This project demonstrates the offensive security skills I learned in UNCC's Bootcamp to attack a fictional organization, Rekall Corporation, to determine and exploit it's various web and server vulnerabilities. Timeline Day 1: Attempted to identify and exploit vulnerabilities on Rekall's web application. Day 2: Identified and exploited vulnerabilities on Rekall's Linux servers. Day 3: Identified and exploited vulnerabilities on Rekall's Windows servers. Security Tools/Techniques & Utilities Used Penetration testing methodology MITRE framework OSINT tools Metasploit/Meterpreter Vulnerability scanning with Nmap and Nessus Burp Suite Environments Used Rekall Web Application Azure Windows 10 VM Project Scenario Rekall Corporation is a fictional company that specializes in offering virtual reality experiences based on images that customers upload. These experiences could include dream vacations, adventures, or even secret missions. Rekall guarantees that these virtual reality experiences will feel real. Rekall is about to go live with their business, and they need penetration testers to find any vulnerabilities within their technical systems. Rekall has a brand new web application and several Windows and Linux servers that manage their businesses.
truebruiser / rekall-ctf Goto Github PK
View Code? Open in Web Editor NEWThis project demonstrates the offensive security skills I learned in UNCC's Bootcamp to attack a fictional organization, Rekall Corporation, to determine and exploit it's various web and server vulnerabilities.