0% found this document useful (0 votes)
26 views3 pages

Lab-00-Bad Habit

This document provides instructions for completing two parts of a lab on offensive security and reverse engineering. Part 1 has students check that their VM environments are configured correctly. Part 2 has them use SSH to login to a ThreatActor VM using Putty.

Uploaded by

oscar tebar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views3 pages

Lab-00-Bad Habit

This document provides instructions for completing two parts of a lab on offensive security and reverse engineering. Part 1 has students check that their VM environments are configured correctly. Part 2 has them use SSH to login to a ThreatActor VM using Putty.

Uploaded by

oscar tebar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

OFFENSIVE SECURITY & REVERSE ENGINEERING (OSRE) 2021

Getting Ready and Bad Habit

Objectives
In today’s hands-on labs, you will perform the following:
Part #1 – Double Check Lab Environment
Part #2 – Login to ThreatActor’s VM using SSH

Overview
This is our first lab of our series of the Offensive Security & Reverse Engineering course. We will
start by making sure we have all our VMs configured properly and then we will be testing our
connectivity to our Threat Actor’s box using SSH.

Requirements:
1. For this lab, you will need a working Windows 10 system and a Kali Linux system.
2. Access our lab here: <REMOVED>
3. The lab’s network map can be found here and the IP Addresses with Account Details can
be found here.
4. Use the file putty.exe file found in Lab_00_Bad_Habit.7z.
(password=OSREversion@Champ2021XOR). Please remember this password as it will be
used for all our labs.

© 2021 exploit.ashemery.com
1
OFFENSIVE SECURITY & REVERSE ENGINEERING (OSRE) 2021

Part #1 – Double Check Lab Environment


In this part of the lab you are required to make sure all of your systems (VMs) are
configured with the correct IP addresses.

Deliverable #1: Submit a screenshot of your VMs showing the correct IP address for each VM.

Part #2 – Login to ThreatActor’s VM using SSH


In this part of the lab we will make sure you are able to connect to your Kali Linux system,
which will be used as your ThreatActor’s VM. Extract putty.exe from the given 7zip file using the
password given and then double click on it.

Deliverable #2: Use putty.exe to connect to the IP Address of your ThreatActor VM. Now, reflect
back in your own words, what lesson did you learn and what should you do next time?

Need help?

© 2021 exploit.ashemery.com
2
OFFENSIVE SECURITY & REVERSE ENGINEERING (OSRE) 2021

If you get stuck at any stage, with any level, or you are facing a problem, don’t hesitate to ask
your instructor.

© 2021 exploit.ashemery.com
3

You might also like