#pentesting #ctf #hacking #cybersecurity #php
00:00 - intro
00:08 - Disclaimer
00:19 - Mapping
02:23 - Digging
03:24 - Attempting file read
04:30 - Interesting log
04:50 - Log poisoning
05:44 - Remote Code Execution
06:38 - Log script
07:30 - Filter Bypass
08:30 - Command injection and Privilege escalation
09:41 - Exposing the dark secret
DISCLAIMER: The techniques shown here should strictly be used on targets you HAVE permission to test. NEVER hack something you don't have permission to.
In this video, I demonstrate how to hack a CTF target and get root in just a few minutes. Web developers will learn a lot on how to secure their websites! Ethical hackers will learn hacking techniques to help their clients become more secure.
Credit: Challenge The Ether: EvilScience (v1.0.1) from f1re_w1re (https://www.vulnhub.com/author/f1re_w1re,560/)
🔥Use Coupon THEHACKERISH and Get 5% discount on CRTP and other courses on https://www.alteredsecurity.com/ when you pay with Stripe.
🚀 🔥 Become a pentester
https://academy.thehackerish.com/p/from-zero-to-signing-your-first-ethical-hacker-job?utm_source=social&utm_medium=youtube&utm_campaign=desc
📙 Learn the technical skills:
https://thehackerish.com/best-hacking-websites-for-ethical-hackers/
📙 Become a successful bug bounty hunter: https://thehackerish.com/a-bug-bounty-hunting-journey-book
🆓 Download your FREE Web hacking LAB and starting hacking NOW: https://thehackerish.com/owasp-top-10-lab-vm-free
🌐 Read more on the blog: https://thehackerish.com
🇩 Discord: https://discord.gg/2ykmr2ynpf
💪🏻 Support this work: https://thehackerish.com/how-to-support
- Facebook Page: https://www.facebook.com/thehackerish
- Follow us on Twitter: https://twitter.com/thehackerish
- Listen on Anchor: https://anchor.fm/thehackerish
- Listen on Spotify: https://open.spotify.com/show/4Ht8jEbPzyZnfbIlhFG91x
- Listen on Google Podcasts: https://podcasts.google.com/?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy8xYTVkYTgxYy9wb2RjYXN0L3Jzcw%3D%3D