Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Dive into the second episode of a penetration testing tutorial series focused on exploiting a vulnerable machine named "Lame" on Hack The Box. Learn how to conduct an nmap scan, interpret results, enumerate SMB vulnerabilities, exploit the username map script, perform Linux post-exploitation enumeration, and investigate FTP and open ports. Gain practical insights into ethical hacking techniques and tools used by cybersecurity professionals to identify and address system weaknesses.
Syllabus
- Introduction.
- Spinning up HTB's Lame.
- Starting nmap scan / discussing alternative scan ideas.
- Reviewing our scan results.
- Enumerating SMB.
- Exploiting SMB via username map script.
- Linux post exploitation enumeration ideas.
- Enumerating FTP and open ports.
Taught by
The Cyber Mentor