Skip to content

Sk3llington/PenTesting-Vulnerability-Assessment-CTFs

Repository files navigation

Penetration Testing Walkthroughs

Linux Privilege Escalation

Kernel Exploits

Kernel Exploits Walkthrough

Web Applications

Command Injection / Brute Force / XSS Attacks

In this section, I go over a few techniques used to compromise web applications via command injection, brute force and XSS attacks. I also provide for each vulnerability exploited, mitigation recommendations to protect your system.

You can access the full report here: Web App Pentest

Fritzed Web Application Vulnerability Assessment

Fritzed is a newly acquired asset that includes the source code to a web application. The company was recently acquired by a competitor following a massive data breach. Fritzed had a reputation for insecure development practices, and Management would like to have a sense of how bad it is.

You can access the full report here: Web App Pentest

Reconnaissance

In this section, I go over techniques used by malicious actors to gather critial data used to compromise their targets.

You can access the full report here: Reconnaissance

Windows 10 | Icecast

In this section, I go over how I compromised a Windows 10 machine running "Icecast", a vulnerable free server software, and provide detailed recommendations to protect your system against each vulnerability exploited.

You can access the full report here: GoodSecurity Pentest Exercise

Purple Teaming

In this Purple Team exercise, I play the role of both the attacker and the defender.

You can access the full report here: Capstone Engagement

And the Executive Summary here: Executive Summary

About

Pentesting, Vulnerability Assessment, OSINT and Reporting.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published