Previously I talked about enumeration being the most important stage of any penetration test. Building on this, my opinion is that the next most important stage of a penetration test is post exploitation. Simply running an exploit and gaining access or a shell on a system can be valuable, but finding out what you can do … Continue reading OSCP Prep – Episode 10: Exploits (Part 2)
Month: August 2018
Cyberattack Simulator Workshop & Capture the Flag Challenge
During the week I had the opportunity to attend a 'Cyberattack Simulator Workshop' hosted by Trend Micro. The event was proposed as a way to learn about cyberattacks in the modern hybrid cloud environment, whilst competing in a series of Capture the Flag challenges with other local information security professionals. Each team consisted of 3 … Continue reading Cyberattack Simulator Workshop & Capture the Flag Challenge
OSCP Prep – Episode 9: Web App Attacks
This week, I decided to take a small detour and study web application testing before continuing to post exploitation techniques. Like any software, web applications may have a range of vulnerabilities when secure coding methods are not followed. Vulnerabilities in web applications are most commonly associated with improper input handling, allowing attackers to inject malicious … Continue reading OSCP Prep – Episode 9: Web App Attacks
OSCP Prep – Episode 8: Password Cracking
This was a fun chapter to study, learning about password and the methods that can be used to crack them. Although the awareness regarding the need for password strength appears to be increasing, there are still an overwhelming number of cases where weak passwords are used, or even a general lack of password policy in … Continue reading OSCP Prep – Episode 8: Password Cracking
OSCP Prep – Episode 7: Exploits (Part 1)
Finally, after studying a range of theoretical concepts and collecting even more information, I began to exploit my virtual machines. Some of the exploits are complicated whilst some are as simple of abusing default configuration passwords, but all exploits are dangerous in the wrong hands. This section about running the exploits almost exclusively uses vulnerabilities … Continue reading OSCP Prep – Episode 7: Exploits (Part 1)