Skip to content
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Original file line number Diff line number Diff line change
@@ -0,0 +1,15 @@
---
slug: hackersploit-note-shortguide
title: "HackerSploit Red Team Series Deprecated Note"
description: "A note that instructs readers the original repository is no longer available on the internet."
authors: ["Linode"]
contributors: ["Linode"]
published: 2025-09-01
keywords: []
license: '[CC BY-ND 4.0](https://creativecommons.org/licenses/by-nd/4.0)'
headless: true
show_on_rss_feed: false
---
{{< note type="note" >}}
This series has been deprecated. The original repository is no longer available on the internet, and the link has been removed.
{{< /note >}}
Original file line number Diff line number Diff line change
Expand Up @@ -8,6 +8,7 @@ published: 2021-11-03
keywords: ['security']
tags: ['security']
license: '[CC BY-ND 4.0](https://creativecommons.org/licenses/by-nd/4.0)'
deprecated: true
---

The rate of data breaches and APT attacks has been rapidly increasing during the period of COVID-19. Organizations are starting to recognize that their IT infrastructure has weaknesses and vulnerabilities, at great expense to their operations and customer data. For medium to large enterprise organizations, a defense-in-depth strategy that includes testing your defenses is required. This is where red teaming comes into play.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,10 +8,13 @@ published: 2021-11-03
keywords: ['security']
tags: ['security']
license: '[CC BY-ND 4.0](https://creativecommons.org/licenses/by-nd/4.0)'
deprecated: true
---

{{% content "hackersploit-red-team-series-note-shortguide" %}}

{{% content "hackersploit-note-shortguide" %}}

{{% content "hackersploit-caution-shortguide" %}}

## Before You Begin
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,10 +8,13 @@ published: 2021-11-03
keywords: ['security']
tags: ['security']
license: '[CC BY-ND 4.0](https://creativecommons.org/licenses/by-nd/4.0)'
deprecated: true
---

{{% content "hackersploit-red-team-series-note-shortguide" %}}

{{% content "hackersploit-note-shortguide" %}}

{{% content "hackersploit-caution-shortguide" %}}

## Before You Begin
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,10 +8,13 @@ published: 2021-11-03
keywords: ['security']
tags: ['security']
license: '[CC BY-ND 4.0](https://creativecommons.org/licenses/by-nd/4.0)'
deprecated: true
---

{{% content "hackersploit-red-team-series-note-shortguide" %}}

{{% content "hackersploit-note-shortguide" %}}

{{% content "hackersploit-caution-shortguide" %}}

## MITRE ATT&CK Exploitation and Initial Access Techniques
Expand Down Expand Up @@ -202,7 +205,7 @@ It is possible to use the Kali Linux GUI in VirtualBox to perform the instructio

## Port Scanning

The first step in the exploitation phase involves scanning the target server for open ports. The scan lists the services and their respective service versions running on the open ports. Port scanning was briefly explored in the [reconnaissance phase](/docs/guides/red-team-reconnaissance-techniques/). This section shows how to scan open ports and perform enumeration in more detail with the nmap tool.
The first step in the exploitation phase involves scanning the target server for open ports. The scan lists the services and their respective service versions running on the open ports. This section shows how to scan open ports and perform enumeration in more detail with the nmap tool.

### Port Scanning with nmap

Expand Down Expand Up @@ -276,7 +279,7 @@ Nmap done: 1 IP address (1 host up) scanned in 47.02 seconds
| 111 | RPC |
| 55995 | RPC |

We are also able to deduce from the service version banners that the target is running Debian. This information is relevant during the [privilege escalation phase](/docs/guides/linux-red-team-privilege-escalation-techniques/).
We are also able to deduce from the service version banners that the target is running Debian.

## Web Server Enumeration

Expand Down Expand Up @@ -561,8 +564,7 @@ The kernel version on the target system can be found by running:

uname -a

The output shows the target system is running an outdated kernel. This information is useful during the [privilege escalation phase](/docs/guides/linux-red-team-privilege-escalation-techniques/):

The output shows the target system is running an outdated kernel.
{{< output >}}
Linux Raven 3.16.0-6-amd64 #1 SMP Debian 3.16.57-2 (2018-07-14) x86_64 GNU/Linux
{{< /output >}}
Expand Down Expand Up @@ -693,8 +695,7 @@ mysql>

We have now been able to obtain an initial foothold on the target system and take control of the MySQL database server. The next steps for targeting Linux systems include:

- [Elevating your privileges on the target system](/docs/guides/linux-red-team-privilege-escalation-techniques/)
- Elevating your privileges on the target system

- [Establishing persistence to maintain access](/docs/guides/linux-red-team-persistence-techniques/)
- Establishing persistence to maintain access

Visit the [HackerSploit Red Team parent page](/docs/guides/hackersploit-red-team-series/) to navigate to other parts of this guide series.
Original file line number Diff line number Diff line change
Expand Up @@ -12,6 +12,8 @@ license: '[CC BY-ND 4.0](https://creativecommons.org/licenses/by-nd/4.0)'

{{% content "hackersploit-red-team-series-note-shortguide" %}}

{{% content "hackersploit-note-shortguide" %}}

{{% content "hackersploit-caution-shortguide" %}}

## Before You Begin
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,10 +8,13 @@ published: 2021-11-03
keywords: ['security']
tags: ['security']
license: '[CC BY-ND 4.0](https://creativecommons.org/licenses/by-nd/4.0)'
deprecated: true
---

{{% content "hackersploit-red-team-series-note-shortguide" %}}

{{% content "hackersploit-note-shortguide" %}}

{{% content "hackersploit-caution-shortguide" %}}

## Before You Begin
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -10,10 +10,13 @@ tags: ['security']
license: '[CC BY-ND 4.0](https://creativecommons.org/licenses/by-nd/4.0)'
external_resources:
- '[Official Caldera documentation](https://caldera.readthedocs.io/en/latest/index.html)'
deprecated: true
---

{{% content "hackersploit-red-team-series-note-shortguide" %}}

{{% content "hackersploit-note-shortguide" %}}

{{% content "hackersploit-caution-shortguide" %}}

CALDERA™ is a cybersecurity framework designed to easily automate adversary emulation, assist manual red-teams, and automate incident response.
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,10 +8,13 @@ published: 2021-11-03
keywords: ['security']
tags: ['security']
license: '[CC BY-ND 4.0](https://creativecommons.org/licenses/by-nd/4.0)'
deprecated: true
---

{{% content "hackersploit-red-team-series-note-shortguide" %}}

{{% content "hackersploit-note-shortguide" %}}

{{% content "hackersploit-caution-shortguide" %}}

## Before You Begin
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,10 +8,13 @@ published: 2021-11-03
keywords: ['security']
tags: ['security']
license: '[CC BY-ND 4.0](https://creativecommons.org/licenses/by-nd/4.0)'
deprecated: true
---

{{% content "hackersploit-red-team-series-note-shortguide" %}}

{{% content "hackersploit-note-shortguide" %}}

{{% content "hackersploit-caution-shortguide" %}}

## Before You Begin
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,10 +8,13 @@ published: 2021-11-03
keywords: ['security']
tags: ['security']
license: '[CC BY-ND 4.0](https://creativecommons.org/licenses/by-nd/4.0)'
deprecated: true
---

{{% content "hackersploit-red-team-series-note-shortguide" %}}

{{% content "hackersploit-note-shortguide" %}}

{{% content "hackersploit-caution-shortguide" %}}

## Before You Begin
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,10 +8,13 @@ published: 2021-11-03
keywords: ['security']
tags: ['security']
license: '[CC BY-ND 4.0](https://creativecommons.org/licenses/by-nd/4.0)'
deprecated: true
---

{{% content "hackersploit-red-team-series-note-shortguide" %}}

{{% content "hackersploit-note-shortguide" %}}

{{% content "hackersploit-caution-shortguide" %}}

## Before You Begin
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,10 +8,13 @@ published: 2021-11-03
keywords: ['security']
tags: ['security']
license: '[CC BY-ND 4.0](https://creativecommons.org/licenses/by-nd/4.0)'
deprecated: true
---

{{% content "hackersploit-red-team-series-note-shortguide" %}}

{{% content "hackersploit-note-shortguide" %}}

{{% content "hackersploit-caution-shortguide" %}}

## Before You Begin
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,10 +8,13 @@ published: 2021-11-03
keywords: ['security']
tags: ['security']
license: '[CC BY-ND 4.0](https://creativecommons.org/licenses/by-nd/4.0)'
deprecated: true
---

{{% content "hackersploit-red-team-series-note-shortguide" %}}

{{% content "hackersploit-note-shortguide" %}}

{{% content "hackersploit-caution-shortguide" %}}

## Before You Begin
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -8,10 +8,13 @@ published: 2021-11-03
keywords: ['security']
tags: ['security']
license: '[CC BY-ND 4.0](https://creativecommons.org/licenses/by-nd/4.0)'
deprecated: true
---

{{% content "hackersploit-red-team-series-note-shortguide" %}}

{{% content "hackersploit-note-shortguide" %}}

{{% content "hackersploit-caution-shortguide" %}}

## Before You Begin
Expand Down