Get a reverse shell with ngrok and netcat - Gemini Pentest v2 Ep5
6.8 هزار بار بازدید -
2 سال پیش
-
#pentesting
#pentesting #ctf #hacking #metasploit #kalilinux #ssrf
Part 1: • H.A.C.K.E.R ALWAYS finds a way! - Gem...
Part 2: • How to Hunt for Bugs - Gemini Pentest...
Part 3: • Trust your Gut Instinct - Gemini Pent...
Part 4: • Will RCE in cookie give SSH access? -...
Part 5: • Get a reverse shell with ngrok and ne...
Part 6: • Redis privilege escalation Part 1 - G...
Part 7: • Redis privilege escalation Part 2 - G...
Hey what’s up? In this video series, I will h4ck the Gemini Pentest v2 CTF challenge. This episode will be dedicated to performing port scanning with nmap, then performing a directory bruteforce to find a registration feature. then creating a new user account that has to be activated. Then, I will bypass the activation feature, login, and explore the application features to hunt for bugs. We will then follow our gut instinct to turn a potential vulnerability into a promising lead. Then we will try to access the server using SSH by uploading our public key to the authorized_keys file. Since we can't achieve that, we will get a revere shell using ngrok and netcat.
🚀 🔥 Become a pentester
academy.thehackerish.com/p/from-zero-to-signing-yo…
📙 Learn the technical skills:
thehackerish.com/best-hacking-websites-for-ethical…
📙 Become a successful bug bounty hunter: thehackerish.com/a-bug-bounty-hunting-journey-book
🆓 Download your FREE Web hacking LAB and starting hacking NOW: thehackerish.com/owasp-top-10-lab-vm-free
🌐 Read more on the blog: thehackerish.com/
💪🏻 Support this work: thehackerish.com/how-to-support
- Facebook Page: www.facebook.com/thehackerish
- Follow us on Twitter: twitter.com/thehackerish
- Listen on Anchor: anchor.fm/thehackerish
- Listen on Spotify: open.spotify.com/show/4Ht8jEbPzyZnfbIlhFG91x
- Listen on Google Podcasts: podcasts.google.com/?feed=aHR0cHM6Ly9hbmNob3IuZm0v…
2 سال پیش
در تاریخ 1401/12/19 منتشر شده
است.
6,817
بـار بازدید شده