Pen-Testing Comps Wednesday, 31 January 2024 + General notes & questions - poster + (written XOR video) walkthrough - what I want - an interesting chain of vulnerabilities implemented in your VM - a walkthrough that includes - step-by-step story of how a hacker goes from just knowing the IP address to having a root shell - detailed, clear deeper dives into the mechanisms behind 1-3 of your vulnerabilities (super complex? 1 deep dive is enough; interesting but simple? do 2+ deeper dives) - a plausible story about how this VM might have gotten to be this way - from here on out: it's yours to craft the way you want it + Discussion - Observations about Draft 1 - What else is on your mind? - We're ready to roll. How do you want to proceed from here? + Next deadline? - ... + Maybe if time: how does this work? bash -c "/usr/bash -i ..."