Рет қаралды 24,712
00:00 - Intro
01:00 - Start of nmap
03:30 - Poking at the website
04:20 - Finding a way to generate error messages
06:45 - Researching the error message
08:50 - Throwing a random exploit from the internet and getting a new error
11:40 - Trying another exploit but this one will make a HTTP Request back to our server
14:00 - Testing RCE with this exploit with a simple ping
15:50 - RCE Confirmed switching to a reverse shell
18:04 - Running LinPEAS
22:40 - Exploring the custom System Backup Timer Service
25:30 - Editing the Timer Backup Shell Script to get Root
26:25 - Extra Content - Explaining some forensics with time stamps
29:20 - Writing a quick script to search our path for files with full time stamps
31:25 - Cleaning up our notes.