
Today, November 25, 2016, a new, 10th penetration testing lab was launched in which information security experts from around the world will take part.
The laboratory represents a copy of a modern corporate network of a company engaged in the development of Security products.
')
Lab assignments
In the development of laboratories, current trends in the compromise of networks and systems, current vectors and attack scenarios are taken into account. Vulnerabilities that we lay in these systems were discovered during the “combat” penetration tests (we use them in an impersonal form) or were used by intruders.
In contrast to the CTF competitions, the tasks are not contrived. The laboratory is interconnected into a single structure and is the infrastructure of a modern company. The most important aspects are realism and relevance.
What awaits the participants
We offer everyone to test the strength of Global Data Security - a company that develops security solutions.
The company's specialists use modern systems and applications to develop their solutions, virtualization and automation systems. They value their code and apply various precautions to keep it safe, and also use protective mechanisms.
A participant acting as an external intruder needs to search for and exploit vulnerabilities.
- OWASP TOP 10;
- auth bypass;
- priviliege escalation;
- command injection;
- remote code execution;
- security rules / policies bypass;
- environment escaping;
- security through obscurity;
- protect bypassing.
The laboratory participants will step by step hack all the systems of the company, going beyond the limits of the possible.
Participate
Laboratories "Test lab" is a social project from the company Pentestit, created for the legal testing and consolidation of skills in the field of practical information security. Each new laboratory is unique, contains common vulnerabilities and configuration errors, participation is free.
We invite everyone to take part: the
website of the laboratory , a
group in the Telegram .