{"id":349,"date":"2012-09-01T16:49:55","date_gmt":"2012-09-01T22:49:55","guid":{"rendered":"http:\/\/dc612.org\/?p=349"},"modified":"2012-09-01T16:49:55","modified_gmt":"2012-09-01T22:49:55","slug":"september-13th-meeting-6pm-elsies","status":"publish","type":"post","link":"https:\/\/dc612.org\/index.php\/2012\/09\/01\/september-13th-meeting-6pm-elsies\/","title":{"rendered":"September 13th Meeting 6pm @ Elsie&#8217;s"},"content":{"rendered":"<p>Back by popular demand, this month, we will be working through more of the\u00a0<a href=\"http:\/\/exploit-exercises.com\/\" target=\"_blank\">exploit-exercises.com<\/a>\u00a0challenges. This time, taking a look at different privilege escalation techniques. Anything from SUID set binarys, modifying cron jobs with better rights, race conditions and more! Please download the Nebula virtual machine and be sure it works with your virtualization software, before coming to the meeting. You will also need virtual box or vmware, both have a free option that will work perfect. A backtrack virtual machine is also suggested, otherwise a host Linux\\Mac OS is suggested.<br \/>\nExploit-exercises Nebula:\u00a0<a href=\"http:\/\/exploit-exercises.com\/nebula\" target=\"_blank\">http:\/\/exploit-exercises.com\/<wbr>nebula<\/wbr><\/a><br \/>\nBacktrack Linux:\u00a0<a href=\"http:\/\/www.backtrack-linux.org\/downloads\/\" target=\"_blank\">http:\/\/www.backtrack-linux.<wbr>org\/downloads\/<\/wbr><\/a><br \/>\nVMware Player:\u00a0<a href=\"https:\/\/my.vmware.com\/web\/vmware\/free#desktop_end_user_computing\/vmware_player\/5_0\" target=\"_blank\">https:\/\/my.vmware.com\/web\/<wbr>vmware\/free#desktop_end_user_<wbr>computing\/vmware_player\/5_0<\/wbr><\/wbr><\/a><br \/>\nVirtualBox:\u00a0<a href=\"https:\/\/www.virtualbox.org\/wiki\/Downloads\" target=\"_blank\">https:\/\/www.virtualbox.org\/<wbr>wiki\/Downloads<\/wbr><\/a><\/p>\n<p>Agenda:<\/p>\n<p>6:00PM-6:30PM \u2013 Get in, get drinks and food ordered<\/p>\n<p>6:30PM-???? \u2013 Challenge walkthroughs<\/p>\n<p>-DC612<\/p>\n<p>Elsie\u2019s Restaurant Bar and Bowling<br \/>\n729 MarshallStreet N.E.,<br \/>\nMinneapolis, MN 55413<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Back by popular demand, this month, we will be working through more of the\u00a0exploit-exercises.com\u00a0challenges. This time, taking a look at different privilege escalation techniques. Anything from SUID set binarys, modifying cron jobs with better rights, race conditions and more! Please download the Nebula virtual machine and be sure it works with your virtualization software, before [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-349","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/dc612.org\/index.php\/wp-json\/wp\/v2\/posts\/349","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dc612.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dc612.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dc612.org\/index.php\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/dc612.org\/index.php\/wp-json\/wp\/v2\/comments?post=349"}],"version-history":[{"count":2,"href":"https:\/\/dc612.org\/index.php\/wp-json\/wp\/v2\/posts\/349\/revisions"}],"predecessor-version":[{"id":351,"href":"https:\/\/dc612.org\/index.php\/wp-json\/wp\/v2\/posts\/349\/revisions\/351"}],"wp:attachment":[{"href":"https:\/\/dc612.org\/index.php\/wp-json\/wp\/v2\/media?parent=349"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dc612.org\/index.php\/wp-json\/wp\/v2\/categories?post=349"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dc612.org\/index.php\/wp-json\/wp\/v2\/tags?post=349"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}