0% found this document useful (0 votes)
174 views4 pages

References

The document contains links to resources about penetration testing techniques such as exploiting Active Directory, password cracking, keylogging, privilege escalation, hiding data in alternate data streams and steganography, as well as links about authentication methods like Kerberos, covering tracks after penetration testing, and using tools like Metasploit. The resources cover both Windows and Linux systems and include guides, documentation, wikipedia articles and more to aid in understanding various hacking and security topics.

Uploaded by

John
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
174 views4 pages

References

The document contains links to resources about penetration testing techniques such as exploiting Active Directory, password cracking, keylogging, privilege escalation, hiding data in alternate data streams and steganography, as well as links about authentication methods like Kerberos, covering tracks after penetration testing, and using tools like Metasploit. The resources cover both Windows and Linux systems and include guides, documentation, wikipedia articles and more to aid in understanding various hacking and security topics.

Uploaded by

John
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as TXT, PDF, TXT or read online on Scribd
You are on page 1/ 4

Active Directory:

https://jumpcloud.com/resources/active-directory-guide

https://www.pcwdld.com/active-directory-guide

https://blog.procircular.com/llmnr-nbt-ns-spoofing

https://www.varonis.com/blog/pen-testing-active-directory-environments-part-
introduction-crackmapexec-powerview/

https://hausec.com/2019/03/05/penetration-testing-active-directory-part-i/

https://gbhackers.com/active-directory-penetration-testing-checklist/

https://medium.com/@Dmitriy_Area51/active-directory-penetration-testing-
d9180bff24a1

https://github.com/balaasif6789/AD-Pentesting

https://pentestmag.com/download/pentest-active-directory-pentesting/

Password Cracking:

https://www.itpro.co.uk/security/34616/the-top-password-cracking-techniques-
used-by-hackers

https://www.guru99.com/how-to-crack-password-of-an-application.html

https://www.freecodecamp.org/news/an-intro-to-password-cracking/

https://www.alphr.com/features/371158/top-ten-password-cracking-techniques/

https://www.geeksforgeeks.org/understanding-rainbow-table-attack/

https://en.wikipedia.org/wiki/Rainbow_table

https://capec.mitre.org/data/definitions/55.html

https://project-rainbowcrack.com/table.htm

Keyloggers:

https://securelist.com/keyloggers-how-they-work-and-how-to-detect-them-part-
1/36138/

https://www.mcafee.com/blogs/consumer/family-safety/what-is-a-keylogger/

https://enterprise.comodo.com/what-is-a-keylogger.php

https://en.wikipedia.org/wiki/Keystroke_logging

Windows/Microsoft Authentication:

https://docs.microsoft.com/en-us/windows-server/security/windows-
authentication/windows-authentication-overview

https://en.wikipedia.org/wiki/NT_LAN_Manager
https://www.windows-active-directory.com/tag/how-does-ntlm-authentication-
work

https://en.wikipedia.org/wiki/Security_Account_Manager

https://www.windows-active-directory.com/windows-security-account-
manager.html

https://en.wikipedia.org/wiki/Kerberos_(protocol)

https://www.varonis.com/blog/kerberos-authentication-explained/

https://cyberx.tech/kerberos-authentication/

Metasploit:

https://www.varonis.com/blog/what-is-metasploit/

https://www.tutorialspoint.com/metasploit/metasploit_quick_guide.htm

https://www.sans.org/security-resources/sec560/misc_tools_sheet_v1.pdf

Linux Authentication:

http://www.linuxgeek.net/documentation/authentication.phtml

https://www.cyberciti.biz/faq/understanding-etcpasswd-file-format/

https://www.computernetworkingnotes.com/rhce-study-guide/etc-shadow-file-in-
linux-explained-with-examples.html

Salting:

https://en.wikipedia.org/wiki/Salt_(cryptography)

https://auth0.com/blog/adding-salt-to-hashing-a-better-way-to-store-
passwords/

https://crackstation.net/hashing-security.htm

https://www.thesslstore.com/blog/difference-encryption-hashing-salting/

Privilege Escalation:

https://en.wikipedia.org/wiki/Privilege_escalation

https://www.netsparker.com/blog/web-security/privilege-escalation/

https://www.cynet.com/cyber-attacks/privilege-escalation/

https://blog.netwrix.com/2018/09/05/what-is-privilege-escalation/

https://www.absolomb.com/2018-01-26-Windows-Privilege-Escalation-Guide/

https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology
%20and%20Resources/Windows%20-%20Privilege%20Escalation.md#user-enumeration

https://null-byte.wonderhowto.com/how-to/bypass-uac-escalate-privileges-
windows-using-metasploit-0196076/
Spywares:

https://en.wikipedia.org/wiki/Spyware

https://economictimes.indiatimes.com/definition/spyware

https://www.malwarebytes.com/spyware/

https://www.paloaltonetworks.com/cyberpedia/what-is-spyware

Rootkits:

https://www.cynet.com/blog/a-guide-to-rootkit-detection-history-methods-and-
more/

https://www.adwebtech.com/a-detail-guide-on-rootkit/

https://www.veracode.com/security/rootkit

https://docs.microsoft.com/en-us/windows/security/threat-protection/
intelligence/rootkits-malware

https://www.google.com/url?
sa=t&rct=j&q=&esrc=s&source=web&cd=&cad=rja&uact=8&ved=2ahUKEwiAj7Pc7I_qAhWHF3IKHTJ
iC6YQFjAAegQIAxAB&url=https%3A%2F%2Ffanyv88.com%3A443%2Fhttp%2Findex-of.es%2FVarios-2%2FMalware%2C%2520Rootkits
%2520%26%2520Botnets%2520A%2520Beginner%2527s
%2520Guide.pdf&usg=AOvVaw1ggEQfggUXnMPjRAWN5pBd

https://www.google.com/url?
sa=t&rct=j&q=&esrc=s&source=web&cd=&cad=rja&uact=8&ved=2ahUKEwiAj7Pc7I_qAhWHF3IKHTJ
iC6YQFjABegQIAhAB&url=https%3A%2F%2Ffanyv88.com%3A443%2Fhttp%2Findex-of.es%2FHack%2Frootkit-
%2520Rootkits.for.Dummies%25202007.pdf&usg=AOvVaw2IRNmKHHN1BXe2nUYinhVF

NTFS Alternate Data Streams:

https://blog.malwarebytes.com/101/2015/07/introduction-to-alternate-data-
streams/

https://www.deepinstinct.com/2018/06/12/the-abuse-of-alternate-data-stream-
hasnt-disappeared/

https://www.2brightsparks.com/resources/articles/ntfs-alternate-data-stream-
ads.html

http://ntfs.com/ntfs-multiple.htm

Steganography:

https://www.edureka.co/blog/steganography-tutorial

https://null-byte.wonderhowto.com/how-to/guide-steganography-part-1-hide-
secret-messages-images-0130797/

https://www.barcodesinc.com/articles/guide-to-steganography.htm

https://www.cs.bham.ac.uk/~mdr/teaching/modules03/security/students/SS5/
Steganography.pdf
Covering Tracks:

https://www.dflabs.com/resources/blog/hacker-lifecycle-phase-5-covering-
tracks-incman-soars-elimination-mechanisms/

https://resources.infosecinstitute.com/penetration-testing-covering-tracks/
#gref

https://null-byte.wonderhowto.com/how-to/hack-like-pro-cover-your-tracks-
leave-no-trace-behind-target-system-0148123/

https://www.globalknowledge.com/ca-en/resources/resource-library/articles/
the-5-phases-of-hacking-covering-your-tracks/

You might also like