Reader challenge

For this section, review the information from the chapter and try and expand on the topics; this will allow you to increase your knowledge of the different topics. To stimulate your thinking, try some of the following topics:

  • Oclhashcat: Research the tool, try and install it, and use the GPU-cracking power of the tool. An example of the tool being used is shown in the following image:
    Reader challenge
  • Kipotrix: There are a number of different versions available on the Kioptrix virtual machine. Download them and follow the process we have described in this chapter. Try and exploit the different levels. An example of the available Kioptrix machines is shown in the following image:
    Reader challenge
  • iptables: This enables the iptables within Kioptrix and changes the default rules from ACCEPT, and practices different types of scans; see if you can successfully penetrate the iptables once it is enabled and set to DENY versus ACCEPT. An example of the default rules within the machine is shown in the following image:
    Reader challenge

One other word; on this challenge, you have to gain root access to the machine, and then make the changes as required. While you probably can do this in the shell you have exploited, this would be a challenge, so you can add a user, start the service, and then connect to the machine. As with most things, there are a number of ways to do it, so enjoy!

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset