The walkthrough
Hopefully, you have been able to complete your testing before reading this portion of the chapter. It will contain examples and at least one method for an initial approach to breach the security of the virtual AspenMLC Development Lab running on our own network or machine. If your documentation or methodology to obtain the initial goal is different, than that is described within; it does not mean it is wrong, just different. With practice, penetration testers will develop their own methods, are tailored to their skill set and knowledge base.
Tip
There may be other methods to reach our goal than those described in this chapter. If you find other methods of compromising machines in the site network, congratulations are due! That is ...
Get Advanced Penetration Testing for Highly-Secured Environments - Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.