Master IGNITION on Hack The Box | Kali Linux Challenge
I’ll walk you through Hack The Box’s Ignition box using Kali Linux. This machine is part of the Starting Point series, designed for beginners in penetration testing. These notes will reinforce what we've covered, focusing on some essential pentesting techniques.
- Service Discovery: We used nmap to scan for open ports and services, which revealed an nginx web server. This step introduces you to identifying services on a target machine.
- Virtual Host Resolution: The box redirects to ignition.htb, which requires editing the /etc/hosts file to resolve the domain name locally. This teaches you how to handle DNS resolution.
- Directory Enumeration: Using gobuster, we brute-forced directories to locate the Magento admin page. This technique is essential for finding hidden or sensitive web directories.
- Exploitation of Misconfigurations: We exploited weak credentials on the Magento login, demonstrating how to gain unauthorized access to a web application by using default or weak passwords.
- This walkthrough is designed to help you understand these fundamental penetration testing techniques and are ready to tackle more complex challenges in the future. Keep practicing, and I'll see you in the next tutorial!
Join My Discord Channel: https://discord.gg/YUf3VpDeNH
CHAPTERS:
00:00 - Intro
00:27 - Nmap
02:48 - Gobuster
05:12 - Burp
▀█▀▐░░░░░░░░▐
░█░▐▀█░▀█▐▀█▐▐▀▐░█▐▀█▐░█
░█░▐░█▐▀█▐░█▐▌░▐▄█▐░█▐░█
░█░▐░█▐▄█▐░█▐▐▄▄▄█▐▄█▐▄█
🤓 Follow Me:
https://www.tiktok.com/@getcyber
https://www.linkedin.com/in/danduran-ca/
https://getcyber.me
Видео Master IGNITION on Hack The Box | Kali Linux Challenge канала GetCyber
- Service Discovery: We used nmap to scan for open ports and services, which revealed an nginx web server. This step introduces you to identifying services on a target machine.
- Virtual Host Resolution: The box redirects to ignition.htb, which requires editing the /etc/hosts file to resolve the domain name locally. This teaches you how to handle DNS resolution.
- Directory Enumeration: Using gobuster, we brute-forced directories to locate the Magento admin page. This technique is essential for finding hidden or sensitive web directories.
- Exploitation of Misconfigurations: We exploited weak credentials on the Magento login, demonstrating how to gain unauthorized access to a web application by using default or weak passwords.
- This walkthrough is designed to help you understand these fundamental penetration testing techniques and are ready to tackle more complex challenges in the future. Keep practicing, and I'll see you in the next tutorial!
Join My Discord Channel: https://discord.gg/YUf3VpDeNH
CHAPTERS:
00:00 - Intro
00:27 - Nmap
02:48 - Gobuster
05:12 - Burp
▀█▀▐░░░░░░░░▐
░█░▐▀█░▀█▐▀█▐▐▀▐░█▐▀█▐░█
░█░▐░█▐▀█▐░█▐▌░▐▄█▐░█▐░█
░█░▐░█▐▄█▐░█▐▐▄▄▄█▐▄█▐▄█
🤓 Follow Me:
https://www.tiktok.com/@getcyber
https://www.linkedin.com/in/danduran-ca/
https://getcyber.me
Видео Master IGNITION on Hack The Box | Kali Linux Challenge канала GetCyber
Комментарии отсутствуют
Информация о видео
24 сентября 2024 г. 19:10:25
00:08:23
Другие видео канала













![Rapid Response to Today's Threats - [Webinar]](https://i.ytimg.com/vi/-5qhxpMfOyo/default.jpg)






