Week 4 reflection - nataneliezer/tech-journal GitHub Wiki
This week we learned how to use different tools to compromise a system.
It is important to do thorough reconnaissance and complete each step prior to moving on. This is because each step will build off of the previous one and if parts are skipped or rushed it will make things more difficult later on. One of the most important steps is the recon and research phase. A penetration tester should be exploring all avenues that could lead to a compromised system.
This week we used Hydra to brakeforce an account with a provided password list and then gain administrator privileges by utilizing a kernel exploit.