You are on page 1of 7

Learn to hack - Enlace Hacktivista https://www.enlacehacktivista.org/index.

php/Learn_to_hack

Learn to hack
This page aims to compile high quality resources for hackers for both the experienced and inexperienced.
All books listed on this page can be found (https://libgen.lc) on Library Genesis (https://libgen.fun/).

Make sure that you follow good OPSEC when carrying out your operations! See OPSEC (https://enlaceh
acktivista.org/index.php?title=Learn_to_hack#Operational_security)

Contents
General Resources
General references
Recommended Reading - The Library
Operational security
Recommended Measures
Secure Messaging
Recommended Applications
Initial Access
Common Initial Access TTPs
Attacking Common Services
Scanning and Recon
Search Engines
OSINT
Persistence
Post exploitation
Windows
Linux
Exfiltration
Destruction
Hacking Misc
Web Application Hacking
API Hacking
IoT Hacking
Hacking The Cloud
Reverse Engineering
Product-specific Hacking
Google Workspace
VMware
Rocket.Chat
Microsoft Exchange

1 of 7 3/16/24, 07:43
Learn to hack - Enlace Hacktivista https://www.enlacehacktivista.org/index.php/Learn_to_hack

General Resources
Resources that assume little to no background knowledge:

▪ https://www.hoppersroppers.org/training.html
▪ https://tryhackme.com/

Resources that assume minimal tech background:

▪ (book) Penetration Testing: A Hands-On Introduction to Hacking


▪ Bassterlord Networking Manual (translated) (https://web.archive.org/web/20230531145531/
https://papers.vx-underground.org/papers/Malware%20Defense/Malware%20Analysis%202
021/2021-08-31%20-%20Bassterlord%20%28FishEye%29%20Networking%20Manual%2
0%28X%29.pdf) (Focuses on exploiting and hacking into networks via Forti SSL VPN (http
s://enlacehacktivista.org/index.php?title=Fortinet_SSL_VPN_Path_Traversal))
▪ Bassterlord Networking Manual v2.0 (translated) (https://web.archive.org/web/20230531144
434if_/https://cdn-151.anonfiles.com/vcD868ubz5/08a9b897-1685544763/BasterLord+-+Net
work+manual+v2.0.pdf) (Focuses on VPN brute forcing)
▪ Translated: Conti playbook (https://web.archive.org/web/20230404175503if_/https://cdn-15
0.anonfiles.com/satbX2i8z2/75a3be58-1680631481/Conti_playbook_translated.pdf)
▪ LockBit 3.0 CobaltStrike: LockBit 3.0 Guide (https://web.archive.org/web/20230701141731if
_/https://cdn-147.anonfiles.com/s1cbD0z3z3/4536e4f8-1688221595/LockBit-CobaltStrike.pd
f)

Resources that assume a tech or hacking background:

▪ (book) The Hacker Playbook 3


▪ Hack Back! A DIY Guide
▪ https://github.com/ForbiddenProgrammer/conti-pentester-guide-leak
▪ Flexispy Hack Back (https://enlacehacktivista.org/images/8/8f/Flexispy.txt)
▪ Liberty Counsel Hack Back (https://enlacehacktivista.org/libertycounsel.txt)
▪ Catalan Police Union Hack Back (https://youtu.be/kCLDqvDnGzA)
▪ https://book.hacktricks.xyz
▪ Pronico Hack Back (https://kolektiva.media/w/twJjCTkvumnugRy61BjD3T)
▪ https://github.com/Correia-jpv/fucking-the-book-of-secret-knowledge
▪ https://github.com/0xPugazh/One-Liners

The Bug Hunters Methodology:

▪ https://github.com/jhaddix/tbhm
▪ Application Analysis: https://youtu.be/FqnSAa2KmBI
▪ The Bug Hunter's Methodology v4.0: https://youtu.be/p4JgIu1mceI?si=jXcYksd4UqodZDBF

Practice labs:

▪ https://www.hackthebox.com
▪ https://academy.hackthebox.com
▪ https://www.pentesteracademy.com

2 of 7 3/16/24, 07:43
Learn to hack - Enlace Hacktivista https://www.enlacehacktivista.org/index.php/Learn_to_hack

▪ https://lab.pentestit.ru
▪ https://overthewire.org/wargames
▪ https://www.vulnhub.com/

Appsec:

▪ https://github.com/paragonie/awesome-appsec

Malware, a collection of malware source code and binaries:

▪ https://github.com/vxunderground/MalwareSourceCode
▪ https://github.com/ytisf/theZoo/tree/master/malware

General references

General resources you may find useful for learning.

See General References

OWASP Top 10 (https://owasp.org/www-project-top-ten/) is a broad consensus about the most critical


security risks to web applications. See TryHackMe's room (https://tryhackme.com/room/owasptop10) for
practical OWASP Top 10 learning and their Juice Shop (https://tryhackme.com/room/owaspjuiceshop).

Recommended Reading - The Library


See recommended reading books (https://libgen.fun) that will aid you in your learning. See recommended
reading in the library

▪ The Anarchist Library (https://theanarchistlibrary.org/special/index) (Tor (http://libraryqxxiqak


ubqv3dc2bend2koqsndbwox2johfywcatxie26bsad.onion/special/index))
▪ Phrack: http://phrack.org

Operational security
Operational security (OPSEC) is crucial for protecting oneself from surveillance and maintaining
anonymity while conducting hacktivist operations.

Recommended Measures

Any illegal hacktivity should be done from an encrypted and separate computer or virtual machine, with
all traffic router over Tor.

For more information on recommended operational security measures, see Opsec Measures

Secure Messaging

Best practice for secure messaging includes proxying connections over Tor and using end-to-end
encryption for messages.

3 of 7 3/16/24, 07:43
Learn to hack - Enlace Hacktivista https://www.enlacehacktivista.org/index.php/Learn_to_hack

Recommended Applications

For Jabber/XMPP, make sure to enable OTR or OMEMO encryption. For e-mail use PGP for encryption.
For file sharing use onionshare.

For more information on recommended applications, see Secure Messaging Applications

Initial Access
There are many ways to gain initial access (https://attack.mitre.org/tactics/TA0001/) into a targets
network, from phishing, buying credential access, buying infected machines in corporate networks,
password spraying, performing a targeted penetration test (https://www.ired.team/offensive-security-expe
riments/offensive-security-cheetsheets) and spray and pray scanning for vulnerabilities and hacking in.
Here we list some resources in these regards.

Common Initial Access TTPs

For more information on gaining a foothold, see Initial Access Tactics, techniques and procedures

Attacking Common Services

Your targets will likely use many services either externally or internally, this could be SSH, RDP, SMB,
etc. It's important to know their common misconfigurations, attack vectors, their attack surface and how
to hack these various protocols which may serve as the initial access vector. Here we cover various tools,
techniques, common misconfigurations, tips and tricks and we cover both internal and external (publicly
accessible) networks.

See Common Service Attacks

Scanning and Recon

For scanning and recon (https://attack.mitre.org/tactics/TA0043) tools, see Scanning and Recon. Make
sure to make use of your tool's documentation and read the help menu (-hh/-h/--help).

Search Engines

Search engines are a useful tool for gathering information and intelligence from publicly available
sources. Some are paid and some are free. Make sure to operate good OPSEC whenever placing a
purchase for any service that will be used in your recon on a target.

For more information on recommended search engines, see Search Engines Resources

OSINT

Open-source intelligence (OSINT) refers to the collection and analysis of information from publicly
available sources.

For more information on recommended tools and resources, see OSINT Tools and Resources

4 of 7 3/16/24, 07:43
Learn to hack - Enlace Hacktivista https://www.enlacehacktivista.org/index.php/Learn_to_hack

Persistence
Once you've found a weakness in your targets infrastructure and have been able to gain initial access (http
s://enlacehacktivista.org/index.php?title=Initial_Access_Tactics,_techniques_and_procedures) you'll want
to keep it and avoid detection to maintain your access to your targets network for as long as possible.

See Persistence.

Post exploitation

Windows

For Windows post exploitation, Active Directory and networking hacking, Lateral movement techniques,
privilege escalation, defensive and offensive techniques:

See Hacking Windows

Linux

For performing Linux post exploitation, gaining persistence, evading detection, privilege escalation and
more:

See Hacking Linux

Exfiltration
One of the main objectives for a hacktivist is that of exfiltrating data, company secrets and if your
motivations is that of revealing corruption then this step is of the most importance.

See Data Exfiltration for techniques and methods for exfiltrating data out of your targets network.

Destruction
There may be times during a hacktivist operation when you come to the end of your hack, you've fully
compromised your target, exfiltrated everything you can/want and now before finally leaving the network
and leaking all the targets secrets online you want to cause chaos and destruction. As was seen by
Guacamaya (https://kolektiva.media/w/twJjCTkvumnugRy61BjD3T) where they used
sdelete64.exe -accepteula -r -s C:\* to wipe systems attached to Pronicos domain you
might also want to do the same for Linux and Windows systems in your operations, maybe you want to
recursively print a text file with your manifesto across a system/network, encrypt files beyond recovery
or just delete everything.

See Chaos and Destruction for different ways to achieve this!

Hacking Misc

Web Application Hacking

5 of 7 3/16/24, 07:43
Learn to hack - Enlace Hacktivista https://www.enlacehacktivista.org/index.php/Learn_to_hack

See Hacking Web Applications

API Hacking

Application Programming Interfaces (APIs) are the plumbing of today’s financial services and FinTech
infrastructure, enabling FinTechs to embed banking into their apps and banks to offer a more unified
experience to their customers demanding more from their bank (Knight (https://web.archive.org/web/202
30713230449if_/https://cdn-153.anonfiles.com/a5Q8c02azf/b80f3b8b-1689290042/Scorched-Earth-Whit
epaper.pdf)). APIs can be exploited (https://owasp.org/www-project-api-security) to aid in data
exfiltration and taking advantage of an existing service.

See Hacking APIs!

IoT Hacking
▪ https://github.com/V33RU/IoTSecurity101

Hacking The Cloud

More and more of corporate networks are moving away from on-prem to in the cloud. Learning how to
hack the cloud infrastructure (https://hackingthe.cloud) of your target is a valuable skill and as time
progresses more and more networks will migrate towards the cloud.

See Cloud Hacking

Reverse Engineering

As was seen by Phineas Fisher (https://enlacehacktivista.org/index.php?title=Hack_Back!_A_DIY_Guid


e), highly motivated hacktivists who seek to hack their targets by any means necessary should consider
0-day research and exploit development, reverse engineering applications and services that their target
may be running to gain an initial foothold and perform post exploitation.

See Reverse Engineering

Product-specific Hacking

Google Workspace

https://www.slideshare.net/dafthack/ok-google-how-do-i-red-team-gsuite

VMware
▪ Exploiting vCenter to add vSphere user: https://github.com/HynekPetrak/HynekPetrak
/blob/master/take_over_vcenter_670.md
▪ VMware Workspace ONE Access and Identity Manager RCE via SSTI. CVE-2022-22954: (h
ttps://attackerkb.com/topics/BDXyTqY1ld/cve-2022-22954/rapid7-analysis) Unauthenticated
server-side template injection. Mass Exploit (https://github.com/tunelko/CVE-2022-22954-Po
C)

6 of 7 3/16/24, 07:43
Learn to hack - Enlace Hacktivista https://www.enlacehacktivista.org/index.php/Learn_to_hack

Rocket.Chat
▪ Account hijacking and RCE as admin: https://edbrsk.dev/content/real-cases/how-
I-compromised-300-stores-and-a-spanish-consultancy (https://web.archive.org/web/202108
05092939/https://edbrsk.dev/content/real-cases/how-I-compromised-300-stores-and-a-spani
sh-consultancy)

Microsoft Exchange

ProxyLogon is dead. It's mitigated by Defender. ProxyShell is not. AMSI catches unmodified public
exploits.

▪ ProxyShell: https://github.com/dmaasland/proxyshell-poc
▪ Improved proxyshell-poc: https://github.com/horizon3ai/proxyshell
▪ ProxyShell (webshell via New-MailboxExportRequest): https://github.com/rapid7/metasploit-
framework/blob/master/documentation/modules/exploit/windows
/http/exchange_proxyshell_rce.md
▪ ProxyShell (webshell via New-ExchangeCertificate): https://gist.github.com/dmaasland
/0720891aaf6dec8d3b42a5b92c8d6f94
▪ Polymorphic webshells: https://github.com/grCod/poly
▪ ProxyShell (no webshell, dump mailboxes via PowerShell): https://github.com/Jumbo-
WJB/Exchange_SSRF
▪ Proxylogon, proxyshell, proxyoracle and proxytoken full chain exploit tool: https://github.com
/FDlucifer/Proxy-Attackchain
▪ Automatic ProxyShell Exploit: https://github.com/Udyz/proxyshell-auto

Retrieved from "https://enlacehacktivista.org/index.php?title=Learn_to_hack&oldid=1702"

This page was last edited on 21 November 2023, at 22:37.

7 of 7 3/16/24, 07:43

You might also like