Hi everyone, I did the first Vuln VM from hackfest 2016 not long ago and i want to try this one now. It’s the second one by @ViperBlackSkull and it is the second walkthrough for me so if you need more information you can reach me on twitter at @marghost. You can get the virtual machine HERE. So lets get started.
Ok guys it is my first review of a capture the flag pentest. If you have suggestions you can reach me out on twitter @marghost. I hope you will like it. This vulnerable VM has been created by Viper and can be found HERE. In this pentest i will use some basic pentest tools like nmap nikto dirtbuster and wpscan. I will exploit vulns with the classic metasploit.
After many test phonetisaurus and pocketsphinx are not quite good to use, full of bug and the debugging of them is a pain in the ass!
When i will go on and continue this project of Jasper/jarvis i will see what alternatives the internet haz to offer… probably wit.ai.
Keep you posted
First of all fresh install of the jasper img provided by matt curry.
After you should make an apt-get ‘update upgrade’…. and your good to go make a tea break and maybe do some lundry lawl.
….still updating go prepare a snack and put one episode of your favorite serie 😉
At the prompt, enter the following command:
sudo nano /etc/network/interfaces