Red Team Notes
1.0.0
1.0.0
  • Introduction
  • PowerShell
    • find_files_by_name
    • powershell_web_access
    • enable_psremoting
    • powershell_sans_cheat
    • powerup_-_privilege_escalation
    • user_enumeration
    • powershell_-_quickies
    • constrained_language_breakout
    • powershell_-_get-system
    • domain_enumeration
    • powershell
    • random_powershell
  • mainframe
    • tso_commands
    • nmap_stuff_-_recon
  • Links and Random
    • Commands--mount-shares
    • Commands--responder
    • Commands--nac_testing
    • trash
    • Commands--nessus-openvas
    • Commands--named_pipes
    • ptx
    • Commands--mortar-shells
    • Redis-Cheatsheet
    • wifi_driver_stuff
    • bypassing_applocker_living_off_land
    • Commands--remote_and_local_file_inclusion
    • Commands--netcat-ftp
    • mimikatz
  • wifi-hacking
    • eaphammer
    • aircrack-ng_and_jtr_attack
    • new_page
    • cracking_wpa_attack
    • aircrack-ng
    • wifite
    • basics
    • hostapd
    • cowpatty_attack
    • rogue_access_point
    • cracking_wep_via_a_client_attack
    • handshake-via-pcap
    • clientless_wep_attack
    • fluxion
    • reaver
    • crack_wep
    • pyrit_attack
    • wep_shared_key_authentication_attack
  • mobile
    • qark
    • dex2jar
    • jd-gui
    • mobile
    • baby_steps
    • apktool
    • smali_and_baksmali
  • Cobalt-Strike
    • apache_rewrite_.htaccess
    • playbook
      • mail_and_smtp_enumeration-manipulation
      • lateral_movement
      • overpass_the_hash_with_rubeus-beacon_-_h
      • persistence
      • privilege_escalation
      • after_initial_access
    • situational_awareness_-_harmj0y
    • malleable
    • sid_hopping
    • generating_certificates
    • safety
    • random_commands
    • golden_ticket
    • go_daddy_domain
    • github_repos
    • malware_av_evasion
    • malware_av_evasion--main.go
    • c2_infrastructure
    • cobalt_strike_certificates
    • cpl_resource_runner_payload
  • Metasploit
    • nessus
    • network
    • meterpreter
  • Information Gathering Enumeration
    • 35 Searchsploit
    • 30 Find
    • 21 WinRM
    • 50 Gobuster
    • Enumeration by Port Number
    • 40 Active Directory
    • Linux Prevesc
    • pivoting
    • 20 Reconnoitre
    • Kerberos cheatsheet
    • 11 SMB Part 1
    • 00 ENUMERATION
    • 10 Nmap
    • 12-check-for-anonymous-smb
    • bruteforcing
    • 60 DNS Enumeration
    • 15 Firefox
  • Commands
    • rbash
    • tools-sources
    • tar
    • network-change-ip
    • sed_and_changing_files_for_malware_evasi
    • web_discovery
    • xxd
    • droopescan
    • c#
    • proxychains-admin-network
    • de-duplicate
    • privilege-escalation-windows_-_and_empir
    • ping_sweep
    • wget
    • snmp
    • custom-payloads
    • python
    • curl-wget
    • proxychains
    • goddi_-_domain_enumeration
    • nginx-bypass
    • outlook_and_owa
    • physical_hacking--rasperry_pi
    • have_a_shell
    • xml-xxe-xpath
    • xss-iframe
    • port-forward
    • physical_hacking
    • pack
    • client-side-iframe-attack
    • waf
    • laps
    • images-with-files-in-them
    • fresh-install
    • privilege-escalation-linux
    • masscan
    • arp-spoof
    • shellshock-squid
    • merlin
    • redis
    • get-browserdata
    • lateral_movement
    • smb-netbios-rpc
    • password-cracking
    • virtual-box_guest_additions
    • host_discovery-dns
    • certificate_tls_and_ssl
    • postgresql
    • physical_hacking--bash_bunny
    • powerview--new_page
    • mail_sniper
    • searchsploit
    • crackmapexec
    • user_agent
    • lolbins
    • files-inside-of-pictures
    • random_shellcode_-_scratch-pad
    • linux
    • ports
    • block-ip-iptables
    • httpscreenshot
    • dnscat
    • wp-scan
    • gather-gpp-creds
    • group-policy-decrypt-passwords
    • buffer-overflow
    • mac_address_change
    • sql
    • compiling-code
    • shell-for-buffer-overflow
    • hex_encode_command_line
    • spawn_a_better_shell_-_break_out_of_shit
    • nikto-proxy
    • osint
    • assembly
    • sshuttle
    • nmap_and_scanning
    • root_user_add
    • pass_the_hash
    • test-for-xxe
    • payloads
    • webdav
    • cut_commands
    • unicorn_scan
    • rdesktop_and_screen_for_linux
    • spooler_exploit
    • dns-zone-transfer
    • ssh
    • password-grep
  • reverse-shell-one-liners
    • ruby
    • c-language-reverse-shell
    • reverse_shell_one_liners
    • perl-reverse-shell-cgi-format
    • java_reverse_shell
    • python_reverse_shell
  • Bypass-Applocker
    • vbs_macro
    • pubprn.vbs
    • demiguise
    • mshta
    • regsvcs
    • regasm_2
    • bypass-uac
    • installutil
  • windows
    • uninstall_patches
    • passwords
    • powerview_3.0,_harmj0y
    • port_forward
    • powerview_acl_enum-abuse
    • powerview,_enumerate_groups-ac
    • search_4_loot
    • firewall
    • laps_abuse
    • enumeration
    • Windows
    • Windows_service_abuse
    • Windows Enumeration
  • mimikatz
    • mimikatz_list_modules
    • list_commands_in_module
    • mimikatz
    • remote_control_rpc
    • applocker_bypass_and_other_sn
    • mimikatz_-_start_and_stop_processes
    • base64_all_the_things
    • rdp
    • avoid_new_events
    • mimikatz_-_tokens
  • red-team
    • privilege_escalation_across_trusts
    • file_servers_and_files
    • lateral_movement
    • Commands--red_team
    • forest_enumeration
    • persistence_techniques
    • privilege_escalation
  • Start Procedure
    • Start-Procedure
  • Tools to add to Kali Linux
  • AD-notes
    • more-ad-notes
    • bloodhound
    • ad-notes-chirag
    • enumeration
    • pam_abuse
    • laps_abuse
    • domain_privilege_escalation
    • active_directory_one_liners
  • Setting up Kali Linux
    • Tools to add to Kali Linux
    • Items to Install in Kali
      • tmux
        • tmux_config
        • Setup_-_TMUX
        • tmux_cheat_sheet
      • crontab
      • rclone
      • Items_to_install_in_Kali
    • Tools to install
  • SQL
    • abusing_sql_server_trusts--privilege_escalation
    • abusing_sql_server_trusts
    • abusing_sql_server_trusts--post_exploitation_enumeration
    • 31 SQL
  • tools to install
  • command line
  • simple note
  • Enumeration
  • Tools to install on Windows
  • temp-readme
Powered by GitBook
On this page
  • apt install
  • to the bottom

Was this helpful?

  1. Setting up Kali Linux
  2. Items to Install in Kali

Items_to_install_in_Kali

ITEMS TO INSTALL IN KALI

apt install

updatedb apt search xxxxxx

Update Kali Linux

apt update
apt list --upgradeable
apt upgrade

apt dist-upgrade
searchsploit -u
Sublimetext

    wget -qO - https://download.sublimetext.com/sublimehq-pub.gpg | sudo apt-key add -

    sudo apt-get install apt-transport-https

    echo "deb https://download.sublimetext.com/ apt/stable/" | sudo tee /etc/apt/sources.list.d/sublime-text.list

    sudo apt-get update
    sudo apt-get install sublime-text

    In SublimeText

        1.  Type control+shift+p top open the Command Palette.
        2.  Start typing "install".
        3   Select the command "Package Control: Install" and press enter.
        4.  After a moment, the Command Palette will be filled with package names.
        5.  Start typing the name of the package you want to install, or a keyword such as "markdown" to list all packages with the keyword in their names.
        6.  Select the package you want (with the arrow keys), press enter, and the package will be downloaded and installed.
                Markdown Extended
                Markdown Preview
                Markdown Editing

        7.  Close and restart Sublime Text for the newly installed package to be activated.


golang

    apt install golang

    mkdir -p ~/go/{pkg,bin,src}

    nano ~/.profile

        add

            export GOPATH="$HOME/go"
            export GOBIN="$GOPATH"/bin"
            export PATH="$PATH:$GOBIN"


            exit and save then type
            ~/.profile     


go get -v -u github.com/zricethezav/gitleaks

gobuster

    git clone https://github.com/OJ/gobuster.git
    go build



Python3

    apt install python3-dev python3-pip

    pip3 install truffleHog
    pip3 install jwt
    pip3 install pyjwt
    pip3 install hexdump


Microsoft Access database tools

        apt install mdbtools

Tools for reading Microsoft Outlook PST files

    apt install pst-utils


Crackmapexec

    apt install crackmapexec

    apt install rlwrap



Impacket 

    cd /opt/
    git clone https://github.com/SecureAuthCorp/impacket



Kerbrute

    cd /opt/
    git clone https://github.com/ropnop/kerbrute



BloodHound

    cd /opt/
    rm -rf BloodHound

    git clone https://github.com/BloodHoundAD/BloodHound.git

    cd/opt/BloodHound

        wget https://github.com/BloodHoundAD/BloodHound/releases/download/3.0.3/BloodHound-linux-x64.zip
        unzip BloodHound-linux-x64.zip



PowerSploit

    cd /opt/
    git clone https://github.com/PowerShellMafia/PowerSploit/ -b dev



mimitatz

    cd /opt/
    git clone https://github.com/gentilkiwi/mimikatz



PDFMiner

    cd /opt/
    git clone https://github.com/pdfminer/pdfminer.six
    pip install pdfminer.six



dotdotpwn

    cd /opt/
    git clone https://github.com/wireghoul/dotdotpwn



ciscot7

    cd /opt/
    git clone https://github.com/theevilbit/ciscot7.git



evil-winrm

    cd /opt/
    git clone https://github.com/Hackplayers/evil-winrm
    cd /evil-winrm
        gem install evil-winrm
        pip3 install donut-shellcode


Padbuster

    cd /opt/
    apt install padbuster


zip7

    cd /opt/
    apt install python3-venv p7zip-full -y


usbrip

    cd /opt/
    git clone https://github.com/snovvcrash/usbrip.git usbrip && cd usbrip    



rclone

    apt install rclone



JAWS

    git clone https://github.com/411Hall/JAWS.git



privilege-escalation-awesome-scripts-suite

    git clone https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite



ffuf

    git clone https://github.com/ffuf/ffuf



PSPY

    git clone https://github.com/DominicBreuker/pspy.git



lxc / lxd

    git clone https://github.com/lxc/lxd.git


PRET

    git clone https://github.com/RUB-NDS/PRET.git


exiftool

    git clone https://github.com/exiftool/exiftool.git

    sudo perl Makefile.PL
    sudo make
    sudo make test
    sudo make install
vpn
openvpn --config dystopian.ovpn



crontab



```bash
etc/hosts


# Hack the Box machines
10.10.10.29     bank.htb
# 10.10.10.100  active.htb htb
# 10.10.10.160  Postman
# 10.10.10.161  htb.local htb 
# 10.10.10.162  staging-order.mango.htb
# 10.10.10.168  obscurity.htb
# 10.10.10.172  megabank.local
# 10.10.10.177  oouch.htb consumer.oouch.htb authorization.oouch.htb
# 10.10.10.179  megacorp.htb
# 10.10.10.180  remote.htb
# 10.10.10.183  forwardslash.htb
# 10.10.10.186  quick.htb portal.quick.htb


# Vulnhub machines
# 192.168.1.86  kioptrix3.com
# 192.168.1.87  gfriEND.lan

If you really don’t care about security, and if you preferred the old model, you can install kali-grant-root and run dpkg-reconfigure kali-grant-root to configure password-less root rights.

sudo su (enter you password)

dpkg-reconfigure kali-grant-root (choose top option)

sudo su (we don't need password for root. close terminal and reopen it)

next edit .bashrc for the user and add

sudo su

to the bottom

this will set up root.

sudo -i
(enter you password)

whoami
(this should return root)

(now change the password for root)
passwd root
(now type the password)

PS1='[\033[1;31m]\u@\h[\033[1;34m]\w:[\033[0;37m]$

PreviousrcloneNextTools to install

Last updated 3 years ago

Was this helpful?

cd /opt/ git clone

https://github.com/DominicBreuker/pspylo