Welcome to Red Team General! Here we discuss everything relating to offensive security, pentesting, social engineering and anything else you that might fit the bill!
1. Where to start?
If you’re new and looking to get started, feel free to post! If you’re looking for resources, there are a few listed below. Keep in mind that being a good sysadmin does not make you a good pentester. Everyone starts at zero!
2. Certifications
2.1. CEH - Certified Ethical Hacker
Good resume buff, not great for much else.
2.2 ECSA - EC-Council Certified Security Analyst
You’ll have to know what you’re doing, this one’s the next step from CEH.
2.3. LPT - Licensed Penetration Tester
This one’s more focused on documentation and ethics. Worth mentioning, but not super valuable. Builds on ECSA.
2.4. OSCP - Offensive Security Certified Professional
This is the one you want. 24 hours to own 5 systems and another 24 hours to write a detailed report. Not easy, very rewarding.
3. Resources
3.1. Guides/information
3.1.1. http://www.abatchy.com/2017/03/how-to-prepare-for-pwkoscp-noob
Zero to hero guide for OSCP. More of an outline, points you in the right direction.
3.1.2. http://niiconsulting.com/checkmate/2017/06/a-detail-guide-on-oscp-preparation-from-newbie-to-oscp/
Another OSCP outline.
3.1.3 https://www.cybrary.it/0p3n/prep-guide-offsecs-pwkoscp/
Cybrary is a good resource for all things IT. Free courses, not all that complete though.
3.2. Tools
3.2.1. Kali Linux
Your one stop shop for pentesting.
3.2.2 BackBox
Pentesting Distro, similar to Kali, haven’t personally used it.
3.2.3 Parrot
Security focused Linux distro, also provides a lot of pentesting/forensics tools.
3.2.4. Metasploit
Starting point for most noobs, swiss army knife, automates the hard stuff. Freemium model, community variant should be enough for anyone.
3.2.5. Burp Suite
Web Exploitation toolkit. Freemium model. Helps automate most things.
3.3. Youtube
3.3.1. IppSec - youtube
Walkthroughs of retired HTB vms.
3.3.2. Hak5 - youtube
They’re the ones behind the Rubber Ducky, Pineapple, Lan Turtle, Packet Squirrel and Bash Bunny. All this can be found at https://hakshop.com
3.3.3. LiveOverflow - youtube
Binary exploitation, web hacking, angular security.
3.4. Talks
3.4.1. Jason E Street
One of my favorites. This guy is the epitome of the plebian hacker. Talks in the spoiler.
3.5. CTFs
3.5.1. Hack The Box
Need to hack the invite code. Hard enough to keep the skids out.
3.5.2. Over The Wire Wargames
Simple CTF wargames. Recommended order:
- Bandit
- Natas
- Leviathan
- Narnia
- Behemoth
- Krypton
- Utumno
- Maze
- all the rest, doesn’t really matter.
3.5.3. VulnHub
Pre-broken images to have your fun with.
I recommend Mr Robot or any of the kioptix images, so far.
Found a good resource? @ me and I’ll add it to the OP!
Responsibility disclaimer: All this can add up to a person who’s able to do really bad things. Please only break into networks on which you’re authorized to do so. If we find out you’re breaking into networks or systems that you aren’t authorized for, you’ll be escorted off the premises by security.