Message from @Spooky Melon
Discord ID: 599382894682832896
Yeah it's testing for vulnerabilities on machines
ok
so what is the assignment
what is it *ur doin*
`testing for vulnerabilities` too vague
^
I have to exploit a web server and get the credentials on it as well as defacing the site hosted on the server
easy
Cybersecurity is vague lol
very easy
I highly suggest not doing your assignment on a network connected to the internet.
become fat
wear a polo
start balding
walk in and say you need to work on the server
The assignment is done in a VM lab created by the school
take it and go home
in short terms
you need to have absolutely no life 😛
also
Then you’re good. As a fellow major I’m sure you know that ISPs will report suspicious data transmission regardless of the reason
why are you the one trying to get into it
That literally is cyber security.
Part of knowing how to stop something is knowing how to get in.
Because to do penetration testing you have to show that a system is vulnerable
hmph
did they not teach you?
That's what they are doing
That's why I'm assigned the lab
then they should've taught you how :p
That's not how it works lol
You’re being quite obstinate Tim
ye
so you're trying to get gud? stackoverflow is probably where you should be lol
I'm just trying to do this assignment for now
@EndangeredProdigy what specifically are you tasked with doing? You weren’t given any sort of idea?
One sec I'll paste the instructions
all you've told us is "get in some server and get some credentials"
Objective
The objective of this scenario is to deface the corporate web server. In order to accomplish this objective, you need to complete a series of tasks designed to test your ability to enumerate and identify potential system and network vulnerabilities, exploit systems and/or networks based on vulnerability discoveries, recover system user credentials, use recovered credentials to pivot onto other information systems in the network(s) and establish a connection to deface the corporate web server.
Each task in this scenario builds upon the task before it. There may be a situation where a solution exists outside the proposed task methodology. You are NOT penalized for using a different solution – please use whatever means necessary to achieve the final objective – Deface the Web Server.
Scenario
You were recently hired for a Pentration Tester position. You are responsible for pentration testing information systems located in the Local Area Network (LAN) and the Demilitarized Zone (DMZ).
A new web server was recently installed in the DMZ and you are tasked with attempting to compromise this server as a simulated external (WAN/Internet) threat. For the purposes of this exercise you have access to a Kali Linux virtual machine.
Notes:
The IP address of the external router is 198.51.100.1/32.
The IP address of the corporate web server resides somewhere on the 120.38.48.0/24 network.