Offensive Security Penetration Testing with Kali Linux Review

A review about the Offensive Security Penetration Testing with Kali Linux course and the related Offensive Security Certified Professional certification and exam.

Introduction

Offensive Security’s Penetration Testing with Kali Linux (PWK) course is one of the most recognized ethical hacking and penetration testing courses within the information security industry. It made a name for itself and did so for good reason.

VulnHub Write-Up Brainpan 1

How I obtained root access on the Brainpan 1 virtual machine from VulnHub.

Introduction

In this long post I write a Python exploit from scratch for the Brainpan 1 vulnerable by design virtual machine from VulnHub. The post is written in a follow along kind of way to document my own buffer overflow process and in an attempt help others to understand the subject along the way. If you want to try this challenge yourself it can be downloaded here.

Hack The Box Write-Up Legacy

How I obtained system access on the Legacy machine from Hack The Box.

Introduction

Hack The Box is an online platform that hosts virtual machines that are vulnerable by design to sharpen one’s penetration testing and security skills. While Legacy is an older machine there is still a lot to learn if the exploitation phase is attempted without the use of the Metasploit framework. The vulnerability on this machine is very well known and is often used to teach beginners the basics of penetration testing.

VulnHub Write-Up Kioptrix Level 5

How I obtained root access on the Kioptrix Level 5 virtual machine from VulnHub.

Introduction

A few weeks ago, I started the Kioptrix series of vulnerable by design virtual machines with the Kioptrix Level 1, Kioptrix Level 2, Kioptrix Level 3 and Kioptrix Level 4 challenges. In this post I focus on how I solved Kioptrix Level 5 which is, sadly the last machine in the series. If you want to try this challenge yourself it can be downloaded here.

VulnHub Write-Up Kioptrix Level 4

How I obtained root access on the Kioptrix Level 4 virtual machine from VulnHub.

Introduction

This post is a continuation of the Kioptrix series which I started a few weeks ago with the Kioptrix Level 1, Kioptrix Level 2 and Kioptrix Level 3 vulnerable by design virtual machines. In this post I focus on how I solved the Kioptrix Level 4 challenge. If you want to try this challenge yourself it can be downloaded here.

Pagination


Copyright © 2018-2019, Michael Thelen. All rights reserved.