Главная
Study mode:
on
1
Introduction
2
What We’ll Be Covering
3
Mitre Attack Initial Access Techniques
4
Our Target Server
5
Infrastructure Overview
6
Let’s Get Started
7
Performing an nmap Scan
8
nmap Results
9
Accessing their Web Server
10
Analyzing the Web Application
11
Running a Directory Brute Force
12
Configuring the Hosts File
13
Tips for Enumerating a WordPress Site
14
Scanning a WordPress Site with wpscan
15
Working with Users as a Vector
16
SSH Brute Force with Hydra
17
Logging in with our Brute Forced Credentials
18
Enumerating Data on the Remote Server
19
Using netstat
20
How Do We Access the MySQL Database Server?
21
Listing Databases & Tables
22
Changing a Database User’s Password
23
Logging into wp-admin
24
Conclusion
Description:
Explore Linux red team exploitation techniques in this comprehensive video tutorial from the HackerSploit Red Team series. Learn about initial access methods like targeted spear phishing and exploiting vulnerabilities in public-facing web servers. Discover how to perform nmap scans, analyze web applications, conduct directory brute force attacks, and enumerate WordPress sites. Practice SSH brute force techniques using Hydra, access remote servers, and manipulate MySQL databases. Gain hands-on experience in penetration testing and ethical hacking as you work through practical examples on a target server. Master essential tools and strategies for red team operations, including wpscan, netstat, and WordPress admin access.

Linux Red Team Exploitation Techniques - Red Team Series

Linode
Add to list
0:00 / 0:00