Client side attack
*** There is a sound problem on video ***
You are a Penetration Tester and you’re asked to determine if the
corporate network is secure and if we are able to reach the servers
withing the DMZ.
The internal corporate network is divided in two
segments: the internal network where the employees machine reside and
the DMZ where there are company servers.
######## GOALS #############
1) Gain access to the internal network
2) Exploit and get a shell to a server within the DMZ
############WHAT YOU WILL LEARN ################
1) How to use Client-Side attacks
2) Pivoting
3) Fingerprint Hosts and Services though Pivoting
To guide you during the lab you will find different Tasks.
Tasks are meant for educational purposes and to show you the usage of
different tools and different methods to achieve the same goal.
They are not meant to be used as a methodology.
RECOMMENDED TOOLS
1)metasploit
2) nmap
3) proxychains
4) Mail client ( i.e. Thunderbird )
IMPORTANT N OTE
Labs machines (like web server and internal organization machines)
are not connected to the internet.
Κατηγορίες:
Σχόλια