1.0 Pwnlab_init Walkthrough Part 1

preview_player
Показать описание
This is the first part of the walkthrough for the Pwnlab_init virtual machine which can be found on Vulnhub. In part 1 we explore how to use a Local File Inclusion exploit to disclose information from a web server, upload a PHP shell and then have that shell executed on the server.

================================
References
================================
Find the Vulnerable Machine for this walkthrough Here

More information about Local File Inclusion Here

Get the code for the reverse shell used in the video
Рекомендации по теме
Комментарии
Автор

Please make more videos you far more clear and concise than the majority of text and video based CTF tutorials. It took me 5-6 text based and 3 videos to find out the browser plugins they all used and you were the only one who provided info on them rather than assuming people just know. and its also nice to have a verbal run through rather than iffy 00's dance music.

flibble
Автор

please do more. i have prob learned more about computers in these vids than i do anywhere else

redcatgaming
Автор

Hello Steven,
thank you for this run through the CTF. I'm new to this and I don't really understand what you did at about 11:15. Could you please explain it to me any further? Or maybe do a video about it?

Would subscribe! Thanks in advance!

TheMillinger
Автор

the IP adress that I got, was complitly different from all the walkthroughs.

Smoshlovedude