Difference between revisions of "Pinky's Palace: v1 ~ VulnHub - Walkthrough"
(Created page with "Coming soon!") |
m |
||
Line 1: | Line 1: | ||
− | + | == Objective == | |
+ | xxxxxxxxxxxxxxxxxxxxx | ||
+ | |||
+ | Source: [[https://www.vulnhub.com/xxxx xxxxxx]] | ||
+ | |||
+ | Status: [<span style="color:red">In Progress</span>] | ||
+ | |||
+ | == Methodology == | ||
+ | xxxxxx | ||
+ | <syntaxhighlight lang=shell-session highlight="" line> | ||
+ | xxxxx | ||
+ | </syntaxhighlight> | ||
+ | === Discovery === | ||
+ | <syntaxhighlight lang=shell-session highlight="" line> | ||
+ | xxxxx | ||
+ | </syntaxhighlight> | ||
+ | |||
+ | === Entry Point #1 - Port NN (XXX) === | ||
+ | ==== Enumeration ==== | ||
+ | <syntaxhighlight lang=shell-session highlight="" line> | ||
+ | xxxxx | ||
+ | </syntaxhighlight> | ||
+ | |||
+ | |||
+ | <syntaxhighlight lang=shell-session highlight="4" line> | ||
+ | xxxxx | ||
+ | </syntaxhighlight> | ||
+ | |||
+ | === Exploitation === | ||
+ | xxx | ||
+ | xxx | ||
+ | xxx | ||
+ | |||
+ | <syntaxhighlight lang=shell-session highlight="4,5,6,7" line> | ||
+ | xxx | ||
+ | xxx | ||
+ | </syntaxhighlight> | ||
+ | |||
+ | xxx | ||
+ | <syntaxhighlight lang=shell-session highlight="" line> | ||
+ | xxx | ||
+ | xxx | ||
+ | </syntaxhighlight> | ||
+ | |||
+ | |||
+ | == Final Notes == | ||
+ | xxx | ||
+ | == Appendix A: Vulnerability Detail and Mitigation == | ||
+ | {| class="wikitable" style="background-color:#cccccc;color:black;font-size:0.9em;width:80%;" | ||
+ | |+ style="color:#e76700;text-align:left;" | xxx | ||
+ | |- | ||
+ | |style="width:120px;" |Rating | ||
+ | |style="color:red;" | High | ||
+ | |- | ||
+ | |Description | ||
+ | |xxxx | ||
+ | |- | ||
+ | |Impact | ||
+ | |xxxxxxxxxxxxxxxxxxxxxxxxxxxx | ||
+ | |- | ||
+ | |Remediation | ||
+ | |xxxxxxxxxxxxxxxxx | ||
+ | |} |
Revision as of 14:05, 12 June 2018
Contents
Objective
xxxxxxxxxxxxxxxxxxxxx
Source: [xxxxxx]
Status: [In Progress]
Methodology
xxxxxx
xxxxx
Discovery
xxxxx
Entry Point #1 - Port NN (XXX)
Enumeration
xxxxx
xxxxx
Exploitation
xxx xxx xxx
xxx
xxx
xxx
xxx
xxx
Final Notes
xxx
Appendix A: Vulnerability Detail and Mitigation
Rating | High |
Description | xxxx |
Impact | xxxxxxxxxxxxxxxxxxxxxxxxxxxx |
Remediation | xxxxxxxxxxxxxxxxx |