VIDEO
Pentest Pro Tips with Tom: F5 Big-IP Post Exploitation Techniques
Video Summary:
Warning: Geeky technical content ahead! Welcome to another exciting Pentest Pro Tips with Tom Pohl! Watch Tom’s new video to see him demonstrate advanced post-exploitation techniques following the compromise of an F5 BIG-IP load balancer. Tom shares how attackers can compromise your network and advance their privileges using a hacked BIG-IP Application Delivery Controller (ADC) that is used for both load balancing and application delivery. Tom takes you into the lab and shows you step-by-step how a vulnerability in the BIG-IP allows attackers to gain unauthorized root access and create a new user account. Watch to see why it’s crucial to patch your organization's F5 Big-IP appliances to prevent network-wide compromise. #pentester #pentesting #pentest
Warning: Geeky technical content ahead! Welcome to another exciting Pentest Pro Tips with Tom Pohl! Watch Tom’s new video to see him demonstrate advanced post-exploitation techniques following the compromise of an F5 BIG-IP load balancer. Tom shares how attackers can compromise your network and advance their privileges using a hacked BIG-IP Application Delivery Controller (ADC) that is used for both load balancing and application delivery. Tom takes you into the lab and shows you step-by-step how a vulnerability in the BIG-IP allows attackers to gain unauthorized root access and create a new user account. Watch to see why it’s crucial to patch your organization's F5 Big-IP appliances to prevent network-wide compromise. #pentester #pentesting #pentest