Pentest Pro Tips with Tom: F5 Big-IP Post Exploitation Techniques
Warning: Geeky technical content ahead!
Welcome to another exciting Pentest Pro Tips with Tom Pohl! Watch Tom’s new video to see him demonstrate advanced post-exploitation techniques following the compromise of an F5 BIG-IP load balancer.
Tom shares how attackers can compromise your network and advance their privileges using a hacked BIG-IP Application Delivery Controller (ADC) that is used for both load balancing and application delivery.
Tom takes you into the lab and shows you step-by-step how a vulnerability in the BIG-IP allows attackers to gain unauthorized root access and create a new user account. Watch to see why it’s crucial to patch your organization's F5 BIG-IP appliances to prevent network-wide compromise.