Главная
Study mode:
on
1
- Introduction and box overview
2
- Reviewing scan results
3
- Exploring port 8080
4
- Apache Tomcat default credentials
5
- Configuring Burp Suite
6
- Discussing Burp Suite intercepts, decoder, repeater, and intruder
7
- Building out a default credential list
8
- One line for loops for the win
9
- Using Burp intruder to test for default credentials
10
- Exploring Tomcat with found credentials
11
- Enumerating Tomcat, generating WAR reverse shells, and getting a shell
12
- Discussing post enumeration, certutil file transfers, Python HTTP servers, and improving a shell
Description:
Dive into the fifth episode of a penetration testing tutorial series focused on exploiting the "Jerry" box. Learn to analyze scan results, explore open ports, and leverage Apache Tomcat default credentials. Master Burp Suite configuration and features, including intercepts, decoder, repeater, and intruder. Discover techniques for building default credential lists and using one-line for loops. Practice using Burp intruder to test credentials, explore Tomcat with found access, and generate WAR reverse shells. Gain insights into post-exploitation enumeration, file transfers with certutil, setting up Python HTTP servers, and improving shell capabilities.

Pentesting for N00bs - Jerry

Cyber Mentor
Add to list
0:00 / 0:00