Главная
Study mode:
on
1
- Introduction
2
- Spinning up HTB's Lame
3
- Starting nmap scan / discussing alternative scan ideas
4
- Reviewing our scan results
5
- Enumerating SMB
6
- Exploiting SMB via username map script
7
- Linux post exploitation enumeration ideas
8
- Enumerating FTP and open ports
Description:
Dive into the second episode of a penetration testing tutorial series focused on exploiting a vulnerable machine named "Lame" on Hack The Box. Learn how to conduct an nmap scan, interpret results, enumerate SMB vulnerabilities, exploit the username map script, perform Linux post-exploitation enumeration, and investigate FTP and open ports. Gain practical insights into ethical hacking techniques and tools used by cybersecurity professionals to identify and address system weaknesses.

Pentesting for N00bs - Lame

Cyber Mentor
Add to list
0:00 / 0:00