Quote:
Originally Posted by CpCosti
:/
|
It is quite simple to solve this problem. In general what you are searching for is called "DACL". You have to make sure , that your DACL is not affected by any AVS or XSS vulnerabilities. You can easily check this by using data carving and directory harvesting.
After authorizing your EVS and avoiding any kind of earwigging, you can move on to clickjacking your ECDSA-Device, which then will generate an encrypted key to get admin privilegs.
The next step is to flood the packet monkey with honey pots. You then may be able to hook the piggyback function and therefore grant anyone access to the OTP-Device. This device enables homomorphic encryption and makes sure you do not have to redo the 2FA.
After you have done all of these things, you can finally start spraying the heap purple, which finally will result in huge amount of penetration if handled correctly. Overall this ends in feeding the RATs and SATANs privacy related data.
However these techniques will enable you to enter Stuxnet-Mode and eventually solve the
"Unable to gat base adress" problem, because Tux will solve any kind or problem.
Maybe you should spoof a wabbit at the end, just to make sure every testcase was successful.
Edit:
Just found a great tutorial, may help you: