Index
A
- Adobe ColdFusion
- setup / Setup
- URL / Setup
- variations / Variations
- Aircrack suite (apt-get install aircrack-ng) / Software
- ASCII85 / Random encoding types
- attack and defense course / Attack and defense
- automatic methods / Automatic methods
B
- Base64 encoding / Generic encoding types
- Base85 / Random encoding types
- basic network, network base scenario
- setting up / Setting up a basic network
- VMs, cloning / Attack of the clones
- Workstation1 / Workstation1
- Workstation2 / Workstation2
- Workstation3 / Workstation3
- Workstation4 / Workstation4
- Workstation5 / Workstation5
- bind interfaces only parameter
- about / Configuration
- bio information
- used, for linking websites / Connecting methods
- bitwise addition / Scenario 3 – RC4, my god, what are you doing?
- BruCon / Recommended competitions
- BWA (Broken Web Apps)
- URL / Existing vulnerable VMs
C
- 44con / Recommended competitions
- challenge modes
- tool restrictions / Challenge modes
- time restrictions / Challenge modes
- client code setup
- WEP network / Code setup
- comment parameter
- about / Configuration
- competitions
- CSAW CTF / Recommended competitions
- DEFCON / Recommended competitions
- NotSoSecure / Recommended competitions
- 44con / Recommended competitions
- BruCon / Recommended competitions
- Nuit Du Hack / Recommended competitions
- Crunch (apt-get install crunch) / Software
- crypto
- used, for linking websites / Connecting methods
- cryptobin
- URL / Potential avenues
- CSAW CTF / Recommended competitions
- CTF-style variations
- DEFCON game / DEFCON game
- physical components / Physical components
- attack and defense course / Attack and defense
- Jeopardy style / Jeopardy
D
- dangerous PHP, LAMP
- about / Dangerous PHP
- DEFCON / Recommended competitions
- DEFCON game / DEFCON game
- Denial of Service (DoS) / Reporting example
- digital rights management (DRM) / Differences between Linux and Microsoft
- direct links
- used, for linking websites / Connecting methods
- distros, Linux
- about / Scenario 3 – destructible distros
- setting up / Setup
- repository, URL / Setup
- variations / Variations
- DMZ, missile base scenario
- about / DMZ
- DMZ host, missile base scenario / Network diagram
- dnschef
- URL / Software
- dnschef setting / Scenario 3.3 – DNS spoof your friends for fun and profit
- dns proxy parameter
- about / Configuration
- DNS spoofing
- DVWA (Damn Vulnerable Web App) / Existing vulnerable VMs
E
- -ef <file to hide> file
- about / Visual steganography
- echo $input; command
- about / Code setup
- Edgy Eft
- installing / Setup
- encoding
- about / Crypto jargon, Scenario 1 – encode-ageddon
- generic type / Generic encoding types
- random type / Random encoding types
- forms / Random encoding types
- vulnerabilities / Scenario 1 – decode-alypse now
- exploit guides / Scenario 1 – decode-alypse now
- encryption / Crypto jargon
- English texts
- exclusive or / Scenario 3 – RC4, my god, what are you doing?
- ExifTool
- about / Visual steganography
- exploitation guides
- smashing Samba / Scenario 1 – smashing Samba
- XAMPP, exploiting / Scenario 2 – exploiting XAMPP
- privilege / Scenario 3 – like a privilege
- tampering, with Telnet / Scenario 4 – tampering with Telnet
- for cookie theft (XSS attack) / Scenario 1 – cookie theft for fun and profit
- for social engineering / Scenario 2 – social engineering tips
- for OSINT / Scenario 3 – exploitation guide
- for steganography / Scenario 4 – exploitation guide
- exploit guides
F
- Facebook site
- used, for hosting content / Potential avenues
- File Transfer Protocol (FTP)
- flag placement
- and design / Flag placement and design
- flags
- pros / Flag placement and design
- cons / Flag placement and design
- placing / Flag placement and design
- handling, ways / Flag placement and design
- testing / Testing your flags, Making the flag too easy
- simplifying / Making the flag too easy
- objectives, creating / Alternate ideas
- Free-WiFi
G
- g0tmilk, blog / Further reading
- geotagging / Scenario 3.1 – be a geodude with geotagging
- GitHub site / Potential avenues
- guest ok parameter
- about / Configuration
- guest only parameter
- about / Configuration
H
- hash
- brute-force attack / Setup
- reuse attack / Setup
- creating, setup / Setup
- vulnerabilities / Scenario 4 – hash outside of Colorado
- exploit guides / Scenario 4 – hash outside of Colorado
- hash brute-force attack / Setup
- hashing
- about / Crypto jargon, Scenario 4 – Hishashin
- variations / Hashing variations
- hash reuse attack / Setup
- Heartbleed
- Heartbleed attack
- SSL server vulnerable, setting up / Setup
- exploit guides / Scenario 5 – bleeding hearts
- vulnerabilities / Scenario 5 – bleeding hearts
- Heartbleed attack platform
- creating / Variations
- Hex0rbase tool / Scenario 2 – your database is bad and you should feel bad
- hidden pages
- used, for linking websites / Connecting methods
- High Orbital Ion Cannon (HOIC) / Creating an OSINT target
- Hostapd (apt-get install hostapd) / Software
- HTML comments
- used, for linking websites / Connecting methods
I
- Instagram site
- used, for hosting content / Potential avenues
- interfaces parameter
- about / Configuration
- iSniff
- Iwtools (apt-get install iw) / Software
J
- Jeopardy style / Jeopardy
L
- LAMP
- about / Scenario 2 – turning on a LAMP
- variations / Variations
- LAMP variations
- out-of-date versions / Out-of-date versions
- login bypass / Login bypass
- SQL injection / SQL injection
- dangerous PHP / Dangerous PHP
- PHPMyAdmin / PHPMyAdmin
- leaking sites
- cryptobin / Potential avenues
- Pastebin / Potential avenues
- used, for hosting content / Potential avenues
- legionnaires / Substitution cipher variations
- LinkedIn site
- used, for hosting content / Potential avenues
- Linux
- networking setup / Setting up a Linux network
- versus Microsoft / Differences between Linux and Microsoft
- log file parameter
- about / Configuration
- login bypass, LAMP
- about / Login bypass
- Lubuntu
M
- Mac address
- map to guest = bad user parameter
- about / Configuration
- max log size parameter
- about / Configuration
- Meterpreter / Post-exploitation and pivoting
- Microsoft
- versus Linux / Differences between Linux and Microsoft
- Microsoft Developer Network (MSDN) / Securing a machine
- Miniboa, Python
- URL / Setup
- missile base scenario
- about / Scenario 1 – ladders, why did it have to be ladders?
- structure / Scenario 1 – ladders, why did it have to be ladders?
- network diagram / Network diagram
- overview / Brief
- virtual machines, setting up / Setting up virtual machines
- attack guide / Attack guide
- variations / Variations
- dummy devices / Dummy devices
- OSint trail / Combined OSINT trail
- summary / The missile base scenario summary
- missileman, missile base scenario / Network diagram, missileman
- MiTM attack / Scenario 3.2 – ghost in the machine or man in the middle
- MSSQL
- about / Scenario 2 – making a mess with MSSQL
- creating, on host / Setup
- set up / Setup
- variations / Variations
- MSSQL Management Suite 2008
- URL / Setup
- MSSQL Server 2005 Express
- URL / Setup
N
- network base scenario
- structure / Scenario 2 – that's no network, it's a space station
- network diagram / Network diagram
- overview / Brief
- basic network, setting up / Setting up a basic network
- cloned VMs / Customizing cloned VMs
- attack guide / Attack guide
- variations / Variations
- summary / The network base scenario summary
- network diagram, missile base scenario / Network diagram
- DMZ / Network diagram
- missileman / Network diagram
- secret1 host / Network diagram
- secret2 / Network diagram
- secret3 / Network diagram
- network diagram, network base scenario
- about / Network diagram
- Workstation1 / Network diagram
- Workstation2 / Network diagram
- Workstation3 / Network diagram
- Workstation4 / Network diagram
- Workstation5 / Network diagram
- network mapping tool (Nmap) / Setup
- nmap -sS -vvv -p- <host> command / Setup
- nmap -sS -vvv -p <port> <host> command / Setup
- nmap -sU -vvv -p- <host> command / Setup
- nmonkee (Northern Monkey), blog / Further reading
- NotSoSecure / Recommended competitions
- Nuit Du Hack / Recommended competitions
O
- OKCupid / Scenario 3 – hunting rabbits
- OSINT
- about / Scenario 3 – hunting rabbits
- OSINT target
- creating / Creating an OSINT target
- exploitation guide / Scenario 3 – exploitation guide
- out-of-date versions, LAMP
- about / Out-of-date versions
P
- password
- searching, for WiFi / Scenario 2 – potentiating partial passwords
- Pastebin
- URL / Potential avenues
- Pastebin post
- about / Creating an OSINT target
- path parameter
- about / Configuration
- phone
- setting up / Setup
- setting up, important points / Important things to remember
- location, identifying / Scenario 3.1 – be a geodude with geotagging
- PHPMyAdmin, LAMP
- about / PHPMyAdmin
- Pinterest site
- used, for hosting content / Potential avenues
- pivoting / Post-exploitation and pivoting
- plaintext attack
- exploiting / Scenario 3 – was that a 1 or a 0 or a 1?
- post-exploitation / Post-exploitation and pivoting
- POST method / Code setup
- Python library
- URL / Code setup
R
- rabbit trail
- about / Scenario 3 – hunting rabbits
- setting up, core principles / Core principles
- potential avenues, for hosting content / Potential avenues
- websites, connecting methods / Connecting methods
- OSINT target, creating / Creating an OSINT target
- RC4
- about / Scenario 3 – RC4, my god, what are you doing?
- setup / Setup
- implementations / Implementations
- red teaming
- overview / Chapter guide
- references / Further reading
- reporting
- about / Reporting
- example / Reporting example
- Summary section / Reporting explanation
- Risk section / Reporting explanation
- Mitigation section / Reporting explanation
- retaliation.py script
- URL / missileman
- RFLAGG / Scenario 1 – traverse the directories like it ain't no thing
- Robots.txt file
- used, for linking websites / Connecting methods
- rogue's gallery / Further reading
S
- Samba
- about / Scenario 1 – learn Samba and other dance forms
- cons / Scenario 1 – learn Samba and other dance forms
- setting up / Setup
- configuring / Configuration
- testing / Testing
- variations / Variations
- Samba repositories
- URL / Setup
- Samba variations
- information disclosure / Information disclosure
- file upload / File upload
- scoring system
- about / Scoring systems
- suggestions / Scoring systems
- secret1, missile base scenario / Network diagram, secret1
- secret2, missile base scenario / Network diagram, secret2
- secret3, missile base scenario / Network diagram, secret3
- secure network
- creating / Creating a secure network
- requisites / Basic requirements
- setting up, on Linux / Setting up a Linux network
- setting up, on Windows / Setting up a Windows network
- Secure Shell Version 1 (SSHv1)
- security through obscurity / Scenario 2 – encode + Python = merry hell
- server code setup
- WEP network / Code setup
- server string parameter
- about / Configuration
- setting scenarios / Setting scenarios
- shell pretty sharpish, PentestMonkey
- Simple Network Management Protocol (SNMP)
- Snoopy
- snort
- URLs / Scoring systems
- social engineering
- about / Scenario 2 – social engineering: do no evil
- setup / Setup
- variations / Variations
- exploitation guide / Scenario 2 – social engineering tips
- social engineering setup
- SQL injection, LAMP
- about / SQL injection
- SSL server vulnerable
- setting up, to Heartbleed attack / Setup
- stealth mission / Setting scenarios
- steganography
- used, for linking websites / Connecting methods
- about / Scenario 4 – I am a Stegosaurus
- visual steganography / Visual steganography
- exploitation guide / Scenario 4 – exploitation guide
- steghide
- about / Visual steganography
- -cf <image> file / Visual steganography
- -ef <file to hide> file / Visual steganography
- substitution cipher
- about / Crypto jargon
- setup / Setup
- variations / Substitution cipher variations
- Subvert, Upgrade, Subvert (Su-Su) cycle / Post-exploitation and pivoting
- suggestions, scoring systems
- fixed point exploits / Scoring systems
- reporting requirements / Scoring systems
- time-based / Scoring systems
- low footprint aspect / Scoring systems
- merged systems / Scoring systems
T
- Telnet
- about / Scenario 4 – tearing it up with Telnet
- setting up / Setup
- telnet command / Attack guide
- Telnet variations
- default credentials / Default credentials
- buffer overflows / Buffer overflows
- TFTP
- about / Scenario 3 – trivializing TFTP
- trivializing / Scenario 3 – trivializing TFTP
- vulnerabilities / Vulnerabilities
- TFTPD32 / Scenario 3 – trivializing TFTP
- transposition cipher / Crypto jargon
- trans subs
- Twitter
- used, for hosting content / Potential avenues
U
V
- virtual machines setup, missile base scenario
- about / Setting up virtual machines
- exploitation order / Setting up virtual machines
- DMZ / DMZ
- missileman / missileman
- secret1 / secret1
- secret2 / secret2
- secret3 / secret3
- visual steganography
- about / Visual steganography
- vulnerability
- hosting / Hosting vulnerabilities
- setup levels, simple / Hosting vulnerabilities
- setup levels, moderate / Hosting vulnerabilities
- setup levels, complex / Hosting vulnerabilities
- exploitation levels, simple / Hosting vulnerabilities
- exploitation levels, moderate / Hosting vulnerabilities
- exploitation levels, complex / Hosting vulnerabilities
- vulnerable machine
- creating / Creating a vulnerable machine
- tenets / Creating a vulnerable machine
- securing / Securing a machine
- vulnerable VMs / Existing vulnerable VMs
W
- websites, connecting methods
- HTML comments / Connecting methods
- steganography / Connecting methods
- crypto / Connecting methods
- direct links / Connecting methods
- bio information / Connecting methods
- hidden pages / Connecting methods
- Robots.txt file / Connecting methods
- websites, for hosting content
- leaking sites / Potential avenues
- Twitter / Potential avenues
- WordPress / Potential avenues
- LinkedIn / Potential avenues
- Facebook / Potential avenues
- Pinterest / Potential avenues
- Instagram / Potential avenues
- GitHub / Potential avenues
- WEP key
- rescuing / Scenario 1 – rescue the WEP key
- WEP network
- pros / Scenario 1 – WEP, that's me done for the day
- cons / Scenario 1 – WEP, that's me done for the day
- code setup / Code setup
- server code setup / Code setup
- client code setup / Code setup
- setting up / Network setup
- WiFi
- password, searching for / Scenario 2 – potentiating partial passwords
- Wigle database
- Windows
- networking setup / Setting up a Windows network
- wireless environment setup
- testing, guidelines / Wireless environment setup
- software requisites, tools / Software
- software requisites / Software
- hardware requisites / Hardware
- Wireshark (apt-get install wireshark) / Software
- WordPress site
- used, for hosting content / Potential avenues
- workgroup parameter
- about / Configuration
- WPA-2
- about / Scenario 2 – WPA-2
- setting up, with hostpad / Setup
- writable = yes parameter
- about / Configuration
X
- XAMPP
- about / Scenario 2 – turning on a LAMP
- setting up / Setup
- URL / Setup
- PHP hidden backdoor / The PHP
- XOR / Scenario 3 – RC4, my god, what are you doing?
- XSS
- about / Scenario 1 – maxss your haxss
- code, setting up / Code setup
- exploitation guide for cookie theft / Scenario 1 – cookie theft for fun and profit