Published On Sep 5, 2023
#pentesting #ctf #hacking #cybersecurity
00:00 - intro
00:33 - Disclaimer
00:43 - Mapping the website
02:15 - Directory listing
04:03 - Hidden portal
05:42 - Bruteforce
06:04 - More enumeration
06:53 - FTP access
07:12 - SSH hacking
08:22 - Another website
09:16 - Interesting file
10:59 - Read arbitrary files
14:11 - More enumeration
14:52 - Backup file with htpassword hash
15:17 - Cracked the hash
16:19 - File upload
22:50 - Remote Code Execution
24:17 - Privilege escalation
25:25 - Website defaced
DISCLAIMER: The techniques shown here should strictly be used on targets you HAVE permission to test. NEVER hack something you don't have permission to.
In this video, I demonstrate how to hack a CTF target, get root, and deface it in just a few minutes. Web developers will learn a lot on how to secure their websites! Ethical hackers will learn hacking techniques to help their clients become more secure.
Credit: Challenge ch4inrulz: 1.0.1 from @mohammadaskar2
🔥Use Coupon THEHACKERISH and Get 5% discount on CRTP and other courses on https://www.alteredsecurity.com/ when you pay with Stripe.
🚀 🔥 Become a pentester
https://academy.thehackerish.com/p/fr...
📙 Learn the technical skills:
https://thehackerish.com/best-hacking...
📙 Become a successful bug bounty hunter: https://thehackerish.com/a-bug-bounty...
🆓 Download your FREE Web hacking LAB and starting hacking NOW: https://thehackerish.com/owasp-top-10...
🌐 Read more on the blog: https://thehackerish.com
🇩 Discord: / discord
💪🏻 Support this work: https://thehackerish.com/how-to-support
Facebook Page: / thehackerish
Follow us on Twitter: / thehackerish
Listen on Anchor: https://anchor.fm/thehackerish
Listen on Spotify: https://open.spotify.com/show/4Ht8jEb...
Listen on Google Podcasts: https://podcasts.google.com/?feed=aHR...