Hello everyone! Welcome all of my viewers, to this brand-new video. In today's tutorial, we will be dealing with a vulnerable machine, categorized as " Easy " in terms of difficulty.
To Learn More: https://www.cybersecmastery.in/2023/0...
=============================================
TimeStamp
=============================================
0:00 Intro
0:25 Settings Up
1:47 Enumeration
2:32 Performing Network Scans with Nmap
4:00 Web Enumeration and Directory Discovery with Gobuster
7:13 Detecting Local File Inclusion (LFI) Vulnerabilities with FFUF
10:03 Gaining SSH Access by Extracting Private Key via LFI
12:11 Foothold
13:30 Decrypting SSH Key Files with John The Ripper
15:14 Privilege Escalation
16:14 Privilege Enumeration with LinPEAS
18:52 Writable /etc/passwd Privilege Escalation
______________________________________________________
Contribute to growing: https://www.buymeacoffee.com/mrdev
Find me:
Instagram: / amit_aju_
Facebook page: / technoscinfo
Linkedin: / amit-kumar-giri-52796516b
Disclaimer: Hacking without having permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against real hackers.