Linux Red Team Exploitation Techniques | Red Team Series 4-13

Subscribers:
1,040,000
Published on ● Video Link: https://www.youtube.com/watch?v=3TLIPlJKkYA



Category:
Guide
Duration: 31:25
2,023 views
59


This guide is part of the HackerSploit Red Team series of guides. In this video, we will cover Exploitation Techniques for Linux systems. Techniques used to gain a foothold include targeted spear phishing and exploiting weaknesses on public-facing web servers. Footholds gained through initial access may allow for continued access, like valid accounts and use of external remote services, or may be limited use due to changing passwords.

Chapters:
0:00 Introduction
0:39 What We’ll Be Covering
1:07 Mitre Attack Initial Access Techniques
1:32 Our Target Server
2:24 Infrastructure Overview
2:55 Let’s Get Started
3:10 Performing an nmap Scan
5:18 nmap Results
6:48 Accessing their Web Server
7:08 Analyzing the Web Application
7:50 Running a Directory Brute Force
12:15 Configuring the Hosts File
13:30 Tips for Enumerating a WordPress Site
14:12 Scanning a WordPress Site with wpscan
17:04 Working with Users as a Vector
17:47 SSH Brute Force with Hydra
20:12 Logging in with our Brute Forced Credentials
20:40 Enumerating Data on the Remote Server
21:59 Using netstat
22:45 How Do We Access the MySQL Database Server?
25:56 Listing Databases & Tables
27:45 Changing a Database User’s Password
29:22 Logging into wp-admin
30:49 Conclusion

New to Linode? Get started here with a $100 credit → https://www.linode.com/linodetube
Read the doc for more information on Exploitation Techniques → https://www.linode.com/docs/guides/windows-red-team-exploitation-techniques/
Learn more about Hackersploit https://www.linode.com/docs/guides/hackersploit-red-team-series/
Subscribe to get notified of new episodes as they come out → https://www.youtube.com/linode?sub_confirmation=1

#Linode #Security #RedTeam #Hackersploit
Product: Linode, Security, Red Team; Hackersploit;




Other Videos By Akamai Developer


2022-04-18Windows Defense Evasion Techniques | Red Team Series 7-13
2022-04-15Homer Server Dashboard | Visualize Your Containers and Services Simply and Easily
2022-04-13MySQL for Beginners Part 2 | Working With Data
2022-04-11Windows Red Team Credential Access Techniques | Red Team Series 6-13
2022-04-08High Availability Explained | How to Upgrade to High Availability with Linode Kubernetes Engine
2022-04-06Intro to MySQL For Beginners Part 1 | Common Commands
2022-04-05Running a basic Ansible Playbook installing Nginx #shorts
2022-04-04Windows Red Team Persistence Techniques | Red Team Series 5-13
2022-04-01RocketChat | Fast, Secure, Open Source Communication
2022-03-30Managing Your Own Databases is a Task of the Past with Linode's Managed Database Platform
2022-03-28Linux Red Team Exploitation Techniques | Red Team Series 4-13
2022-03-25Installing TensorFlow on an Ubuntu Server
2022-03-23Speed Up Your SSH Sessions with These Seven Quick SSH Config Tricks
2022-03-21Windows Red Team Exploitation Techniques | Red Team Series 3-13
2022-03-18Connect Your Docker Containers to Domain Names For Easy Access using Portainer on Linode
2022-03-16How to Reset SSH Host Keys when Deploying Linux Templates in Proxmox
2022-03-14Red Team Recon Techniques | Red Team Series 2-13
2022-03-11Linode Dedicated CPUs Explained | Dedicated vs Shared CPU Instances
2022-03-10Use Terraform for FAST Automated deployments #shorts
2022-01-24Manage Docker Containers from a Web UI with Yacht Interactive Dashboards
2022-01-21Choosing the Right Linux Distribution | Pros & Cons of the Top 7 Server Distros



Tags:
linode
linux
cloud computing
alternative cloud
linux server
open source
sysadmin
red team
red teaming
cyber security
ethical hacking
penetration testing
cyber security training
what is a red team
red team vs blue team
information security
hacker exploit
kali linux
cyber security course
cyber security training for beginners
cyber security full course
red team versus blue team
red team review
red team blue team
information security tutorial