Post

VL Shinra Part 4 - Reverse Engineering, Binary Exploitation & Ansible

This is part four of the Shinra series. We will get to access to a linux server via ssh, exploit a small authenticator app & use ansible to move to the next box.

This post is licensed under CC BY 4.0 by the author.