The walkthrough
Hopefully, you have been able to complete your testing before reading this portion of the chapter. It will contain examples and at least one method of accomplishing the goal we have set which is to breach the security of the virtual NewAlts Development Lab running on our own network or machine. If your documentation or methodology to obtain the initial goal is different than that described within, it does not mean it is wrong, just different. With practice, penetration testers will develop their own methods which are tailored to their skill set and knowledgebase.
Note
There may be other methods to reach our goal than those described in this chapter. The goal of the chapter is to give an example of a penetration testing workflow from start to finish. If you find other methods of obtaining root on the Kioptrix machine in the CORE network, congratulations are due! That is what penetration testing is all about!
Defining the scope
The scope of this particular test can be clearly...