Challenge - Recreating an Attack

To discover a vulnerability and recreate an attack.

Scenario – As a forensic examiner, you have recreated an exploited box and want to determine what kind of exploit was used to compromise it.

Overview

Level – Easy/intermediate

Skills Needed – Enumeration, Linux command line, reading and understanding source code

Goal – To successfully recreate the exploit performed on the vulnerable machine.

Known Network(s) – N/A

Tools Used – ss, ls, less