Vulnlab | Wutai: Initial Enumeration, Password Spraying & Getting Access via VDI

  Рет қаралды 9,094

xct

xct

Күн бұрын

Пікірлер: 12
@lonelyorphan9788
@lonelyorphan9788 Жыл бұрын
Thank you for making this 🙂
@ITSecurityLabs
@ITSecurityLabs Жыл бұрын
Great lab man! I need to try it soon, and maybe make a walkthrough as well!
@uaebikers
@uaebikers Жыл бұрын
Excellent video
@abdessalam8468
@abdessalam8468 Жыл бұрын
❤❤❤❤❤❤
@MrCipek1221
@MrCipek1221 Жыл бұрын
Great video man Keep up! But what I'd love to see is that when you say i.e. "I already have modified hostnames to automatically resolve" I actually want to see how did you modified that /etc/hosts file. This is just an example. I'd love you to not leave us behind any of your actions. But that's only my suggestion. Nevertheless, great video:)
@Tkeechy
@Tkeechy Жыл бұрын
This video got recommended to me and I just checked out your platform, Are the boxes more 'real life' than other platforms? Im looking at making a career switch into Cyber Security and find I may have fallen into bad habits with CTF style machines.
@xct_de
@xct_de Жыл бұрын
The labs are pretty real life. This one specifically was made to break those habits (multiple paths, not always technical challenges - instead often human error, you can't exploit everything etc.)
@d3m0n_404
@d3m0n_404 Жыл бұрын
ooooooo Cool!!!!!!!!!!!!
@robertofolikwei23
@robertofolikwei23 Жыл бұрын
Great videos , xct can you clarify this for me, the process of getting the internal subnet. Did you scan the localhost after setting up the proxy via proxychains. Can you share any resources on this ?
@wunderjoseph1136
@wunderjoseph1136 Жыл бұрын
This is exact problem am having please did you get the solution for this ?
@shayarand
@shayarand Жыл бұрын
can you explain how you're using proxychains? This didnt have anything to do with the web-proxy correct?
@xct_de
@xct_de Жыл бұрын
The web proxy is open from both sides so we can use proxychains to tunnel through it from the external / attacker side.
Vulnlab | Wutai: Writing a Loader & Getting a Beacon
12:59
КОНЦЕРТЫ:  2 сезон | 1 выпуск | Камызяки
46:36
ТНТ Смотри еще!
Рет қаралды 3,7 МЛН
3 Levels of WiFi Hacking
22:12
NetworkChuck
Рет қаралды 2,4 МЛН
Remotely Control Any PC with this FREE Software!
15:05
Loi Liang Yang
Рет қаралды 24 М.
Vulnlab | Wutai: Reverse Engineering & Lateral Movement
15:03
Linus Torvalds on why desktop Linux sucks
11:07
gentooman
Рет қаралды 1,5 МЛН