Jangow01-1.0.1 || VulnHub Complete Walkthrough

Опубликовано: 15 Октябрь 2024
на канале: Techno Science
13,224
185

In this article, we are going to tackle an easy box from VulnHub. Before getting started, You need an isolated network environment on VirtualBox. The box, we are going to write up is called Jangow01-1.0.1 .


Learn More: https://www.cybersecmastery.in/2022/0...

Contribute to growing: https://www.buymeacoffee.com/mrdev

===========================================
TimeStamp
===========================================
0:32 Settings up
1:13 Enumeration
1:46 Network Scanning using Nmap
312 Foothold
3:32 Local File Inclusion Vulnerability
4:53 Attempting Login Session Retrieval with FTP Client Tool
7:10 Exploitation: Way to Find a Reverseshell Connection
7:22 Method 1: Using php-reverse-shell.php
9:09 Method 2: Using Netcat
9:40 Method 3: Using the Bash Shell script
11:35 Privilege Escalation
11:54 Privilege Escalation Enumeration with LinPEAS
13:40 Local Privilege Escalation Vulnerability in Linux Kernel
____________________________________________________



Find me:
Instagram:  / amit_aju_  
Facebook page:   / technoscinfo  
Linkedin:   / amit-kumar-giri-52796516b  



Disclaimer: Hacking without having permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against real hackers.