Week 10
Week 10 marked the start of our final project, where we’ll apply everything we’ve learned so far in a real-world penetration testing scenario. The goal is to simulate a complete ethical hacking engagement over the course of four weeks.
Project Overview
-
Target:
server1.pentest.id
-
Start Date: May 10, 10:00 AM
-
Challenge: The target is protected by Cloudflare, which masks its real IP address using a reverse proxy.
Project Tasks
-
Identify the real IP hidden behind Cloudflare.
-
Exploit vulnerabilities using known or custom techniques.
-
Gain root access through privilege escalation.
-
Document the entire process through:
-
A 10-minute executive presentation
-
A detailed technical report (DOCX)
-
Important rules:
-
No DoS/DDoS attacks
-
You may clear logs and plant backdoors
-
System configurations must not be altered or patched
Lecture Recap: Vulnerability Research & Exploitation
In addition to launching the project, this week’s lecture revisited the importance of vulnerability research — a core skill in understanding how systems are attacked.
We reviewed skills and tools like:
-
Programming & reverse engineering (Python, C/C++, Assembly)
-
Debuggers, fuzzers, profilers, and memory monitors
-
Exploit databases and tools such as:
-
Exploit-DB
-
Metasploit Framework
-
Public PoC (proof of concept) scripts
-
Privilege Escalation Techniques
After gaining access, the next step is to escalate privileges. We studied:
-
Vertical escalation – e.g., going from a standard user to root
-
Horizontal escalation – accessing accounts or services with the same privilege level
Common techniques include:
-
Local exploits (like Dirty COW or Baron Samedit)
-
Weak or reused passwords
-
Misconfigured SSH keys or home directories
-
Credential harvesting via packet sniffing (Wireshark, tcpdump)
-
ARP spoofing for MITM attacks
We were also introduced to tools for both offline and online attacks:
-
Offline: John the Ripper, Hashcat, RainbowCrack
-
Online: Hydra, Medusa, CeWL
-
Sniffing/Spoofing: Ettercap, Dsniff, Arpspoof
Comments
Post a Comment