery phase to the victim. This VM is packed with sooo many goodies including nmap, Covenant C2, Mimikatz, Sysinternals, Hashcat, Burp and so much much more! It's going to be awesome guys. You ready?
Okay, so we've got our shiny new offensive Windows VM setup! Now I'm going to show you how to setup a file share so we can transfer the vulnerable web app from the victim network into our exploit development rig. I KNOW you're ready for this one... so I'm not even gonna ask... haha
Can I get a what what! So in this lecture, we're going to pop calc. What? That's lame. No it's not. We're going to read and understand a PoC and then modify it to coerce Node.JS to spawn a local child process when the vulnerable desktop application is opened by the victim user. There's a lot going on in this lecture and I promise you will love it. I take the time to patiently describe every process - and by the end of the lecture you will be one step away from weaponization.
This is one of the most advanced lectures in the entire course. Here's what's up: by the end of this lecture you will learn how to patch, debug and troubleshoot broken exploits. You will also learn how to compile, deploy and execute a fully undetected ("FUD") shellcode loader and ultimately shovel a Meterpeter shell to your attacker box. You will build a complex attack chain involving Reflected XSS, LOLbins, C++ Shellcode Loader, Metasploit, Meterpreter, and SMB attacks. All in one mega lecture! Let's go!
Do you know how to escape a Docker Container? That's what we're doing in this lecture! We're also going to explore the target system and discover our next attack path.
Now it's time to stage our attack tools on the victim server. We're going to use some little known Metasploit modules to transfer and run our tools to the target. Prepare to learn. Prepare for leet. Let's go!
You ready to pop the box? Yup. We will pwn and profit in this lecture. Along the way you will learn how to use standard Powershell Cmdlets for offensive purposes, how to use the Meterpreter Powershell modules, how to patch a broken Powershell script, how to execute binaries on the victim using Meterpeter, how to use Rubeus to steal NTLM hashes, how to use CrackMapExec to validate access and how to pop a system shell on the target using PsExec. I really don't know how I could have made this lecture any more awesome.
Ready to get Domain Admin in 60 seconds? Yes, we're running an exploit but no I won't leave you hanging. I'm going to take 15 minutes to explain our 60 second attack so you understand EXACTLY what's happening under the hood. Let's do this baby!!
Okay, we've popped the box. Now it's time to get ready for a damage assessment!
You came for the Gold? Here's the Gold. You will enter the Docker Container and retrieve the IIS logs. We'll find our attack payloads. We'll find the vulnerable lines of source code. You'll learn how to mitigate the threat. If you've made it this far... you are awesome as far as I'm concerned. You're skills are now leveled to heights very few people have. I respect you. Let's do this!
OpenCourser helps millions of learners each year. People visit us to learn workspace skills, ace their exams, and nurture their curiosity.
Our extensive catalog contains over 50,000 courses and twice as many books. Browse by search, by topic, or even by career interests. We'll match you to the right resources quickly.
Find this site helpful? Tell a friend about us.
We're supported by our community of learners. When you purchase or subscribe to courses and programs or purchase books, we may earn a commission from our partners.
Your purchases help us maintain our catalog and keep our servers humming without ads.
Thank you for supporting OpenCourser.