Linux Red Team Exploitation Techniques | Exploiting WordPress & MySQL
HTML-код
- Опубликовано: 4 авг 2024
- In this video, I will be covering the process of identifying and exploiting vulnerabilities on a public-facing web Linux server that is hosting a web application.
Given that we are targeting a Linux server that is hosting a web application, we will require a target VM that has been set up to emulate a typical web server. In this case, we will be utilizing a vulnerable Linux VM that has been configured to teach you the process of exploitation and privilege escalation. It can be downloaded here: www.vulnhub.com/entry/raven-1...
Writeup: hackersploit.org/linux-red-te...
-----------------------------------------------------------------------------------
LINKS:
Register for part 2 (FREE!): event.on24.com/wcc/r/3464946/...
Get $100 in free Linode credit: login.linode.com/signup?promo...
MITRE ATT&CK Framework: attack.mitre.org/
TOOLS:
Target VM: www.vulnhub.com/entry/raven-1...
-----------------------------------------------------------------------------------
BLOG ►► bit.ly/3qjvSjK
FORUM ►► bit.ly/39r2kcY
ACADEMY ►► bit.ly/39CuORr
-----------------------------------------------------------------------------------
TWITTER ►► bit.ly/3sNKXfq
DISCORD ►► bit.ly/3hkIDsK
INSTAGRAM ►► bit.ly/3sP1Syh
LINKEDIN ►► bit.ly/360qwlN
PATREON ►► bit.ly/365iDLK
MERCHANDISE ►► bit.ly/3c2jDEn
-----------------------------------------------------------------------------------
CYBERTALK PODCAST ►► open.spotify.com/show/6j0RhRi...
-----------------------------------------------------------------------------------
We hope you enjoyed the video and found value in the content. We value your feedback, If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms.
-----------------------------------------------------------------------------------
Thanks for watching!
Благодарю за просмотр!
Kiitos katsomisesta
Danke fürs Zuschauen!
感谢您观看
Merci d'avoir regardé
Obrigado por assistir
دیکھنے کے لیے شکریہ
देखने के लिए धन्यवाद
Grazie per la visione
Gracias por ver
شكرا للمشاهدة
-----------------------------------------------------------------------------------
#RedTeam#CyberSecurity#Linux - Наука
This is the most underrated channel in RUclips. The efforts that he makes in his videos, deserves a lot more. Bro you're the best. Keep going on and on. You're one of the best security guy I've ever seen
Much appreciate mate!
"Hey guys hackersploit here" Is an emotion💕
I love how you explain your videos. All the concepts and technical jargons are clearly outlined! Mad respect Bro. Gods blessings and support for your channel
This is amazing!! Thank you so much for the valuable knowledge and further resource share! Love it
Thank you for your this series. Insane.
Lots of love from India. 🇮🇳
Very nice hackersploit!!😀
I liked the video before I've watched it!
Just watch the Linode series, it is really helpful. Definitely will help pass my OSCP.
Thank you so much for this video
Thank you for teaching this to us
good teacher and good lacture
Awesome sir
Hello sir your teaching techniques is really awesome can you make a video for bypassing WAF like cloudflare techniques please
best technique bro ❤️
Sensei u Rock 😇
Love from Kerala, India
Knowledgeable information.
SwastiShree
To do this is should i create a wordpress in kali. Because i create wordpress in ubuntu and i install kali in Virtualbox where ubuntu is and the website word in briwser of ubuntu but dont work in browser of kali.
You're the Man, bro !!!!
Thank you sir ❤️
❤️
Great video. Quick question. What if WordPress is not local but hosted in some providers like wish or godaddy? You can't do all this stuff right?
The techniques highlighted in the video will work on any WordPress configuration regardless of whether it is hosted locally or through the use of a hosting provider. However, the only distinction or obstacle that you may face when dealing with a production site is a WAF.
@@HackerSploit thanks for your reply.
But if it's not a WAF, trying to reach the web hosting server will lead you to some goddady virtual machine no? So basically you will not attack a particular site but godaddy itself in this case. Getting a shell from this web app hosted will grant givevyou access to the goddady virtual machine no?Unless I'm mistaken.
can you pls make one video for android keylogger sir at the same time can you explain when we using payload once after few months later the same payload how to we active that payload in victim device. using metasploit sir
Bro any idea to have standard IP address to attacker for stable Payload ? If that is possible?!!!!
Thanks
OPS: NoIP are used
APIPA?
First!
👍🕶️
Mimikatz video plz