Wubi Posted September 2, 2012 Report Posted September 2, 2012 OverviewOur target system is Kioptrix 2.Kioptrix is a "Vulnerable-By-Design OS" which serves as a Pentest lab for security enthusiasts to legally try out their skills with the aim to completely compromise the machine.The video describes a step-by-step way of going about this.Steps * Discover network for hosts (Netdiscover) * Scan target network (Nmap) * Bypass login screen (MySQL Injection) * Set NetCat to listen on attack machine * Inject bash reverse shell. * Navigate to directory where apache user can write files (cd /tmp) * Search for Local privilege escalation exploit for linux kernel version 2.6 * Download exploit code and host it on attack machine * Use reverse shell to wget exploit code to Victim's machine * Compile exploit code and Execute. * Game OverRotimi Akinyele – The Infosec Shinobi- Rotimi Akinyele (Infosec Shinobi)Sursa YouTube Quote