Feb. 23, 2024, 3:07 p.m. | OffSec

OffSec www.youtube.com

In this walkthrough of Astronaut, we demonstrated penetration testing techniques, highlighting the enumeration process, including using tools like Nmap for gathering information about the target's operating system and services.

Various cybersecurity topics were covered, such as binary exploitation, reverse engineering, and exploit development. We demoed vulnerability identification and exploitation, including using Python scripts for remote code execution. We emphasized the importance of understanding the type of vulnerability being exploited and concluded with successful exploitation, gaining root access, and discussing persistence …

astronaut binary binary exploitation code cybersecurity development engineering enumeration exploit exploitation exploit development gathering gathering information identification information live nmap offsec operating system penetration penetration testing process python python scripts remote code reverse reverse engineering scripts services system target techniques testing tools topics vulnerability vulnerability identification walkthrough

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Corporate Intern - Information Security (Year Round)

@ Associated Bank | US WI Remote

Senior Offensive Security Engineer

@ CoStar Group | US-DC Washington, DC