Published On Mar 4, 2021
This video shows how to an RCE or a Remote Code Execution vulnerability to hack a target server, then manually search for a local exploit to escalate privileges to system.
All of the above is done to hack and root he Optimum machine in hackthebox.
✳️ Checkout Dimitris's own YouTube channel 👇
/ @ectos
---------------------------------------------------------------
Our VIP Membership:
https://zsecurity.org/vip-membership/
---------------------------------------------------------------
🧠 My hacking courses 👇
https://zsecurity.org/courses/
---------------------------------------------------------------
Website - https://zsecurity.org/
Facebook - / zsecurity-1453250781458287
Twitter - / _zsecurity_
Instagram - / zsecurity_org
Linkedin - / zsecurity-org
---------------------------------------------------------------
⚠️ This video is made for educational purposes only, we only test devices and systems that we own or have permission to test, you should not test the security of devices that you do not own or do not have permission to test. ⚠️