User: Password:
Create account Recover password

Support US
Donations this month: 0%

Goal : $ 120
Due: 30/09/2017


 

Get the latest updates
via email.


Search
Custom Search

Categories


Linuxtracker Swag

Recomended Reading


Download Free Books!

 


Sponsored Links

 


 





 


Torrent’s details
Name
SploitNet 2 - Pentest Challenge   
 
Torrent SploitNet 2 - Pentest Challenge

If you need a Bittorrent client, try TransmissionBT on MacOS or Linux

Forum /index.php?page=forum&action=viewtopic&topicid=13164
Magnet Link Magnet Link
Info Hash baecee537b82512abd39f9d77ad5c0b064d99bfc
Who thanks
Description https://www.defensepointsecurity.com/index.php/projects/sploitnet

Defense Point Security presents SploitNet: a multi-stage hacking puzzle for cyber security professionals to challenge themselves and each other.

SploitNet is a series of downloadable Virtual Machines (VM) designed to simulate a real-world attack scenario, where an attacker would have to compromise multiple systems to access the desired target. Designed by senior DPS security talent, SploitNet was created to teach hands-on penetration testing skills to computer security professionals who have an introductory to intermediate level of penetration testing experience.

Highlights:

A series of three exploitable Virtual Machines (VM)
Simulates a real-world attack scenario
Attackers must compromise multiple systems to access target data
Attacker will have to use the access obtained from the previous VM to compromise the next VM
Created to teach hands-on penetration testing skills to computer security professionals
Beginner to Intermediate level of experience
These VMs were created by some awesome people in DPS's Fellows program. Feel free to hit us up @defpointsec on twitter if you have comments and/or questions. DPS hopes you enjoy hacking these VM's as much as we have enjoyed creating them!

Who will be the first person in your organization to follow the breadcrumbs to victory?

Similar to the original SploitNet, the end goal of SploitNet 2 is to obtain access to the first (.200) VM and use it to pivot to the second and final (.201) VM. While there are only two VM's in this iteration of SploitNet, don't assume that this challenge will be simple. You will need to gain access to root on both of these VM's. To prove that you've completed the challenge, you'll need to obtain the MD5 hashes within the two files placed on each of the VM's.

- Exploit .200
-- Exploit .201
--- Collect key files from .200 & .201


SploitNet_200.zip - 55c470a9a4ca1e74d0462c067cb264d5
SploitNet_201.zip - e3d4aa535ab2014552c61874f53d7b8a

Credits
Jason Ashbaugh
Jonathan Cooper (bigc00p)
David Dalling
Jake Groth (@gphreakx)
Jeff Ferrell (@jeffxf)
Billy Meyers (@_hAxel)
Jonathan Naugle (SecDood)
Brad Poulton
Gabriel Pulgar (crackbard)
Duane Waddle (duckfez)

For More Information, visit Distrowatch

Screenshots
Category Other distros
Home Page
Support Forums
Rating
  • Currently 0.00/5
Rating: 0.0 out of 5.0 (Votes: 0) For your upload!

Size 1.56 GB
Show/Hide Files
2 files
AddDate 21/08/2017
Uploader hAxel
Speed 0 KB/sec
Down 13 times
peers seeds: 6, leechers: 0 = 6 peers
Report
Similar torrents
NameAddedSizeSeedersLeechers
SploitNet - Pentest Challenge21/08/20175.05 GB60


No comments...