Hello everyone! Welcome to my new video. Today, we're exploring a vulnerable machine called " Black Widow ". This machine is part of a single series and is categorized as " Medium " in terms of difficulty.
Learn more: https://www.cybersecmastery.in/2024/0...
=================================================
TimeStamp
=================================================
0:00 Introduction
0:27 Settings Up
1:58 Enumeration
1:59 Identifying the IP address
2:27 Enumerate the Network
4:00 Web Enumeration and Directory Busting
5:05 Troubleshooting the " We’re having trouble finding that site " error
6:14 Identify the vulnerability
6:50 Exploiting the LFI Vulnerability
6:52 Identifying exploitable parameters
7:17 Utilizing ffuf for advanced testing
9:24 Foothold using Log injection Vulnerability
9:56 Observing Log Injection Behavior with Burp Suite
11:06 Trigger RCE to inject reverse shell
14:20 Brute-force the username and password
15:43 Privilege Escalation
16:46 Enumerate the Linux Privilege using LinPEAS
18:51 Uncover embedded information in binaries
_____________________________________________________________
#BlackWidowExploit #CyberSecurity #VulnerableMachine #PenetrationTesting #EthicalHacking #MediumDifficultyCTF #NetworkEnumeration #WebEnumeration #DirectoryBusting #LFIVulnerability #LogInjection #ReverseShell #PrivilegeEscalation #LinPEAS #CyberSecMastery
Contribute to growing: https://www.buymeacoffee.com/mrdev
Find me:
Instagram: / amit_aju_
Facebook page: / technoscinfo
Linkedin: / amit-kumar-giri-52796516b
Chat with Telegram:https://t.me/technosciencesoln
Disclaimer: Hacking without having permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against real hackers.