Hacking

PWB Conclusions and the …

The results

As I posted previously, I was taking the PWB course from Offensive Security. I am happy to report that I passed with flying colors (100%)!

This is the best email I’ve ever received:

Advice for new students

During the course, I learned several things, including many things about …

Exploit Exercises - …

I was very excited to see the announcement on twitter, that Fusion was going to be released, even if it’s just the first 10 levels. I was a bit bummed, as I didn’t think I’d get to work on it much, until I complete PWB, but I managed to find a little time to at least start it. I …

PWB Progress and …

I recently decided to take Offensive Security’s course, Penetration Testing with Backtrack. I’m now 30 days in, of my 90 day allotment. I figured I would share my impressions and what I’ve learned up to now, without being specific enough to give anything away to future students. …

Using .net to bypass AV

I’ve read a ton of articles on bypassing Antivirus software when trying to run shellcode on machines. There’s just a ton available. These are just a few examples:

Kioptrix 4

I know there are a few different methods to the new Kioptrix 4 boot2root. Unfortunately, I could not find the remote root exploit that is mentioned, but my method used several tools, and privilege escalation.

Tools used:

To start out, I had to find the machine on the …

Exploit Exercises - …

The last in the Net series of Protostar is Net 3. It was of course the most difficult of all of them. However, it still wasn’t too bad.

First, we’re given the following code:

#include "../common/common.c"

#define NAME "net3"
#define UID 996
#define GID 996
#define …