Hello everyone! Welcome all of my viewers, to this brand-new walkthrough. In today's tutorial, we will be dealing with a vulnerable machine( i.e., Inferno 1 ), categorized as "Easy/Medium" in terms of difficulty.
Learn More: https://www.cybersecmastery.in/2023/0...
================================================
TimeStamp
================================================
0:00 Introduction
0:27 Settings up
2:00 Enumeration
2:28 Network Discovery with Nmap
3:32 Web Enumeration and Directory Discovery with Gobuster
5:56 Brute Forcing a Login Page to Obtain Credentials using Hydra
9:07 Exploiting Codiad for Remote Code Execution
13:21 Decoding HEX-Encoded Text with CyberChef
14:13 Foothold
15:29 Privilege Escalation
16:11 tee privilege escalation
17:15 Method 1. Sudo Misconfiguration Exploiting Specific Binary
19:36 Method 2. Adding a New User with Root Privileges
__________________________________________________________
Contribute to growing: https://www.buymeacoffee.com/mrdev
Find me:
Instagram: / amit_aju_
Facebook page: / technoscinfo
Linkedin: / amit-kumar-giri-52796516b
Disclaimer: Hacking without having permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against real hackers.