Skip to content

Commit 1acf943

Browse files
authored
added a note and the repo no longer being avaialable on the internet (#7329)
1 parent 6faa1d0 commit 1acf943

File tree

15 files changed

+59
-7
lines changed
  • docs/guides/security/vulnerabilities
    • hackersploit-note-shortguide
    • hackersploit-red-team-series
    • linux-defense-evasion-hiding-linux-processes
    • linux-red-team-defense-evasion-rootkits
    • linux-red-team-exploitation-techniques
    • linux-red-team-persistence-techniques
    • linux-red-team-privilege-escalation-techniques
    • red-team-adversary-emulation-with-caldera
    • red-team-reconnaissance-techniques
    • windows-red-team-credential-access-with-mimikatz
    • windows-red-team-defense-evasion-techniques
    • windows-red-team-exploitation-techniques
    • windows-red-team-lateral-movement-techniques
    • windows-red-team-persistence-techniques
    • windows-red-team-privilege-escalation-techniques

15 files changed

+59
-7
lines changed
Lines changed: 15 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,15 @@
1+
---
2+
slug: hackersploit-note-shortguide
3+
title: "HackerSploit Red Team Series Deprecated Note"
4+
description: "A note that instructs readers the original repository is no longer available on the internet."
5+
authors: ["Linode"]
6+
contributors: ["Linode"]
7+
published: 2025-09-01
8+
keywords: []
9+
license: '[CC BY-ND 4.0](https://creativecommons.org/licenses/by-nd/4.0)'
10+
headless: true
11+
show_on_rss_feed: false
12+
---
13+
{{< note type="note" >}}
14+
This series has been deprecated. The original repository is no longer available on the internet, and the link has been removed.
15+
{{< /note >}}

docs/guides/security/vulnerabilities/hackersploit-red-team-series/index.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,6 +8,7 @@ published: 2021-11-03
88
keywords: ['security']
99
tags: ['security']
1010
license: '[CC BY-ND 4.0](https://creativecommons.org/licenses/by-nd/4.0)'
11+
deprecated: true
1112
---
1213

1314
The rate of data breaches and APT attacks has been rapidly increasing during the period of COVID-19. Organizations are starting to recognize that their IT infrastructure has weaknesses and vulnerabilities, at great expense to their operations and customer data. For medium to large enterprise organizations, a defense-in-depth strategy that includes testing your defenses is required. This is where red teaming comes into play.

docs/guides/security/vulnerabilities/linux-defense-evasion-hiding-linux-processes/index.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,10 +8,13 @@ published: 2021-11-03
88
keywords: ['security']
99
tags: ['security']
1010
license: '[CC BY-ND 4.0](https://creativecommons.org/licenses/by-nd/4.0)'
11+
deprecated: true
1112
---
1213

1314
{{% content "hackersploit-red-team-series-note-shortguide" %}}
1415

16+
{{% content "hackersploit-note-shortguide" %}}
17+
1518
{{% content "hackersploit-caution-shortguide" %}}
1619

1720
## Before You Begin

docs/guides/security/vulnerabilities/linux-red-team-defense-evasion-rootkits/index.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,10 +8,13 @@ published: 2021-11-03
88
keywords: ['security']
99
tags: ['security']
1010
license: '[CC BY-ND 4.0](https://creativecommons.org/licenses/by-nd/4.0)'
11+
deprecated: true
1112
---
1213

1314
{{% content "hackersploit-red-team-series-note-shortguide" %}}
1415

16+
{{% content "hackersploit-note-shortguide" %}}
17+
1518
{{% content "hackersploit-caution-shortguide" %}}
1619

1720
## Before You Begin

docs/guides/security/vulnerabilities/linux-red-team-exploitation-techniques/index.md

Lines changed: 8 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -8,10 +8,13 @@ published: 2021-11-03
88
keywords: ['security']
99
tags: ['security']
1010
license: '[CC BY-ND 4.0](https://creativecommons.org/licenses/by-nd/4.0)'
11+
deprecated: true
1112
---
1213

1314
{{% content "hackersploit-red-team-series-note-shortguide" %}}
1415

16+
{{% content "hackersploit-note-shortguide" %}}
17+
1518
{{% content "hackersploit-caution-shortguide" %}}
1619

1720
## MITRE ATT&CK Exploitation and Initial Access Techniques
@@ -202,7 +205,7 @@ It is possible to use the Kali Linux GUI in VirtualBox to perform the instructio
202205

203206
## Port Scanning
204207

205-
The first step in the exploitation phase involves scanning the target server for open ports. The scan lists the services and their respective service versions running on the open ports. Port scanning was briefly explored in the [reconnaissance phase](/docs/guides/red-team-reconnaissance-techniques/). This section shows how to scan open ports and perform enumeration in more detail with the nmap tool.
208+
The first step in the exploitation phase involves scanning the target server for open ports. The scan lists the services and their respective service versions running on the open ports. This section shows how to scan open ports and perform enumeration in more detail with the nmap tool.
206209

207210
### Port Scanning with nmap
208211

@@ -276,7 +279,7 @@ Nmap done: 1 IP address (1 host up) scanned in 47.02 seconds
276279
| 111 | RPC |
277280
| 55995 | RPC |
278281

279-
We are also able to deduce from the service version banners that the target is running Debian. This information is relevant during the [privilege escalation phase](/docs/guides/linux-red-team-privilege-escalation-techniques/).
282+
We are also able to deduce from the service version banners that the target is running Debian.
280283

281284
## Web Server Enumeration
282285

@@ -561,8 +564,7 @@ The kernel version on the target system can be found by running:
561564

562565
uname -a
563566

564-
The output shows the target system is running an outdated kernel. This information is useful during the [privilege escalation phase](/docs/guides/linux-red-team-privilege-escalation-techniques/):
565-
567+
The output shows the target system is running an outdated kernel.
566568
{{< output >}}
567569
Linux Raven 3.16.0-6-amd64 #1 SMP Debian 3.16.57-2 (2018-07-14) x86_64 GNU/Linux
568570
{{< /output >}}
@@ -693,8 +695,7 @@ mysql>
693695

694696
We have now been able to obtain an initial foothold on the target system and take control of the MySQL database server. The next steps for targeting Linux systems include:
695697

696-
- [Elevating your privileges on the target system](/docs/guides/linux-red-team-privilege-escalation-techniques/)
698+
- Elevating your privileges on the target system
697699

698-
- [Establishing persistence to maintain access](/docs/guides/linux-red-team-persistence-techniques/)
700+
- Establishing persistence to maintain access
699701

700-
Visit the [HackerSploit Red Team parent page](/docs/guides/hackersploit-red-team-series/) to navigate to other parts of this guide series.

docs/guides/security/vulnerabilities/linux-red-team-persistence-techniques/index.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12,6 +12,8 @@ license: '[CC BY-ND 4.0](https://creativecommons.org/licenses/by-nd/4.0)'
1212

1313
{{% content "hackersploit-red-team-series-note-shortguide" %}}
1414

15+
{{% content "hackersploit-note-shortguide" %}}
16+
1517
{{% content "hackersploit-caution-shortguide" %}}
1618

1719
## Before You Begin

docs/guides/security/vulnerabilities/linux-red-team-privilege-escalation-techniques/index.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,10 +8,13 @@ published: 2021-11-03
88
keywords: ['security']
99
tags: ['security']
1010
license: '[CC BY-ND 4.0](https://creativecommons.org/licenses/by-nd/4.0)'
11+
deprecated: true
1112
---
1213

1314
{{% content "hackersploit-red-team-series-note-shortguide" %}}
1415

16+
{{% content "hackersploit-note-shortguide" %}}
17+
1518
{{% content "hackersploit-caution-shortguide" %}}
1619

1720
## Before You Begin

docs/guides/security/vulnerabilities/red-team-adversary-emulation-with-caldera/index.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10,10 +10,13 @@ tags: ['security']
1010
license: '[CC BY-ND 4.0](https://creativecommons.org/licenses/by-nd/4.0)'
1111
external_resources:
1212
- '[Official Caldera documentation](https://caldera.readthedocs.io/en/latest/index.html)'
13+
deprecated: true
1314
---
1415

1516
{{% content "hackersploit-red-team-series-note-shortguide" %}}
1617

18+
{{% content "hackersploit-note-shortguide" %}}
19+
1720
{{% content "hackersploit-caution-shortguide" %}}
1821

1922
CALDERA™ is a cybersecurity framework designed to easily automate adversary emulation, assist manual red-teams, and automate incident response.

docs/guides/security/vulnerabilities/red-team-reconnaissance-techniques/index.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,10 +8,13 @@ published: 2021-11-03
88
keywords: ['security']
99
tags: ['security']
1010
license: '[CC BY-ND 4.0](https://creativecommons.org/licenses/by-nd/4.0)'
11+
deprecated: true
1112
---
1213

1314
{{% content "hackersploit-red-team-series-note-shortguide" %}}
1415

16+
{{% content "hackersploit-note-shortguide" %}}
17+
1518
{{% content "hackersploit-caution-shortguide" %}}
1619

1720
## Before You Begin

docs/guides/security/vulnerabilities/windows-red-team-credential-access-with-mimikatz/index.md

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -8,10 +8,13 @@ published: 2021-11-03
88
keywords: ['security']
99
tags: ['security']
1010
license: '[CC BY-ND 4.0](https://creativecommons.org/licenses/by-nd/4.0)'
11+
deprecated: true
1112
---
1213

1314
{{% content "hackersploit-red-team-series-note-shortguide" %}}
1415

16+
{{% content "hackersploit-note-shortguide" %}}
17+
1518
{{% content "hackersploit-caution-shortguide" %}}
1619

1720
## Before You Begin

0 commit comments

Comments
 (0)