Cyber Security | CTF | Vulnhub | Shuriken Node | Node.js Deserialization RCE | Manual PrivEsc

Cyber Security | CTF | Vulnhub | Shuriken Node | Node.js Deserialization RCE | Manual PrivEsc

125 Lượt nghe
Cyber Security | CTF | Vulnhub | Shuriken Node | Node.js Deserialization RCE | Manual PrivEsc
In this video, I walk you through the complete exploitation of the Shuriken:Node machine from Vulnhub. We start with manual web application enumeration, discovering an encoded cookie even before authentication. An Nmap scan reveals the application is running on a Node.js framework, leading me to exploit a Node.js deserialization vulnerability for Remote Code Execution (RCE), inspired by Opsecx's blog guide. After gaining an initial foothold, we continue manual post-exploitation enumeration and find a ZIP file containing a private SSH key. Using ssh2john and John the Ripper, we crack the private key password. Finally, we escalate privileges by manipulating a custom service on the machine. 🔵 Techniques covered: Manual Web Enumeration Node.js Deserialization Exploitation for RCE SSH Key Cracking with ssh2john and John the Ripper Custom Service Abuse for Privilege Escalation 🔵 Keywords: Vulnhub, Shuriken Node Walkthrough, Node.js Exploit, Deserialization Vulnerability, Privilege Escalation, John the Ripper SSH, Manual Pentesting, CTF, Cybersecurity Training, Ethical Hacking If you enjoy hands-on hacking and manual enumeration strategies, don’t forget to Like, Subscribe, and Comment your thoughts! #Vulnhub #ShurikenNode #NodejsRCE #PrivilegeEscalation #CTFWalkthrough #Pentesting #Cybersecurity #ctf #kali #informationsecurity #linuxcommandlinetutorial #johntheripper #linuxadministration #linuxcommandline #hacker #oscp #pentesting #RedTeam #HackTheBox #TryHackMe #BugBounty #KaliLinux #CTFLearn #CyberSecTraining #cyberawareness #LinuxEnum #PenetrationTesting #Infosec #HackingTutorial #LinuxSecurity #CTFWriteup