Logo video2dn
  • Сохранить видео с ютуба
  • Категории
    • Музыка
    • Кино и Анимация
    • Автомобили
    • Животные
    • Спорт
    • Путешествия
    • Игры
    • Люди и Блоги
    • Юмор
    • Развлечения
    • Новости и Политика
    • Howto и Стиль
    • Diy своими руками
    • Образование
    • Наука и Технологии
    • Некоммерческие Организации
  • О сайте

Скачать или смотреть I Hacked Obi Wan Kenobi Today - TryHackMe Hacking Tutorial

  • Hank Hackerson
  • 2024-01-11
  • 279
I Hacked Obi Wan Kenobi Today - TryHackMe Hacking Tutorial
ethical hackerethical hackinghackerhackingcybersecuritycyber securitycybersecurity enginersecurity engineersecurity engineeringnetwork securitynetwork security engineertryhackmepentestpentestingpentesterpenetration testpenetration testingpenetration testerwhite hat hackinghow to hackhow to become a hackercertified ethical hackerbecome a hackerkenobinfsnetwork file systemftpfile transfer protocolnmapnetwork mappingsmb
  • ok logo

Скачать I Hacked Obi Wan Kenobi Today - TryHackMe Hacking Tutorial бесплатно в качестве 4к (2к / 1080p)

У нас вы можете скачать бесплатно I Hacked Obi Wan Kenobi Today - TryHackMe Hacking Tutorial или посмотреть видео с ютуба в максимальном доступном качестве.

Для скачивания выберите вариант из формы ниже:

  • Информация по загрузке:

Cкачать музыку I Hacked Obi Wan Kenobi Today - TryHackMe Hacking Tutorial бесплатно в формате MP3:

Если иконки загрузки не отобразились, ПОЖАЛУЙСТА, НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если у вас возникли трудности с загрузкой, пожалуйста, свяжитесь с нами по контактам, указанным в нижней части страницы.
Спасибо за использование сервиса video2dn.com

Описание к видео I Hacked Obi Wan Kenobi Today - TryHackMe Hacking Tutorial

Had to hack Obi Wan Kenobi today. :-D
As usual, everything was done on TryHackMe.

This is basically a summary of what I did:
Nmap: to map out the network and see what ports are open.
---- Found several sensitive ports: 21 (FTP), 22 (SSH), 111 (RPC), 445 (SMB).
---- Nmap scripts were used to enumerate available shares on SMB, as well as some sensitive directories on port 111 which was running rpcbind.
SMBClient and SMBGet to find files in the smb shares and download them onto the local machine.
In the sensitive directory, we found a log file that had a lot of sensitive information including a username (Kenobi) and an associated security key.
Then I used searchsploit to find exploits relative to the FTP version that was running.
Which was then used to mount the share directory and download the log file which contained the security key for Kenobi.
SSH into Kenobi's desktop using the security key.
Once in Kenobi's machine, ran a basic search for all files that had SUID permissions.
Several were found and one was usable to gain root access.
Got root access! Muahahaha

SurfShark (VPN & AntiVirus For Unlimited Devices For $2.20/mo):
--- https://bit.ly/SurfShark-FullPlan
TryHackMe Discount Link:
--- https://bit.ly/TryHackMe-Discount
Subscribe to learn more about Penetration Testing & Ethical Hacking.
--- https://bit.ly/HankHackerson-YouTube

Video Agenda:
01:10 The Tasks At Hand
09:19 TryHackMe Discount Link
09:52 Finding Open Ports (Nmap)
06:44 Enumerating Samba for Shares
26:21 Gain Initial Access With ProFTPd
39:03 Privilege Escalation / PATH Variable Manipulation
52:51 Review

Like, Share, & Subscribe to my "ethical" hacker journey. (Emphasis on the ethical :-P)

#ethicalhacker #ethicalhacking #hacker #hacking #cybersecurity #securityengineer #securityengineering #networksecurity #cybersecurityengineer #networksecurityengineer #tryhackme #pentest #pentesting #pentester #penetrationtest #penetrationtesting #penetrationtester #howtohack #howtobecomeahacker #smb #servermessageblock #nmap #nfs #networkfilesystem #ftp #filetransferprotocol

Комментарии

Информация по комментариям в разработке

Похожие видео

  • О нас
  • Контакты
  • Отказ от ответственности - Disclaimer
  • Условия использования сайта - TOS
  • Политика конфиденциальности

video2dn Copyright © 2023 - 2025

Контакты для правообладателей [email protected]