EP003: Muddy Proving Grounds Walk through in Urdu/Hindi

preview_player
Показать описание
Walk through in Urdu/Hindi #Muddy from #ProvingGroundsPractice.
Link of Box:

Chapters:
00:00 Intro
00:08 nmap result
00:58 port 80
02:45 gobuster port 80
03:18 port 8888
04:02 searchsploit ladon
04:38 reading the exploit
05:06 editing the payload
05:25 BurpSuite new listener
06:09 reading /etc/passwd
06:42 trying to read other files
08:03 port 111
08:47 /webdav directory
09:07 webdav username password
10:25 struggling for webdav password
10:59 filename found
11:24 hashcat for cracking the hash
12:52 hash cracked
13:28 uploading php rce to webdav
14:13 RCE
15:26 Reverse shell
21:36 PrivESC to root
24:32 root

**Please Note**
The steps & tools shown in this video are for educational / learning purposes only. Using these techniques/tools etc. beyond taking the consent can/will be considered as a criminal offense; which will be punishable under the law. You will be responsible for all your actions. The author of this video is not responsible for any malicious activity.

Also, don't forget to Like this video and Subscribe the channel.
Рекомендации по теме
Комментарии
Автор

in 5:10 why do we need change to muddy and checkout here?
I didnt get why we need to change it?
because even I havent find this path by crawling the files in the target

Saw-oh
Автор

Awesome indexing and method. I couldn't understand the language but was able to follow and like the use of curl to upload to server.

geediazjr