If you have not read the 1st Part then read it here. http://oxhat.blogspot.in/2018/01/sans-holiday-hack-2017-part-1.html So this part is all about exploiting machines.Each challenge will lead us to a page of the Great Book that will answer our questions to who was the actual culprit behind hurling those massive snowballs. 6) The North Pole engineering team has introduced an Elf as a Service (EaaS) platform to optimize resource allocation for mission-critical Christmas engineering projects at http://eaas.northpolechristmastown.com . Visit the system and retrieve instructions for accessing The Great Book page from C:\greatbook.txt . Then retrieve The Great Book PDF file by following those directions. What is the title of The Great Book page? We can find the about the IP of the internal host from the NMAP scan on the compromised machine from PART 2 of this series. nmap -PS80 -v 10.142.0.1/24 --open Let us connect to the Alabaster's system again using SSH followe
Web - Network - System - Mobile - Cloud - Automotive - Embedded - Internet Of Things (IOT)