June 19, 2022 | 21:00

INE Lab - Linux Remote Exploitation and Post Exploitation

The scenario is described as follows: In this lab environment, the user will access a Kali GUI instance. A vulnerable application can be accessed using the tools installed on Kali at http://demo.ine.local Objective: Exploit both the target and find all flags! demo.ine.local First, let’s see if we can find the IP address of our first target in the hosts file: root@INE:~# cat /etc/hosts | grep ine.local demo.ine.local Next, we take note that the eth1 interface is the route to the target: Read more

© Pavel Pi 2021

Powered by Hugo & Kiss'Em.