- Information
- AI Chat
Was this document helpful?
Basic Pentesting 1 Walkthrough
Course: Computer and Network Security (ECC4703)
68 Documents
Students shared 68 documents in this course
University: Universiti Putra Malaysia
Was this document helpful?
Lab - Basic Pentesting: 1 CTF Walkthrough
This small boot2root VM contains multiple remote vulnerabilities and multiple privilege
escalation vectors. The validation for this walkthrough used VirtualBox, which is the
recommended platform. It may also work with VMware.
Hardware Requirements
Installation of VirtualBox
One virtual install of Kali Linux
One virtual install of the Basic Pentesting OVA file which can be downloaded from here.
Ensure the network adapter for both machines to set to either bridged or NAT.
This VM will not boot until you go into the settings and disable the USB controller.
This CTF is specifically intended for those new to penetration testing. If you’re a beginner, you
should hopefully find the difficulty of the VM to be just right.
Your goal is to attack this VM and gain root privileges remotely.
Organization
1
© 2018 syberoffense.com All Rights Reserved