For this section, review the information from the chapter and try and expand on the topics; this will allow you to increase your knowledge of the different topics. To stimulate your thinking, try some of the following topics:
ACCEPT
, and practices different types of scans; see if you can successfully penetrate the iptables once it is enabled and set to DENY
versus ACCEPT
. An example of the default rules within the machine is shown in the following image:One other word; on this challenge, you have to gain root access to the machine, and then make the changes as required. While you probably can do this in the shell you have exploited, this would be a challenge, so you can add a user, start the service, and then connect to the machine. As with most things, there are a number of ways to do it, so enjoy!