VIDEO

Pentest Pro Tips with Tom: F5 Big-IP Post Exploitation Techniques

Video Summary:

Warning: Geeky technical content ahead!

Welcome to another exciting Pentest Pro Tips with Tom Pohl! Watch Tom’s new video to see him demonstrate advanced post-exploitation techniques following the compromise of an F5 BIG-IP load balancer.

Tom shares how attackers can compromise your network and advance their privileges using a hacked BIG-IP Application Delivery Controller (ADC) that is used for both load balancing and application delivery.

Tom takes you into the lab and shows you step-by-step how a vulnerability in the BIG-IP allows attackers to gain unauthorized root access and create a new user account. Watch to see why it’s crucial to patch your organization's F5 BIG-IP appliances to prevent network-wide compromise.

CONTACT US