Wordpress Penetration Testing | EP1 | LazySysAdmin VulnHub Walkthrough CTF

preview_player
Показать описание
In this video walkthrough, we covered the solution of LazySysAdmin VulnHub machine where we covered Wordpress Penetration Testing & exploiting SMB shares.
********
Receive Cyber Security Field, Certifications Notes and Special Training Videos
Writeup
********
LinkedIn
Instagram
Twitter
Facebook
Рекомендации по теме
Комментарии
Автор

Well you could go to non existing page to execute reverse shell, for example

MrEezme
Автор

the user togie already can figured by using enum4linux you will find in the result enum4linux machine-IP-address

MegaWalker