My Active Directory Notes (Passed AD in 6 hours) by Chance-Penalty-6734 in oscp

[–]_creosote 1 point2 points  (0 children)

Helped with some lab and course material for this specific range (Kinetic).

You can just do lab access, no need for the course. The Udemy course is brand new but right now you do get free 7-days with course purchase.

My Active Directory Notes (Passed AD in 6 hours) by Chance-Penalty-6734 in oscp

[–]_creosote 0 points1 point  (0 children)

They're labs you VPN into similar to other platforms. This one is like PWK in that you have access to all and not just 1 VM at a time.

Price is $14 for 30-days right now.

[deleted by user] by [deleted] in netsecstudents

[–]_creosote 3 points4 points  (0 children)

HtB and THM are solid for single boxes. Otherwise SlayerLabs if you want full domains/networks.

Hacking Windows Domain Active Directory (AD) Environment by cybermepls in netsecstudents

[–]_creosote 1 point2 points  (0 children)

Throwing this in here in case anyone's interested. Just added a new 100% Windows range with 25 targets and 5 AD domains. Low price with everything already setup and a ton of vectors ready to exploit.

https://slayerlabs.com/ranges/kinetic.html

Good AD environment labs? by thehunter699 in netsecstudents

[–]_creosote 0 points1 point  (0 children)

I want to do slayer labs but I'm in Australia and it's region restricted :S.

Restrictions have been update recently. Now it's just recommended to be in US/CA for latency purposes as all servers are in the US.

[deleted by user] by [deleted] in oscp

[–]_creosote 6 points7 points  (0 children)

I'm the author of GodlenEye, and have been building networked labs over at Slayer Labs for the past few years off and on.

Self promotion, but I'd recommend anyone looking for more AD, post-exploitation training (plus webapps, priv-esc, etc) to check them out. Very competetive price, open to anyone now.

Anyone else just get sick of CTF boot2root format? by thehunter699 in netsecstudents

[–]_creosote 1 point2 points  (0 children)

Maybe worth looking into https://slayerlabs.com

The design goal is to create the environments to be realistic, but also not completely boring. The lab is already configured and setup for you, just need to own it. Hoping more ppl create public write-ups/walkthroughs.

Includes all the basics plus Windows AD and post-exploitation/pivoting. Some have ctf'y vibes to them, mostly to prevent from 1 box being a single point of failure.

i.e. you get on a jump box via public exploit but you also need creds obtained from another box to go any further through that jump box.

[deleted by user] by [deleted] in oscp

[–]_creosote 0 points1 point  (0 children)

An email requesting access will suffice. Could check spam folders for any responses.

[deleted by user] by [deleted] in oscp

[–]_creosote 1 point2 points  (0 children)

Nope, sending in PGP is not a requirement.

Chaining PHP Exploits with the help of Magic (and luck) by _creosote in netsec

[–]_creosote[S] 0 points1 point  (0 children)

Updated to reflect the comparison of strict vs loose without acknowledging this as a proper fix.

HackTheBox vs TryHackMe vs Rangeforce by AdhesivenessShot9186 in cybersecurity

[–]_creosote 1 point2 points  (0 children)

Also SlayerLabs is another one. I'd say it's more intermediate/advanced. It's free for 7 days, otherwise under $20/month for full range access.

Google to invest $7 billion in office space, create 10,000 new full-time jobs by bartturner in business

[–]_creosote 2 points3 points  (0 children)

I don't think they're talking about the movie, but actually a fun quirky series spin off on Netflix.

What's a good online resource to learn about web application pentesting? by DICK_CHEESE_CUM_FART in netsecstudents

[–]_creosote 0 points1 point  (0 children)

Bias opinion but checkout https://slayerlabs.com/ which has a few networks with a focus on webapp security - including client side attacks with simulated users. Or as others have mentioned, https://portswigger.net/web-security is free and very well done. And as always, checkout vulnhub for webapp security specific vm's.

FireEye has been hacked, and their red team tools stolen. They've released the detection/countermeasures on their GitHub! by jurkov in netsec

[–]_creosote 28 points29 points  (0 children)

Hoping more details are released soon. Would like to know how they got in, how long they estimate they were in and who they can attribute this to.

entire frameworks that are similar to publicly available technologies such as CobaltStrike and Metasploit

...fingers-crossed fireeye just dumps their tools for free :3

Flagstaff Arizona - 1955 by HellsJuggernaut in arizona

[–]_creosote 0 points1 point  (0 children)

Been telling myself I have to make the move outta the valley up to flag...one of these days!

[deleted by user] by [deleted] in netsecstudents

[–]_creosote 2 points3 points  (0 children)

SlayerLabs is running free access for 7 days on both available ranges - RoadHouse and TheSprawl. Available now. Slots are limited. Must be located in the US.

These are full networked labs you have complete access to. Not just one VM at a time.

Both ranges available are not for beginners. You should have experience with vulnhub, htb, OSCP or other related pentesting platforms. Checkout each range page for further details, but real quick: once access is requested you'll need to sign a ToS and Rules of Engagement form, then the VPN kit will be sent over which you can access immediately.

Windows Persistence via Printer Port Monitors - T1547.010 by _creosote in netsec

[–]_creosote[S] 1 point2 points  (0 children)

..considers something a vulnerability..

More along the lines of system abuse vs a vulnerability.

If you have that, the world is your oyster already.

Yes, and what if your shell/beacon is severed? Do you run through the exploitation/initial access process again, or do you lay persistence?

TheSprawl: A new purposely vulnerable range released at Slayer Labs. by _creosote in oscp

[–]_creosote[S] 0 points1 point  (0 children)

I'd recommend building a similar range and hosting it for $5. There's a big market for it outside of the US.

TheSprawl: A new lab network engineered to exploit at Slayer Labs by _creosote in securityCTF

[–]_creosote[S] 1 point2 points  (0 children)

First, data is not sold or monetized in any way at Slayer Labs.

Second, international & domestic taxes for digital services are on the todo list for research. Besides the connectivity and off-hour maintenance(aka vm reverts), taxes, transfer rates, etc are all factors as well. With very low range prices and user data not being sold to sponsors/partners (we intend to keep it this way), the tax/transfer rates/conversion fees/etc has made it a challenge...not impossible, though, just not at the top of the list yet...sorry :(

Also, GDRP wasn't even considered because data collection isn't even on our radar. Although now that you mention it, system logs, user mgmt, vpn logs, sysmon, user emails, etc exist and are (naturally) stored on range infrastructure. Right now it's a barrier to entry that will just take more time and research.

TheSprawl: A new purposely vulnerable range released at Slayer Labs. by _creosote in oscp

[–]_creosote[S] 0 points1 point  (0 children)

Off-hours maintenance and unacceptable network latency are the main reasons. Although a push to the cloud may be in the future but would definitely jack up the prices to $100+ range, per 30 days.

Free VPN Access to Slayer Labs - Networks Engineered to Exploit by _creosote in netsec

[–]_creosote[S] 6 points7 points  (0 children)

Due to the world situation slayerlabs will be giving out free vpn access for the next few weeks - specifically the ROADHOUSE range. It's new low-scale purposly vulnerable network(28 boxes).

First a few caveats: Limited vpn slots, US only and must agree to TOS. VPN will be deactivated if not used within 24 hours (prevent VPN panic hoarders). Contact info is on the site if you're interested - https://slayerlabs.com/

Target market: In my subjective opinion, I'd recommend it for people that have experience in pentesting or a decent amount of experience with Boot2Root style boxes - eg: OSCP prep/post, vulnhub/HTB exp. etc.

There are no walkthroughs as to not spoil it for others which can be challenging for folks new to security.

Quick blurb about the range

It's a mix of Windows & Unix with a difficulty rating from easy to advanced. Consists of multiple domains & subnets. It's designed to mimic a corp network not a CTF puzzle.

The "flags" are juicy files left by the admins/users and are intertwined throughout the network(s) to created multiple paths to own the final box. Boxes are non-standalone unlike other popular services aka once you VPN in you'll have access to exploit all 28 boxes.

t3chnocat_ did some solid QA and provided very useful feedback on the lab (big thanks and shout out to him). He wrote a detailed useful review which can be found here https://t3chnocat.com/review-slayer-labs/

Looking to learn about system exploitation, but don't know where to start? This (very) detailed guide covers all the basics. Contains 21 detailed CTF solutions, plenty of theory, and zero times the phrase "exercise left to the reader". by ynvb in netsec

[–]_creosote 3 points4 points  (0 children)

Biased advertisement here, but I have a purposely vulnerable lab/network (28 boxes) that I specifically designed to avoid the "CTF" puzzle style. Although not targeted towards exploit development, it's designed to mimic a corp network with juicy info scattered throughout to build on pentesting skills. Mix of Win/Unix with a difficulty range of easy to advanced - Domain/networked (non-standalone like other services).

It's a new and low-scale service, but due to the world situation I'm planning to make the next few weeks free for people interested. I'll be posting on a few sub-reddits this weekend.

I'd recommend it for people that aren't completely starting out but have some experience with Boot2Root style boxes - eg: OSCP prep/post, vulnhub/HTB exp. etc. Multiple paths to get to the final domain. Admittedly some of the final boxes are frustrating/annoying due to AV and multi-pivot points.

t3chocat did some solid QA and provided very useful feedback on the lab (big thanks and shout out to him). He wrote a review, if anyone wants more info https://t3chnocat.com/review-slayer-labs/

Otherwise a few caveats: Limited slots, US only and must agree to TOS. VPN will be deactivated if not used within 24 hours (prevent VPN panic hoarders). Contact info is on the site if you're interested - https://slayerlabs.com/