![]() ![]() ![]() In my last corporate job, I created an intentionally vulnerable VM to assess the experience and technical level of applicants for a pentester job. Why I am choosing this topic? Because everybody has to start somewhere. It is addressed to anyone starting in InfoSec, whether you’re trying a first boot2root challenge or preparing for a job interview. If you’re a seasoned pentester/bug bounty hunter/CTFer, this blog post is clearly not for you. So this is a basic tutorial on how to “guess” the IP address of a downloaded virtual machine that has DHCP enabled. If you’re working on a challenge, vulnerable VM or CTF, you probably won’t know its IP address and won’t be able to get it with ifconfig because generally login credentials are not disclosed.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |