[TOC] # Basic-Topics ## 0x01 Network Security Active/Passive Recon & Recon tools Common Service/Protocol and Attack Methods ### [Reconnaissance](/Okk4gEhnR4OLWHRbe5bXsQ) ### [Nmap](/CJyq7b_XT4mdRYXLzjzj-w) ### [Protocol & Service](/YRK-_CBcTDuolNCv-tK4SA) ### [Netwokr Security Challenge](/n4wHTmMYT6-Gp9rXTx6y1Q) EASY LAB ## 0x02 Vulnerable Research & Exploitation ### [Vulnerabilities Research, Database, & Manual Exploit](/YMWiB6SMTSSkRT-Smp9UxA) - Concept & LABs (Not Revise) ### [Metasploit](/jt9GLE6kRPqgSQkKcss-9A) (Not Revise) - Exploitation Framework ## 0x03 Post Exploit - Privilege Escalation ### [Command Interpreter](/2u36yo50RVGr2O40H6hRtQ) ### [Linux Privilege](/PsSireP4T7GHASaI8NSDIw) ### [Windows Privilege](/Z1sYhyqLShCW_WYuoLPk2A) # Advance-Topics ## 0x01 CTF (Advance Challenge) ### [FrameWork & Weaponry](/K2SU_0mfTu68V5a_FpoIgg) Tryhacke Me & Hack The Box Initial Access ### [LAB - XSS to Admin](/DHMLsAOrSOmskfzKO-Mj8Q) ### [LAB - XSS & XSRF bypass Access Control](/xBTW05AqTFaUx6fncMyJfg) ### [LAB - SSRF to Read id_rsa](/665UApxSSxWCuf58zDKj3Q) ### [LAB - SQLI](/vYGa7RCoT3GPvYHw43dtjw) ### [LAB - LDAPI](/VxYsT-uzRpmTtdw9xfBysw) ### [LAB - FileUpload](/kF1d5_zIS7WPVX5WsNZb8A) ### [LAB - CVE Exploit](/JSIfZEmuR92iVB9gacVjLw) ### [LAB - Deserialization](/6Zh6BebSScmtXeKfHg9XWA) ### [LAB - LFI/RFI](/sClDcHzBQomau9rlO2MkSQ) ### [LAB-A](/Cuq5RNTQTq2Q92ht8tgo6g) ### [LAB-B](/lP4dLAJVTwGdzQSlEXFOPA) ### [LAB - Misc](/E8iX9NPWQm-xStm2Db0EyQ) ### [Machines - FristTime](/S_JwVlmlSUynFDVTZL3Cjg) -------------------------------------- [Advance Web Techniques](/Ky3tqyZKRgW2eUl_HKL69A) ## 0x02 Active Directory ### [Active Directory](/bbKEMx85TN6aqfbR6xjrgQ) ### [Breaching Active Directory](/8qFjw7VMQUqdijtHSXHCUA) ### [Enumerate Active Directory](/n2hpl3SiSmCOy-qqHrL1QA) ### [Lateral Movement and pivoting](/kupWN1NmR5a4AjwfHEcJdQ) <!-- --- Reviews:1 ## [Web vulnerable](/tiJ1Go7QThm7IQOFYKTE8w) ## [vulnerability 101](/BmpYIRYtS5qL2Z0-_fu7aw) ## [Exploit Vulnerabilities](/F8CX7h6mT6q6XarTB_hISw) ## [Vulnerability Capstone](/OGOyVfXmSlKCYT2dKUT0vg) ## [Msfvenom](/i59dSw35Sr-CHq6-Qh7VRg) ## [post-exploitation](/hUw3KD8FRFyRAZsqVfYVHQ) ## [shell](/moiIIoBkS2ytT66PqdH0dQ) ## [linux privilege](/GeiUwy94SfeE9hOnG1UPaA) ## [windows privilege](/jCJrVidiSHKHYlB85-mw-w) ## [ADS](/DG3si9Z5TJeOfBgo1HgrpA) --> Owner:侯智晟 Email :moewheckerouo@gamil.com