VMware

Vulnlab | Wutai: Initial Enumeration, Password Spraying

Vulnlab | Wutai: Initial Enumeration, Password Spraying & Getting Access via VDI

#Vulnlab #Wutai #Initial #Enumeration #Password #Spraying

“vulnlab”

This is part 1 of the Wutai series. From an unauthenticated perspective we enumerate the external perimeter & the internal network via an open squid proxy. We spray passwords to gain initial access to a VDI environment where we begin authenticated enumeration of the initial domain.[ Support &…

source

 

To see the full content, share this page by clicking one of the buttons below

Related Articles

9 Comments

  1. Great videos , xct can you clarify this for me, the process of getting the internal subnet. Did you scan the localhost after setting up the proxy via proxychains. Can you share any resources on this ?

  2. This video got recommended to me and I just checked out your platform, Are the boxes more 'real life' than other platforms? Im looking at making a career switch into Cyber Security and find I may have fallen into bad habits with CTF style machines.

  3. Great video man
    Keep up!

    But what I'd love to see is that when you say i.e. "I already have modified hostnames to automatically resolve" I actually want to see how did you modified that /etc/hosts file. This is just an example. I'd love you to not leave us behind any of your actions.
    But that's only my suggestion. Nevertheless, great video:)

Leave a Reply