{"id":67,"date":"2020-09-26T19:32:57","date_gmt":"2020-09-26T19:32:57","guid":{"rendered":"https:\/\/charlesmarrow.uk\/?page_id=67"},"modified":"2020-09-27T14:14:10","modified_gmt":"2020-09-27T14:14:10","slug":"vulnosv2","status":"publish","type":"page","link":"https:\/\/charlesmarrow.uk\/index.php\/pen-tests\/vulnosv2\/","title":{"rendered":"Pen-Test Walkthrough \u2013 VulnOSv2"},"content":{"rendered":"\n<p>VulnOSv2 is a purpose build Vulnerable VM specifically build with design flaws via remote access (RSH). Privilege levels are then escalated to gain admin rights.<\/p>\n\n\n\n<figure class=\"wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"VulnOSv2 Test#1 thru #4\" width=\"605\" height=\"340\" src=\"https:\/\/www.youtube.com\/embed\/82qUUZnQIrY?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Test#<\/strong><\/td><td><strong>Brief Test Vector Detail<\/strong><\/td><td><strong>Vulnerability<\/strong><\/td><\/tr><tr><td>1<\/td><td>Basic Network Service Scans<\/td><td>Several open ports are found to be vulnerable. Attacker can select attack method and exploit the machine further<\/td><\/tr><tr><td>2<\/td><td>Access found to the Admin area of the Web Application<\/td><td>Broken Access Control allows the attacker to access normally restricted administrative areas<\/td><\/tr><tr><td>3<\/td><td>SQLi is used to access the backend Data Base<\/td><td>Sensitive information can be retrieved, further access to the admin area exploited or indirect access to the Host machines Operating System could be established<\/td><\/tr><tr><td>4<\/td><td>Remote access login via RSH<\/td><td>Host compromise Through a Secure Shell (SSH) protocol enables an attacker to gain access to the Hosts Command line and Operating System<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<figure class=\"wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"VulnOSv2 Test#5\" width=\"605\" height=\"340\" src=\"https:\/\/www.youtube.com\/embed\/UJQU1nRGzT0?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td>T<strong>est#<\/strong><\/td><td><strong>Brief Test Vector Detail<\/strong><\/td><td><strong>Vulnerability<\/strong><\/td><\/tr><tr><td>5<\/td><td>Code is executed on the machine with standard privileges to escalate the privilege level<\/td><td>Once the privilege level of the machine has been escalated complete machine compromise is effective.<\/td><\/tr><\/tbody><\/table><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>VulnOSv2 is a purpose build Vulnerable VM specifically build with design flaws via remote access (RSH). Privilege levels are then escalated to gain admin rights. Test# Brief Test Vector Detail Vulnerability 1 Basic Network Service Scans Several open ports are &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"more-link\" href=\"https:\/\/charlesmarrow.uk\/index.php\/pen-tests\/vulnosv2\/\"> <span class=\"screen-reader-text\">Pen-Test Walkthrough \u2013 VulnOSv2<\/span> Read More &raquo;<\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"parent":123,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-67","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/charlesmarrow.uk\/index.php\/wp-json\/wp\/v2\/pages\/67","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/charlesmarrow.uk\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/charlesmarrow.uk\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/charlesmarrow.uk\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/charlesmarrow.uk\/index.php\/wp-json\/wp\/v2\/comments?post=67"}],"version-history":[{"count":4,"href":"https:\/\/charlesmarrow.uk\/index.php\/wp-json\/wp\/v2\/pages\/67\/revisions"}],"predecessor-version":[{"id":75,"href":"https:\/\/charlesmarrow.uk\/index.php\/wp-json\/wp\/v2\/pages\/67\/revisions\/75"}],"up":[{"embeddable":true,"href":"https:\/\/charlesmarrow.uk\/index.php\/wp-json\/wp\/v2\/pages\/123"}],"wp:attachment":[{"href":"https:\/\/charlesmarrow.uk\/index.php\/wp-json\/wp\/v2\/media?parent=67"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}