Local Operating System Exploitation Lab
In this lab you, will take advantage of the lack of disk encryption and exploit a local system. When the operating system is not encrypted, an attacker with physical access can leverage this to their advantage and gain access to your system using a number of freely available tools. Various tools such as Live DVDs or even the Windows recovery console can provide ways for the attacker to see the files you have on your system as well as download or upload malware and run it on your system.

Overview
In this lab you, will take advantage of the lack of disk encryption and exploit a local system. When the operating system is not encrypted, an attacker with physical access can leverage this to their advantage and gain access to your system using a number of freely available tools. Various tools such as Live DVDs or even the Windows recovery console can provide ways for the attacker to see the files you have on your system as well as download or upload malware and run it on your system.

