Archive for category Vulnerabilities

Vulnerable systems setup

I frequently get asked how to set up a test lab to practice hacking on… So I looked through some release timelines and oldversion.com postings to figure out which versions of your favorite browser, plugins, and PDF reader would be installed if you had up-to-date versions of each on January 1st of the past three years, and where you can get them from. Enjoy.

No Comments

Malicious VM to Host Attacks

In The Hacker Games, a hostile VM is used as the target. It employs a few counterattacks among the included CTF-style challenges, so if you don’t want any spoilers, don’t keep reading!

No Comments

Black Hat DC Presentation

The materials in the presentation, including the exploits used, are downloadable here. Have fun counterattacking! Update: the actual slides are at http://www.scriptjunkie.us/files/counterattack.pdf and paper is at http://www.scriptjunkie.us/files/bhdc2011whitepaper.pdf.

, ,

No Comments