TryHackMe-Nahamstore Remote Code Execution+ Recon (Task3+11)

preview_player
Показать описание
00:00-Intro
02:20-Setting Burpsuite Scope and analyzing the Web Application
05:46-Trying to Explain Remote Code execution vulnerability
07:30-Testing q parameter for remote code execution
08:30-Looking for payloads on payloadallthethings and GitHub for beginners
10:23-Using Intruder to test for RCE from the payloads we got
11:35-Inline bash to check for rce
12:23-Analyzing all requests and testing for RCE
17:47-Found hidden parameters testing for RCE
18:37-Testing for Blind RCE
19:42-Starting Nmap Scan to Check the technology for the web app and server
21:20-Trying PHP payload for Reverse shell
22:55-Found the First Flag
23:48-Trying to test web server running on port 8000
23:50-FFUF to fuzz for directories and files on port 8000
24:29-Found Admin panel logging in as default credentials and testing for RCE
29:46-Explaining Live RCE example for one bug bounty Program
34:01-Getting back to Reverse shell and enumerating the system and solving task 3
35:49-Found the domain now fuzzing it and getting information of users
40:09-Getting reverse shell from the second RCE as well and getting the flag
and solving all answers and completing the tasks
Рекомендации по теме
Комментарии
Автор

Great Explanation
Please make more videos for bug bounty
I just got started in bug bounties by watching your videos thank you very much:))))

haroonhammad