UQ Cyber Squad 0x03 Shells

Introduction 0x03 Shells session presented by the UQ Cyber Squad. Access via OpenVPN connection. OpenVPN configuration bundle provided during the workshop. Challenge 1 - Family Binding Time - 10pts Let’s bind together at 192.168.57.11:8297 nc 192.168.57.11 8297iduid=1002(user) gid=1002(user) groups=1002(user)pwd/home/userls -lastotal 604 drwxr-xr-x 3 user user 4096 Mar 27 06:02 .4 drwxr-xr-x 4 root root 4096 Mar 24 02:13 ..4 -rw------- 1 user user 1584 Mar 26 01:26 .

Read More →

Metasploitable2 Walk-through

(This is an interim post and will be updated progressively. This notewill be removed once done.) This post extends the walk-though on the initial version ofMetasploitable athttp://nkush.blogspot.com.au/2011/09/metasploitable-walkthrough.html. Itshould be noted that some commands and output may have been truncatedfor the purposes of brevity. Set-upThe set-up included two machines in a virtual test environment usingVirtualBox. The first was a Metasploitable virtual machine (VM) and thesecond a Kali 1.

Read More →