Videos

Published on May 23rd, 2019 📆 | 1804 Views ⚑

0

DC-1:5 – VulnHub Walkthrough


high definition tts



0:10 - Nmap Server Version/Default Scripts
1:14 - Suspecting Vulnerability via Copything(2017-2018-2019-2020)
3:15 - Creating a wordlist with different default files
3:40 - Creating a wordlist with different value names
4:11 - Wfuzz Web Application Brute Force
6:06 - BurpSuite Repeater for LFI(Local File Inclusion)
---------- Problems with Machine ----------------------
7:25 - Local File Inclusion(/etc/passwd)
7:58 - Error Poisoning with BurpSuite Repeater
14:30 - Error Log Poisoning with cmd commmand
14:35 - Using Error Log Poisoning and whoami Command
14:40 - Using Error Log Poisoning and ls Command
15:22 - Get a Reverse Shell from Error Poisoning with nc
15:25 - Upgrade Shell to Full Interactive TTY
15:56 - Building Meterpreter Stageless Payload with MSFVenom
17:14 - Use python HTTPServer
17:15 - Uploading the shell on the server
17:25 - Gives execute permissions
17:34 - Use Metasploit to get Meterpreter Session
18:31 - Upgrade Shell to Full Interactive TTY
18:45 - Exploiting SUID Executables
19:17 - Screen 4.5.0 Exploit-db(POC)
19:34 - Screen 4.5.0 Exploit Testing(POC)
20:09 - Screen 4.5.0 Local Privilege Escalation
20:40 - Creating libhax.c / rootshell file from exploit
22:35 - GCC Compile Exploit
26:52 - Upload Files on the Server
27:41 - Exploiting Screen 4.5.0

https://www.vulnhub.com/entry/dc-5,314/

source





Tagged with:



0 Responses to DC-1:5 – VulnHub Walkthrough