null Global Committee elections are coming up! See the election repository for more information.

B3b77c251676bac703c9080921f5fc78

Abstract

This Null Puliya session would walkthru the steps below which could be followed to find vulnerabilities, exploit these vulnerabilities and finally achieve system/ root.

Generally, we go through the following stages when solving a vulnerable machine:

  • Finding the IP address
  • Port Scanning
  • Rabbit Holes?
  • From Nothing to a Unprivileged Shell
  • Unprivileged Shell to Privileged Shell In this session, we will walk-thru, what can be done in each separate stage. Will provide Tips and Tricks for solving vulnerable VMs. Additionally Infrastructure PenTest Series : Part 2 - Vulnerability Analysis could be referred for exploitation of any particular services (i.e. it provides information such as “If you have identified service X (like ssh, Apache tomcat, JBoss, iscsi etc.), how they can be exploited”).

Requirement:
- Laptop with Virtual box and a vulnerable Machine (Any)
- Would suggest to have the vulnerable machine running on Host Only Interface, so that we can directly start.

Speaker

Vijay Kumar

Timing

Starts at Saturday April 28 2018, 10:10 AM. The sessions runs for about 6 hours.

Resources