OFFENSIVE SECURITY & REVERSE ENGINEERING (OSRE) 2021
Getting Ready and Bad Habit
Objectives
In today’s hands-on labs, you will perform the following:
Part #1 – Double Check Lab Environment
Part #2 – Login to ThreatActor’s VM using SSH
Overview
This is our first lab of our series of the Offensive Security & Reverse Engineering course. We will
start by making sure we have all our VMs configured properly and then we will be testing our
connectivity to our Threat Actor’s box using SSH.
Requirements:
1. For this lab, you will need a working Windows 10 system and a Kali Linux system.
2. Access our lab here: <REMOVED>
3. The lab’s network map can be found here and the IP Addresses with Account Details can
be found here.
4. Use the file putty.exe file found in Lab_00_Bad_Habit.7z.
(password=OSREversion@Champ2021XOR). Please remember this password as it will be
used for all our labs.
© 2021 exploit.ashemery.com
1
OFFENSIVE SECURITY & REVERSE ENGINEERING (OSRE) 2021
Part #1 – Double Check Lab Environment
In this part of the lab you are required to make sure all of your systems (VMs) are
configured with the correct IP addresses.
Deliverable #1: Submit a screenshot of your VMs showing the correct IP address for each VM.
Part #2 – Login to ThreatActor’s VM using SSH
In this part of the lab we will make sure you are able to connect to your Kali Linux system,
which will be used as your ThreatActor’s VM. Extract putty.exe from the given 7zip file using the
password given and then double click on it.
Deliverable #2: Use putty.exe to connect to the IP Address of your ThreatActor VM. Now, reflect
back in your own words, what lesson did you learn and what should you do next time?
Need help?
© 2021 exploit.ashemery.com
2
OFFENSIVE SECURITY & REVERSE ENGINEERING (OSRE) 2021
If you get stuck at any stage, with any level, or you are facing a problem, don’t hesitate to ask
your instructor.
© 2021 exploit.ashemery.com
3