html web templates

Du Sel Sur — La Peau 1984 Okru Exclusive

Wait, "Long Story" might be part of the title. Let me search for "1984 Okru Exclusive song Salt on the Skin" or similar. If I can't find anything, maybe it's a very niche artist or a mix-up. The user might be referring to a specific genre. The name "Okru" rings a bell for some Korean artists, but that might be a stretch. Alternatively, maybe it's a French artist since "du sel" is French.

Since I can't find direct information, I need to inform the user that there's limited information available and ask for more context. Maybe they can clarify if it's a song, album, artist, or something else. Also, check for possible misspellings in the artist name. Alternatively, maybe it's a local or independent release not widely cataloged. du sel sur la peau 1984 okru exclusive

Another angle: the phrase "1984" could reference the George Orwell novel, but that's just a thought. The user might be mixing up the names. It's also possible that the song is in French, and the title is mistranslated or miswritten. Wait, "Long Story" might be part of the title

I should check if there's a known artist named Okru or similar. Maybe there's a typo? The user wrote "1984 okru exclusive — long story". The hyphen might be a separator. Could "1984" be part of the artist's name? Like "1984 Okru" as the artist and "Long Story" as part of it? Maybe "Okru" is an artist, and 1984 is the year of release. Or "Okru" could be part of the album title. The user might be referring to a specific genre

Lab Setup

You can build your own lab as elaborate as you would like. However, for the purpose of this class, the following virtual machines (VMs) will be used.

WebSploit

Kali + Additional Tools + Vulnerable Applications in Docker containers...

Raven

A vulnerable VM that you will use to perform a full assessment (from reconnassaince to full compromise)

VTCSEC

Another vulnerable VM that you will use to perform a full assessment (from reconnassaince to full compromise)

Du Sel Sur — La Peau 1984 Okru Exclusive

This video explains how to setup the virtual machines in your system using Virtual Box.

Topology

The diagram below shows the lab architecture with WebSploit Full version, Raven, and VTCSEC. The VMs were created in Virtual Box. It is highly recommended that you use Virtual Box. However, if you are familiar with different virtualization platforms, you should be able to run the VMs in VMWare Workstation Pro (Windows), VMWare Fusion (Mac), or vSphere Hypervisor (free ESXi server). 

You should create a VM-only network to deploy your vulnerable VMs and perform several of the attacks using WebSploit (Kali Linux), as shown in the video above. You can configure a separate network interface in your WebSploit VM to connect to the rest of your network and subsequently the Internet. Preferably, that interface should be in NAT mode.

LAB GUIDES

Lab guides will be distributed during class...

Omar's Cybersecurity GitHub Repository 

Over 8,000 cybersecurity references related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more. 

Stay in Touch with Omar!

© Copyright 2020, Omar Santos - All Rights Reserved