Cyber Security | Pentesting | Vulnhub | Walkthrough | SecTalks BNE0x02 Fuku | Python | Joomla

Описание к видео Cyber Security | Pentesting | Vulnhub | Walkthrough | SecTalks BNE0x02 Fuku | Python | Joomla

Pentesting Lab Exercises Series - Vulnhub
Virtual Machine Name: SecTalks: BNE0x02 - Fuku
Link: https://www.vulnhub.com/entry/sectalk...
My Twitter:@ junhua_cyber

Tips:
1. Very very very interesting machine.

2. In this CTF walkthrough, we explore how to discover useful open ports on a machine when traditional Nmap scans fall short. Learn alternative techniques like Python to bypass restrictions and gather critical information about the target. Perfect for sharpening your reconnaissance skills and tackling more advanced scenarios

3. Utilize the concurrent.futures module which provides a high-level interface for asynchronously executing callables. This module can allow us to define max workers.
After all, I don't want too many connections take down the target application.

4. Joomscan similar to wpscan.
JoomScan is an open source project, developed with the aim of automating the task of vulnerability detection and reliability assurance in Joomla CMS deployments. Implemented in Perl, this tool enables seamless and effortless scanning of Joomla installations, while leaving a minimal footprint with its lightweight and modular architecture. It not only detects known offensive vulnerabilities, but also is able to detect many misconfigurations and admin-level shortcomings that can be exploited by adversaries to compromise the system.

5. I just took one of vulnerabilities of Joomla.

6. IP address of the target machine would be changed. This gives us some difficulties.

Please Like, comment, and subscribe for more hands-on cybersecurity tutorials and CTF walkthroughs

Комментарии

Информация по комментариям в разработке