General

  • Target

    OSCP NOTES ACTIVE DIRECTORY 1.pdf

  • Size

    1.9MB

  • MD5

    e97afabd236cb7b1b355bee105dd2467

  • SHA1

    57f9f50c8c0cd8d69a613218bea5b621d30cc4b5

  • SHA256

    69b1b6921d60a8cb52977b8d14c126df731166f47247a53ba1c13b1d6308bb42

  • SHA512

    2470af4f79d20cf632dcadf701c9328ee414f8a01b20ed00fc1d3cac68d7ab85edd3f4cc5f7f8f6f9540fd6343d9972b230b42fa1292a8f340d50befc4428725

  • SSDEEP

    49152:r1xENdwACkfiU1Er7PpO/bxGntI8TsV4oatO:p2N2X7UEtI8TsV4U

Score
4/10

Malware Config

Signatures

  • HTTP links in PDF interactive object 1 IoCs

    Detects HTTP links in interactive objects within PDF files.

  • One or more HTTP URLs in PDF identified

    Detects presence of HTTP links in PDF files.

Files

  • OSCP NOTES ACTIVE DIRECTORY 1.pdf
    .pdf
    • https://www.linkedin.com/in/joas-antonio-dos-santos

    • https://marmeus.com/post/OSCP-Review

    • https://medium.com/@0xP/oscp-2022-tips-to-help-you-pass-dddd3563967e

    • https://jaiguptanick.github.io/Blog/blog/OSCP_Cracking_New_Pattern_Walkthrough/

    • https://www.linkedin.com/pulse/oscp-tips-2022-lagarian-smith/?trk=articles_directory

    • https://dev.to/hackin7/my-oscp-experience-c9

    • https://github.com/robertdavidgraham/masscan

    • https://github.com/sense-of-security/ADRecon

    • https://github.com/outflanknl/Recon-AD

    • Show all