Overview
Syllabus
- Introduction.
- Nmap scan review.
- Exploring port 80.
- Modifying /etc/hosts.
- Enumerating sub-domains.
- Using Dirb to find hidden directories and pages.
- Intercepting login requests with Burp.
- Using sqlmap to test for SQL injection.
- Building a custom SQL injection & Gaining a shell.
- Enumeration as the low-priv user.
- Bypassing application whitelisting using msbuild.
- Using certutil for file transfers & Gaining a Meterpreter shell.
- Using the capcom.sys exploit to elevate privileges.
- Discovering root.exe and reverse engineering the process.
Taught by
The Cyber Mentor