Forum Thread: DV-PI Assistance?

Have successfully created a Live USB with Kali Linux, and managed to get DV-PI's vulnerable services up and running. after a few nmap scans I am curious how to use the information gathered to exploit the system? this is my first penetration-test and I am a bit lost and do not want to get discouraged.

Our Best Hacking & Security Guides

New Null Byte posts — delivered straight to your inbox.

2 Responses

Enumerate, enumerate, and when you're sick of enumerating, do it some more. Read about the services that are available, read CVE's and PoC's. Use exploit-db. I did one recently where I couldn't seem to get a shell back because my usual tools were not installed on the victim machine (a linux machine without perl, python, or bash with TCP functionality).

For me, one of the best parts is once you get into the machine you can figure out why what you were trying wasn't working.

Did you manage to exploit the dv-pi? I'm struggling a bit aswell

Share Your Thoughts

  • Hot
  • Active