Difficulty
intermediate
Average duration
2 hrs
Technologies
cybersecurity
penetration testing
sql-injection
ssh
privilege-escalation
Difficulty
intermediate
Average duration
2 hrs
Technologies
cybersecurity
penetration testing
sql-injection
ssh
privilege-escalation
In this third phase of the pentest on the vulnerable machine The Lovers, you will move from enumeration to practical exploitation. Your goal is to leverage the information gathered in previous phases to gain access to the system, explore its resources, and escalate privileges until you achieve full control.
Analyze the login form
Obtain useful credentials
Access the target machine
Explore the system
Investigate your findings
Escalate privileges
Your PDF report must include:
Difficulty
intermediate
Average duration
2 hrs
Technologies
cybersecurity
penetration testing
sql-injection
ssh
privilege-escalation
Difficulty
intermediate
Average duration
2 hrs
Technologies
cybersecurity
penetration testing
sql-injection
ssh
privilege-escalation
Difficulty
intermediate
Average duration
2 hrs
Technologies
cybersecurity
penetration testing
sql-injection
ssh
privilege-escalation
Difficulty
intermediate
Average duration
2 hrs
Technologies
cybersecurity
penetration testing
sql-injection
ssh
privilege-escalation
Difficulty
intermediate
Average duration
2 hrs
Technologies
cybersecurity
penetration testing
sql-injection
ssh
privilege-escalation
Difficulty
intermediate
Average duration
2 hrs
Technologies
cybersecurity
penetration testing
sql-injection
ssh
privilege-escalation