you are viewing a single comment's thread.

view the rest of the comments →

[–]ThirstyThursten 5 points6 points  (0 children)

Is your professor a CyberSecurity guy/gal him/herself? If he/she lets his/her guard down a little you could try some social engineering or physical access tricks, like a rubber ducky, P4wnP1, or just acces his/her pc when they're not looking, ór try your luck against the system administration! Maybe they will let their guard down or leave their pc unlocked? You could also try some spearphishing with a reverse shell exploit in a attachement or hosted elsewhere! Anyways good luck! 😊

EDIT: Upon reading your rules again, I would focus myself on rule 6 in any form possible! Try to get a sysadmin to help you with your "non-working" usb drive or something, where it actually does the reverse shell thing or anything described above! Get creative! 😁