Find Exploits & Get Root with Linux Exploit Suggester [Tutorial]

preview_player
Показать описание

How to Root Linux in Minutes with Linux Exploit Suggester

Cyber Weapons Lab, Episode 162

Once you have access to a system, privilege escalation is your priority. Today, in this episode of Cyber Weapons Lab, we are showing a tool that keeps track of all the privilege escalation exploits and then scans the system to see what that particular system might be vulnerable to. This episode is based on the written Null Byte guide by drd_.


Follow Null Byte on:
Рекомендации по теме
Комментарии
Автор

Other guy must be at the international staring contest

harveynotactualaccount
Автор

Two videos in one day?! It's not even my birthday!

vinyard
Автор

Thanks, I would like to start from scratch in penetration testing, so please do you have series of videos for that?

Journasa
Автор

Thank you, this was very helpful. this tool is very nifty

TheRealKitWalker
Автор

Ok did i miss something? If i had access to run commands on the target computer like in this video to use this method why would i even need to use this method if you already have this much access on target machine?

racerx
Автор

It is good to combine using with linpeas,

happydaybegin
Автор

what is that green face sticker you have on the laptop and where can i get one?

ejonesss
Автор

Sir, after installing the metasploit when I start to use it, it shows that "the pg or activerecord gem version has changed, meaning deprecated pg constants may no longer in use"....what should I do now??

dipankarbaishya
Автор

Sir I am following u since a year you are great love your videos

hridaybhatia
Автор

Hey please can tell how you are getting good video quality . I want to know your export settings for screencast video . Please reply .

Avangers
Автор

did you install an kernel from 2016 or something?

phonyfelony
Автор

Hi. Quick question about anonymity (for anyone who can assist). If I am using a GUI-based scanning tool like Zenmap (others), are these scans still anonymized, and how so (is starting a Tor service, proxychains from a terminal required first)? Thank you! =).

xviewmytubex
Автор

Hello!.Thanks for your good information.I have a question.If some one can deal with various computer language and computer OS systems, is it possible to access Bank or Government OS system? Is there case like that?

kuki
Автор

I have a question about brute forcing.
I dont understand why people would do it because you can't do anything even when you have the password. I dont know anyone who can bypass the verification of SMS or gmail

hhhgggdeonabrix
Автор

Make a video on the wifi pineapple tetra for macos

gamerteen
Автор

If you already have a remote terminal, you could just pipe a tarball through it, or use a in-built tool like scp if it's SSH. The http server seemed like overkill to me.

alexandriap.
Автор

linPEAS and linenum works fine for me in a CTF or a real situation ill have to test this tool and see..

taylorreess
Автор

Where is my son Kody K?
May God keep him safe from Covid-19

lalbadshahkhan
Автор

Hey guys I’m new to the whole hacking thing and I have a question. What does 0.0.0.0 actually mean. I see it a lot when I’m trying sometimes and using Metasploit and now here too. Can anyone please help me?

younesmohssen
Автор

So this is like LinPEAS basically? When you have remote access to a machine you might just go for LinPEAS instead on that machine, instead of this method. And why not run python3? Python3 -m http.server instead of that old python2 version? :D

LfomodDubstep
welcome to shbcf.ru