Linux Red Team Exploitation Techniques | Exploiting WordPress & MySQL

Поделиться
HTML-код
  • Опубликовано: 4 авг 2024
  • In this video, I will be covering the process of identifying and exploiting vulnerabilities on a public-facing web Linux server that is hosting a web application.
    Given that we are targeting a Linux server that is hosting a web application, we will require a target VM that has been set up to emulate a typical web server. In this case, we will be utilizing a vulnerable Linux VM that has been configured to teach you the process of exploitation and privilege escalation. It can be downloaded here: www.vulnhub.com/entry/raven-1...
    Writeup: hackersploit.org/linux-red-te...
    -----------------------------------------------------------------------------------
    LINKS:
    Register for part 2 (FREE!): event.on24.com/wcc/r/3464946/...
    Get $100 in free Linode credit: login.linode.com/signup?promo...
    MITRE ATT&CK Framework: attack.mitre.org/
    TOOLS:
    Target VM: www.vulnhub.com/entry/raven-1...
    -----------------------------------------------------------------------------------
    BLOG ►► bit.ly/3qjvSjK
    FORUM ►► bit.ly/39r2kcY
    ACADEMY ►► bit.ly/39CuORr
    -----------------------------------------------------------------------------------
    TWITTER ►► bit.ly/3sNKXfq
    DISCORD ►► bit.ly/3hkIDsK
    INSTAGRAM ►► bit.ly/3sP1Syh
    LINKEDIN ►► bit.ly/360qwlN
    PATREON ►► bit.ly/365iDLK
    MERCHANDISE ►► bit.ly/3c2jDEn
    -----------------------------------------------------------------------------------
    CYBERTALK PODCAST ►► open.spotify.com/show/6j0RhRi...
    -----------------------------------------------------------------------------------
    We hope you enjoyed the video and found value in the content. We value your feedback, If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms.
    -----------------------------------------------------------------------------------
    Thanks for watching!
    Благодарю за просмотр!
    Kiitos katsomisesta
    Danke fürs Zuschauen!
    感谢您观看
    Merci d'avoir regardé
    Obrigado por assistir
    دیکھنے کے لیے شکریہ
    देखने के लिए धन्यवाद
    Grazie per la visione
    Gracias por ver
    شكرا للمشاهدة
    -----------------------------------------------------------------------------------
    #RedTeam#CyberSecurity#Linux
  • НаукаНаука

Комментарии • 31

  • @securityresearcher3336
    @securityresearcher3336 2 года назад +19

    This is the most underrated channel in RUclips. The efforts that he makes in his videos, deserves a lot more. Bro you're the best. Keep going on and on. You're one of the best security guy I've ever seen

  • @seshasaikadali4
    @seshasaikadali4 2 года назад +6

    "Hey guys hackersploit here" Is an emotion💕

  • @mckeanethomas3830
    @mckeanethomas3830 2 года назад +3

    I love how you explain your videos. All the concepts and technical jargons are clearly outlined! Mad respect Bro. Gods blessings and support for your channel

  • @VinayKumar-cv1sf
    @VinayKumar-cv1sf 2 года назад +1

    This is amazing!! Thank you so much for the valuable knowledge and further resource share! Love it

  • @rudrasalaria3431
    @rudrasalaria3431 2 года назад +1

    Thank you for your this series. Insane.
    Lots of love from India. 🇮🇳

  • @thiagoamaral3311
    @thiagoamaral3311 2 года назад +1

    Very nice hackersploit!!😀

  • @Chris-sd6yt
    @Chris-sd6yt 2 года назад +1

    I liked the video before I've watched it!

  • @jvr8360
    @jvr8360 2 года назад

    Just watch the Linode series, it is really helpful. Definitely will help pass my OSCP.

  • @debdwaipayankarmakar9560
    @debdwaipayankarmakar9560 2 года назад +1

    Thank you so much for this video

  • @chifdios1747
    @chifdios1747 2 года назад

    Thank you for teaching this to us

  • @sp3cial1st
    @sp3cial1st 2 года назад

    good teacher and good lacture

  • @sushilmaury4094
    @sushilmaury4094 2 года назад

    Awesome sir

  • @cuteuarjun3524
    @cuteuarjun3524 2 года назад +1

    Hello sir your teaching techniques is really awesome can you make a video for bypassing WAF like cloudflare techniques please

  • @Pranavdave48
    @Pranavdave48 2 года назад

    best technique bro ❤️

  • @krovoatano9453
    @krovoatano9453 2 года назад

    Sensei u Rock 😇

  • @srlsec
    @srlsec 2 года назад

    Love from Kerala, India

  • @swastishree5983
    @swastishree5983 2 года назад

    Knowledgeable information.
    SwastiShree

  • @thewinner4424
    @thewinner4424 2 года назад

    To do this is should i create a wordpress in kali. Because i create wordpress in ubuntu and i install kali in Virtualbox where ubuntu is and the website word in briwser of ubuntu but dont work in browser of kali.

  • @thierryimbert4666
    @thierryimbert4666 2 года назад +1

    You're the Man, bro !!!!

  • @xxehacker
    @xxehacker 2 года назад

    Thank you sir ❤️

  • @akashkumarmg505
    @akashkumarmg505 2 года назад

    ❤️

  • @Aidev7876
    @Aidev7876 2 года назад

    Great video. Quick question. What if WordPress is not local but hosted in some providers like wish or godaddy? You can't do all this stuff right?

    • @HackerSploit
      @HackerSploit  2 года назад +1

      The techniques highlighted in the video will work on any WordPress configuration regardless of whether it is hosted locally or through the use of a hosting provider. However, the only distinction or obstacle that you may face when dealing with a production site is a WAF.

    • @Aidev7876
      @Aidev7876 2 года назад

      @@HackerSploit thanks for your reply.
      But if it's not a WAF, trying to reach the web hosting server will lead you to some goddady virtual machine no? So basically you will not attack a particular site but godaddy itself in this case. Getting a shell from this web app hosted will grant givevyou access to the goddady virtual machine no?Unless I'm mistaken.

  • @durgaprasadrao3888
    @durgaprasadrao3888 2 года назад

    can you pls make one video for android keylogger sir at the same time can you explain when we using payload once after few months later the same payload how to we active that payload in victim device. using metasploit sir

  • @alanhajj3936
    @alanhajj3936 2 года назад

    Bro any idea to have standard IP address to attacker for stable Payload ? If that is possible?!!!!
    Thanks
    OPS: NoIP are used

    • @8080VB
      @8080VB 2 года назад

      APIPA?

  • @RAZREXE
    @RAZREXE 2 года назад

    First!

  • @peterbecerra4243
    @peterbecerra4243 2 года назад

    👍🕶️

  • @axosolaman8984
    @axosolaman8984 2 года назад

    Mimikatz video plz