Penetration testing is not simple, it requires lots of technical knowledge and the capability to think outside of the box. Sometimes you will find simple yet dangerous vulnerabilities, other times you will find vulnerabilities where public exploits exist which you can use to get easy access to the system.
Learn More: [ Ссылка ]
===========================================
TimeStamp
===========================================
0:00 Introduction
0:58 Enumeration
1:35 Accessing FTP Server Anonymously with FTP Client Tool
2:23 Decrypting Password-Protected ZIP Files with John The Ripper
4:43 Foothold
5:15 Acquiring OS Shell Access via SQL Injection with SQL Map
7:39 Establishing Reverse Shell via OS Shell Obtained from SQLMap
8:83 Privilege Escalation
9:40 sudo privilege escalation via vi editor (CVE-2019-14287)
____________________________________________________
Contribute to growing: [ Ссылка ]
Find me:
Instagram:[ Ссылка ]
Facebook page: [ Ссылка ]
Linkedin: [ Ссылка ]
Disclaimer: Hacking without having permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against real hackers.
Ещё видео!