Hack The Box – Knife – PHP & Sudo // CTF (Easy)
Are you trying to solve the retired system Knife on Hack The Box?
** DISCLAIMER: DO NOT ATTEMPT THE TECHNIQUES FROM THIS VIDEO ON SYSTEMS THAT YOU ARE NOT AUTHORIZED TO DO SO. THIS VIDEO IS FOR EDUCATIONAL PURPOSES ONLY. **
Join this channel to get access to perks:
https://www.youtube.com/channel/UCbbBt23LHt4WhjiWh67NJ3w/join
Make sure to subscribe so you don't miss new content!
https://www.youtube.com/channel/UCbbBt23LHt4WhjiWh67NJ3w?sub_confirmation=1
Looking to start a career in Information Security, Cyber Security, or Information Assurance? Check out all these resources to Get Started! https://www.jongood.com/getstarted/
Need CAREER COACHING or CONSULTING Services? https://www.jongood.com/services/
Hack The Box Quick Information:
-Easy Rating
-Linux Operating System
Hack The Box is a virtual hacking environment where you can learn to build your ethical hacking skills. As Cyber Security professionals, we must be familiar with how attackers are compromising systems and one of the most effective training methods is to use real tools on live systems. When you are learning hacking skills, you need to practice in a controlled environment and never attempt techniques on a system that you are not authorized by the owner to do so.
-Recommended ethical hacking books: https://www.amazon.com/shop/jongood?listId=3TDC41BD8Y4JZ&ref=cm_sw_tw_r_inf_list_own_jongood_dp_IxGHlA7PgRiB2
-Hack The Box: https://www.hackthebox.eu/
Blog Post: https://www.jongood.com/hack-the-box-knife-php-sudo-ctf-easy/
0:00 ⏩ Introduction
1:04 ⏩ Nmap scan
1:42 ⏩ Gobuster scan of website
1:56 ⏩ Browse website
2:48 ⏩ PHP-8.1.0-dev vulnerability for user.txt
6:45 ⏩ List privileges and sudo with knife (GTFOBins) to get root and root.txt
9:24 ⏩ Final Thoughts
** DISCLAIMER: DO NOT ATTEMPT THE TECHNIQUES FROM THIS VIDEO ON SYSTEMS THAT YOU ARE NOT AUTHORIZED TO DO SO. THIS VIDEO IS FOR EDUCATIONAL PURPOSES ONLY. **
#HackTheBox #Hacking #CyberSecurity
🔥Training Courses🔥
___________________________________________
Full List: https://www.jongood.com/courses/
👕Merch👕
___________________________________________
https://www.jongood.com/merch
📱Social Media📱
___________________________________________
Discord: https://jongood.com/discord
Facebook: https://jongood.com/facebook
Instagram: https://jongood.com/instagram
LinkedIn: https://jongood.com/linkedin
Twitter: https://jongood.com/twitter
Website: https://jongood.com/
⚡️Lab & YouTube Gear⚡️
___________________________________________
https://www.jongood.com/equipment/
📇Affiliates📇
___________________________________________
https://www.jongood.com/affiliates/
DISCLAIMER: I am an ambassador or affiliate for many of the brands referenced on the channel. As an Amazon Associate, I earn a commission from qualifying purchases.
DISCLAIMER (MUSIC): I only use royalty free music and sound effects.
Видео Hack The Box – Knife – PHP & Sudo // CTF (Easy) канала Jon Good
** DISCLAIMER: DO NOT ATTEMPT THE TECHNIQUES FROM THIS VIDEO ON SYSTEMS THAT YOU ARE NOT AUTHORIZED TO DO SO. THIS VIDEO IS FOR EDUCATIONAL PURPOSES ONLY. **
Join this channel to get access to perks:
https://www.youtube.com/channel/UCbbBt23LHt4WhjiWh67NJ3w/join
Make sure to subscribe so you don't miss new content!
https://www.youtube.com/channel/UCbbBt23LHt4WhjiWh67NJ3w?sub_confirmation=1
Looking to start a career in Information Security, Cyber Security, or Information Assurance? Check out all these resources to Get Started! https://www.jongood.com/getstarted/
Need CAREER COACHING or CONSULTING Services? https://www.jongood.com/services/
Hack The Box Quick Information:
-Easy Rating
-Linux Operating System
Hack The Box is a virtual hacking environment where you can learn to build your ethical hacking skills. As Cyber Security professionals, we must be familiar with how attackers are compromising systems and one of the most effective training methods is to use real tools on live systems. When you are learning hacking skills, you need to practice in a controlled environment and never attempt techniques on a system that you are not authorized by the owner to do so.
-Recommended ethical hacking books: https://www.amazon.com/shop/jongood?listId=3TDC41BD8Y4JZ&ref=cm_sw_tw_r_inf_list_own_jongood_dp_IxGHlA7PgRiB2
-Hack The Box: https://www.hackthebox.eu/
Blog Post: https://www.jongood.com/hack-the-box-knife-php-sudo-ctf-easy/
0:00 ⏩ Introduction
1:04 ⏩ Nmap scan
1:42 ⏩ Gobuster scan of website
1:56 ⏩ Browse website
2:48 ⏩ PHP-8.1.0-dev vulnerability for user.txt
6:45 ⏩ List privileges and sudo with knife (GTFOBins) to get root and root.txt
9:24 ⏩ Final Thoughts
** DISCLAIMER: DO NOT ATTEMPT THE TECHNIQUES FROM THIS VIDEO ON SYSTEMS THAT YOU ARE NOT AUTHORIZED TO DO SO. THIS VIDEO IS FOR EDUCATIONAL PURPOSES ONLY. **
#HackTheBox #Hacking #CyberSecurity
🔥Training Courses🔥
___________________________________________
Full List: https://www.jongood.com/courses/
👕Merch👕
___________________________________________
https://www.jongood.com/merch
📱Social Media📱
___________________________________________
Discord: https://jongood.com/discord
Facebook: https://jongood.com/facebook
Instagram: https://jongood.com/instagram
LinkedIn: https://jongood.com/linkedin
Twitter: https://jongood.com/twitter
Website: https://jongood.com/
⚡️Lab & YouTube Gear⚡️
___________________________________________
https://www.jongood.com/equipment/
📇Affiliates📇
___________________________________________
https://www.jongood.com/affiliates/
DISCLAIMER: I am an ambassador or affiliate for many of the brands referenced on the channel. As an Amazon Associate, I earn a commission from qualifying purchases.
DISCLAIMER (MUSIC): I only use royalty free music and sound effects.
Видео Hack The Box – Knife – PHP & Sudo // CTF (Easy) канала Jon Good
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![Chinese Keyboard Apps Have Data Leaking Vulnerabilities](https://i.ytimg.com/vi/KickubF467s/default.jpg)
![GDPR Fines For Companies is Increasing // Meta Biggest Offender](https://i.ytimg.com/vi/IKapRMUDmyw/default.jpg)
![HUGE Payroll Data Breach of UK Military Personnel](https://i.ytimg.com/vi/eiNSzVYSTnk/default.jpg)
![New Regulations Aimed at Artificial Intelligence Models](https://i.ytimg.com/vi/mhGl_sb-yvc/default.jpg)
![UK Government Focusing on Improving Supply Chain Security](https://i.ytimg.com/vi/oTsHMU5YnAU/default.jpg)
![You pick the cybersecurity content that I make! GO VOTE!](https://i.ytimg.com/vi/FaCW6-haG-M/default.jpg)
![Black Basta Ransomware Affiliates Breached Over 500 Organizations](https://i.ytimg.com/vi/YaEuL8h1hg4/default.jpg)
![Should you learn DATABASES for CYBERSECURITY?](https://i.ytimg.com/vi/p3Rp2O_a-Gc/default.jpg)
![AI Used to Fly F-16 Fighter Jet // DARPA Project](https://i.ytimg.com/vi/eqlAbrMib4w/default.jpg)
![More Government Scrutiny on Supply Chain Security](https://i.ytimg.com/vi/IGRtErmSp7Q/default.jpg)
![XZ Utils Library Allows Unauthorized Remote Access on Linux](https://i.ytimg.com/vi/S08GFGBqYF8/default.jpg)
![Cyber Army of Russia Hacks Power Plant in Indiana](https://i.ytimg.com/vi/nx4O2dMiUcE/default.jpg)
![is the CEH worth it for a CYBERSECURITY career?](https://i.ytimg.com/vi/NUSDT6nYopI/default.jpg)
![Linux Tutorial For Beginners: File and Folder Permissions](https://i.ytimg.com/vi/NhwJ22TEIhg/default.jpg)
![Federal Contractors Paid $11.3 Million in Fines For Not Testing Cybersecurity](https://i.ytimg.com/vi/TojquAGqE1M/default.jpg)
![CISOs are the Hacking Attack Scapegoat // Uber Hacked](https://i.ytimg.com/vi/haR4jQktPpA/default.jpg)
![🔴 Threat Intel (06/19/22 to 06/25/22) // Cyber Security TLDR](https://i.ytimg.com/vi/bYZFPN2JWw4/default.jpg)
![Senators Say Consumer Drones Make Critical Infrastructure Vulnerable](https://i.ytimg.com/vi/6XgOynDKeEA/default.jpg)
![AI-Generated YouTube Videos Spreading Malware](https://i.ytimg.com/vi/7Pot7EkYtOw/default.jpg)
![UN Cybercrime Treaty to be Released in June 2023](https://i.ytimg.com/vi/941Ja9TG2Hs/default.jpg)
![GitHub Disrupts Redline Malware Efforts With Repo Takedown](https://i.ytimg.com/vi/z3IOdt6h4tI/default.jpg)