Local Operating System Exploitation Lab

In this lab you, will take advantage of the lack of disk encryption and exploit a local system. When the operating system is not encrypted, an attacker with physical access can leverage this to their advantage and gain access to your system using a number of freely available tools. Various tools such as Live DVDs or even the Windows recovery console can provide ways for the attacker to see the files you have on your system as well as download or upload malware and run it on your system.

Overview

In this lab you, will take advantage of the lack of disk encryption and exploit a local system. When the operating system is not encrypted, an attacker with physical access can leverage this to their advantage and gain access to your system using a number of freely available tools. Various tools such as Live DVDs or even the Windows recovery console can provide ways for the attacker to see the files you have on your system as well as download or upload malware and run it on your system.

Learning Partner
Infosec Learning
Infosec Learning
Infosec Learning provides businesses, colleges, governments, and K-12 school districts a feature rich information technology training and skill assessment service via an advanced, cloud based, virtual machine powered platform, capable of significant customization with unlimited scale and growth potential.