filmov
tv
Inferno 1 || VulnHub Complete Walkthrough

Показать описание
Hello everyone! Welcome all of my viewers, to this brand-new walkthrough. In today's tutorial, we will be dealing with a vulnerable machine( i.e., Inferno 1 ), categorized as "Easy/Medium" in terms of difficulty.
================================================
TimeStamp
================================================
0:00 Introduction
0:27 Settings up
2:00 Enumeration
2:28 Network Discovery with Nmap
3:32 Web Enumeration and Directory Discovery with Gobuster
5:56 Brute Forcing a Login Page to Obtain Credentials using Hydra
9:07 Exploiting Codiad for Remote Code Execution
13:21 Decoding HEX-Encoded Text with CyberChef
14:13 Foothold
15:29 Privilege Escalation
16:11 tee privilege escalation
17:15 Method 1. Sudo Misconfiguration Exploiting Specific Binary
19:36 Method 2. Adding a New User with Root Privileges
__________________________________________________________
Find me:
Disclaimer: Hacking without having permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against real hackers.
================================================
TimeStamp
================================================
0:00 Introduction
0:27 Settings up
2:00 Enumeration
2:28 Network Discovery with Nmap
3:32 Web Enumeration and Directory Discovery with Gobuster
5:56 Brute Forcing a Login Page to Obtain Credentials using Hydra
9:07 Exploiting Codiad for Remote Code Execution
13:21 Decoding HEX-Encoded Text with CyberChef
14:13 Foothold
15:29 Privilege Escalation
16:11 tee privilege escalation
17:15 Method 1. Sudo Misconfiguration Exploiting Specific Binary
19:36 Method 2. Adding a New User with Root Privileges
__________________________________________________________
Find me:
Disclaimer: Hacking without having permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against real hackers.
Комментарии