HTB Machines for OSEP Preparation
Apr 27, 2023Red TeamDefense Evasion Share on:
HTB Machines for OSEP Preparation
List of HTB (Hack the Box) Machines to prepare for OSEP Exam (PEN-300) by offensive security.
3. Client Side Code Execution With Office 
| Attack Type | HTB Machine | Attack Used in HTB | Link | 
|---|---|---|---|
| Phishing with Microsoft Office: RTF Document | REEL | malicious RTF Document (CVE-2017-0199) | Walkthrough : https://youtube.com/watch?v=ob9SgtFm6_g&t=794  Tool: https://github.com/bhdresh/CVE-2017-0199  | 
| Phishing with Microsoft Office: LibreOffice | RE | LibreOffice Macro | Walkthrough : https://youtube.com/watch?v=ob9SgtFm6_g&t=794  Tool: <>  | 
| Phishing/Macro | REEL2 | Grab NTLMv2 with Malicious link | Walkthrough : https://youtube.com/watch?v=Ro2vXt_WFDQ&t=2350  Tool: <>  | 
| Phishing with Microsoft Office: LibreOffice | RABBIT | LibreOffice Macro | Walkthrough : https://youtube.com/watch?v=5nnJq_IWJog&t=1935  Tool: <>  | 
4. Client Side Code Execution With Windows Script Host 
| Attack Type | HTB Machine | Attack Used in HTB | Link | 
|---|---|---|---|
5. Process Injection and Migration 
| Attack Type | HTB Machine | Attack Used in HTB | Link | 
|---|---|---|---|
6. Introduction to Antivirus Evasion 
| Attack Type | HTB Machine | Attack Used in HTB | Link | 
|---|---|---|---|
| Obfuscating Macro | RE | Walkthrough : https://youtube.com/watch?v=YXAakamjO_I&t=1005 | 
7. Advanced Antivirus Evasion 
| Attack Type | HTB Machine | Attack Used in HTB | Link | 
|---|---|---|---|
| Amsi Bypass | APT | Walkthrough : https://youtube.com/watch?v=eRnqtXwCZVs&t=4650 | |
| Amsi Bypass | PivotAPI | Walkthrough : https://youtube.com/watch?v=eRnqtXwCZVs&t=4650 | |
| Amsi Bypass | MULTIMASTER | 
8. Application Whitelisting 
| Attack Type | HTB Machine | Attack Used in HTB | Link | 
|---|---|---|---|
| Applocker Bypass | REEL2 | Breaking out of ConstrainedLanguage Mode by creating a function | Walkthrough : https://youtube.com/watch?v=Ro2vXt_WFDQ&t=3600 | 
| Applocker Bypass | GIDDY | Escaping powershell constrained mode with PSBypassCLM | Walkthrough : https://youtube.com/watch?v=Ro2vXt_WFDQ&t=3600 | 
| Applocker Bypass | SEKHMET | intended way of bypassing applocker | Walkthrough : https://youtube.com/watch?v=vsgPsMZx59w&t=6300 | 
| Applocker Bypass | - | AppLocker Bypass COR Profiler | Walkthrough : https://youtube.com/watch?v=Ro2vXt_WFDQ&t=3600 | 
9. Bypassing Network Filters 
| Attack Type | HTB Machine | Attack Used in HTB | Link | 
|---|---|---|---|
10. Linux Post-Exploitation 
| Attack Type | HTB Machine | Attack Used in HTB | Link | 
|---|---|---|---|
11. Kiosk Breakouts 
| Attack Type | HTB Machine | Attack Used in HTB | Link | 
|---|---|---|---|
12. Windows Credentials 
| Attack Type | HTB Machine | Attack Used in HTB | Link | 
|---|---|---|---|
| Local Windows Credentials: LSASS Dump | ATOM | Using rundll32 to create a memory dump of LSASS | Walkthrough : https://youtube.com/watch?v=1OC2eRVX0ic&t=1830 | 
| Local Windows Credentials: LSASS Dump | BLACKFIELD | running pypykatz to extract credentials | Walkthrough : https://youtube.com/watch?v=1OC2eRVX0ic&t=1830 | 
| Local Windows Credentials: SAM Dump | BASTION | Extracting local passwords from SAM and SYSTEM with secretsdump | Walkthrough : https://youtube.com/watch?v=2j3FNp5pjQ4&t=660 | 
| Local Windows Credentials: LAPS | STREAMIO | Identifying and Extracting the LAPS Password | Walkthrough : https://youtube.com/watch?v=B9nozi1PrhY&t=11697 | 
| Local Windows Credentials: LAPS | PivotAPI | Discovering a user who can add groups to LAPS | Walkthrough : https://youtube.com/watch?v=FbTxPz_GA4o&t=5990 | 
| Access Tokens: UAC | ARKHAM | UAC Bypass | Walkthrough : https://youtube.com/watch?v=krC5j1Ab44I&t=3340 | 
| Access Tokens: SeImpersonate | SCRAMBLED | Abusing SeImpersonate Privilege | Walkthrough : https://youtube.com/watch?v=2j3FNp5pjQ4&t=660 | 
| Access Tokens: Incognito | HACKBACK | Using incognito to grab our impersonation token for HACKER user | Walkthrough : https://youtube.com/watch?v=B9nozi1PrhY&t=11697 | 
13. Windows Lateral Movement 
| Attack Type | HTB Machine | Attack Used in HTB | Link | 
|---|---|---|---|
14. Linux Lateral Movement 
| Attack Type | HTB Machine | Attack Used in HTB | Link | 
|---|---|---|---|
| DevOps | SEAL | Abusing ansible playbook | Walkthrough: https://www.youtube.com/watch?v=wCfztTcioU8&t=1260s | 
| DevOps | INJECT | Ansible enumeration and privilege escalation | Walkthrough: https://www.youtube.com/watch?v=3VuIaUvHsTI&t=1320s | 
| Kerberos on Linux | TENTACLE | Configuring our attacker’s box kerberos to connect to Tentacle’s KDC, and steal keytab | Walkthrough : https://youtube.com/watch?v=kKhuUXPmJ_o&t=3870 | 
| Kerberos on Linux | CERBERUS | examine the SSSD configuration and get a domain password | Walkthrough : https://www.youtube.com/watch?v=IX4h5aaSK1g&t=2160s | 
| Kerberos on Linux | SEKHMET | Dumping the sssd.ldb, Using kinit to get a kerberos ticket | Walkthrough : https://youtube.com/watch?v=kKhuUXPmJ_o&t=3870 | 
15. Microsoft SQL Server 
| Attack Type | HTB Machine | Attack Used in HTB | Link | 
|---|---|---|---|
| MS SQL in AD | ESCAPE | Using mssqlclient to login to access MSSQL | Walkthrough: https://youtube.com/watch?v=PS2duvVcjws&t=390 | 
| MS SQL Escalation | SCRAMBLED | enabling xp_cmdshell and getting a reverse shell | Walkthrough: https://youtube.com/watch?v=_8FE3JZIPfo&t=1000 | 
| MS SQL Escalation | STREAMIO | Using xp_dirtree to make the MSSQL database connect back to us and steal the hash | Walkthrough: https://youtube.com/watch?v=_8FE3JZIPfo&t=1000 | 
16. Active Directory Exploitation 
| Attack Type | HTB Machine | Attack Used in HTB | Link | 
|---|---|---|---|
| AD Object permission theory | REEL | Explaining Active Directory (AD) Security Objects (GenericWrite, WriteOwner,etc) | walkthrough: https://youtube.com/watch?v=ob9SgtFm6_g&t=3205 | 
| Abusing GenericAll | SUPPORT | Abusing GenericAll object permission | walkthrough: https://youtube.com/watch?v=iIveZ-raTTQ&t=970 | 
| Abusing GenericAll, WriteDACL | MULTIMASTER | Abusing GenericAll, WriteDACL | Walkthrough: https://youtube.com/watch?v=iwR746pfTEc&t=7410 | 
| Abusing GenericWrite, WriteDACL | REEL | Taking ownership and changing other user’s password | Walkthrough: https://youtube.com/watch?v=ob9SgtFm6_g&t=3503 | 
| Kerberos Delegation | PivotAPI | Unconstrained delegation with the SQL User. Upload rubeus, use tgtdeleg | Walkthrough: https://youtube.com/watch?v=FbTxPz_GA4o&t=7215 | 
| Kerberos Delegation | INTELLIGENCE | Unconstrained delegation | Walkthrough: https://secnigma.wordpress.com/2021/11/27/hack-the-box-intelligence/ | 
| Kerberos Delegation | SUPPORT | RBCD | walkthrough: https://youtube.com/watch?v=iIveZ-raTTQ&t=970  Post: https://pencer.io/ctf/ctf-htb-support/#rbcd  |