filmov
tv
TryHackMe-Nahamstore Remote Code Execution+ Recon (Task3+11)
Показать описание
00:00-Intro
02:20-Setting Burpsuite Scope and analyzing the Web Application
05:46-Trying to Explain Remote Code execution vulnerability
07:30-Testing q parameter for remote code execution
08:30-Looking for payloads on payloadallthethings and GitHub for beginners
10:23-Using Intruder to test for RCE from the payloads we got
11:35-Inline bash to check for rce
12:23-Analyzing all requests and testing for RCE
17:47-Found hidden parameters testing for RCE
18:37-Testing for Blind RCE
19:42-Starting Nmap Scan to Check the technology for the web app and server
21:20-Trying PHP payload for Reverse shell
22:55-Found the First Flag
23:48-Trying to test web server running on port 8000
23:50-FFUF to fuzz for directories and files on port 8000
24:29-Found Admin panel logging in as default credentials and testing for RCE
29:46-Explaining Live RCE example for one bug bounty Program
34:01-Getting back to Reverse shell and enumerating the system and solving task 3
35:49-Found the domain now fuzzing it and getting information of users
40:09-Getting reverse shell from the second RCE as well and getting the flag
and solving all answers and completing the tasks
02:20-Setting Burpsuite Scope and analyzing the Web Application
05:46-Trying to Explain Remote Code execution vulnerability
07:30-Testing q parameter for remote code execution
08:30-Looking for payloads on payloadallthethings and GitHub for beginners
10:23-Using Intruder to test for RCE from the payloads we got
11:35-Inline bash to check for rce
12:23-Analyzing all requests and testing for RCE
17:47-Found hidden parameters testing for RCE
18:37-Testing for Blind RCE
19:42-Starting Nmap Scan to Check the technology for the web app and server
21:20-Trying PHP payload for Reverse shell
22:55-Found the First Flag
23:48-Trying to test web server running on port 8000
23:50-FFUF to fuzz for directories and files on port 8000
24:29-Found Admin panel logging in as default credentials and testing for RCE
29:46-Explaining Live RCE example for one bug bounty Program
34:01-Getting back to Reverse shell and enumerating the system and solving task 3
35:49-Found the domain now fuzzing it and getting information of users
40:09-Getting reverse shell from the second RCE as well and getting the flag
and solving all answers and completing the tasks
Комментарии