برامجتقنياتتكنولوجياشروحات

Hack The Box – Knife – PHP & Sudo // CTF (Easy)

Hack The Box – Knife – PHP & Sudo // CTF (Easy)

#Hack #Box #Knife #PHP #Sudo #CTF #Easy

رابط تحميل الفيديو كامل HD .. <اضغط هنا>

كيف Hack The Box – Knife – PHP & Sudo // CTF (Easy)

Are you trying to solve the retired system Knife on Hack The Box?

** DISCLAIMER: DO NOT ATTEMPT THE TECHNIQUES FROM THIS VIDEO ON SYSTEMS THAT YOU ARE NOT AUTHORIZED TO DO SO. THIS VIDEO IS FOR EDUCATIONAL PURPOSES ONLY. **

Join this channel to get access to perks:
https://www.youtube.com/channel/UCbbBt23LHt4WhjiWh67NJ3w/join

Make sure to subscribe so you don’t miss new content!
https://www.youtube.com/channel/UCbbBt23LHt4WhjiWh67NJ3w?sub_confirmation=1

Looking to start a career in Information Security, Cyber Security, or Information Assurance? Check out all these resources to Get Started! https://www.jongood.com/getstarted/

Need CAREER COACHING or CONSULTING Services? https://www.jongood.com/services/

Hack The Box Quick Information:
-Easy Rating
-Linux Operating System

Hack The Box is a virtual hacking environment where you can learn to build your ethical hacking skills. As Cyber Security professionals, we must be familiar with how attackers are compromising systems and one of the most effective training methods is to use real tools on live systems. When you are learning hacking skills, you need to practice in a controlled environment and never attempt techniques on a system that you are not authorized by the owner to do so.

-Recommended ethical hacking books: https://www.amazon.com/shop/jongood?listId=3TDC41BD8Y4JZ&ref=cm_sw_tw_r_inf_list_own_jongood_dp_IxGHlA7PgRiB2
-Hack The Box: https://www.hackthebox.eu/

Blog Post: https://www.jongood.com/hack-the-box-knife-php-sudo-ctf-easy/

0:00 ⏩ Introduction
1:04 ⏩ Nmap scan
1:42 ⏩ Gobuster scan of website
1:56 ⏩ Browse website
2:48 ⏩ PHP-8.1.0-dev vulnerability for user.txt
6:45 ⏩ List privileges and sudo with knife (GTFOBins) to get root and root.txt
9:24 ⏩ Final Thoughts

** DISCLAIMER: DO NOT ATTEMPT THE TECHNIQUES FROM THIS VIDEO ON SYSTEMS THAT YOU ARE NOT AUTHORIZED TO DO SO. THIS VIDEO IS FOR EDUCATIONAL PURPOSES ONLY. **

#HackTheBox #Hacking #CyberSecurity

🔥Training Courses🔥
___________________________________________
Full List: https://www.jongood.com/courses/

👕Merch👕
___________________________________________
https://www.jongood.com/merch

📱Social Media📱
___________________________________________
Discord: https://jongood.com/discord
Facebook: https://jongood.com/facebook
Instagram: https://jongood.com/instagram
LinkedIn: https://jongood.com/linkedin
Twitter: https://jongood.com/twitter
Website: https://jongood.com/

⚡️Lab & YouTube Gear⚡️
___________________________________________
https://www.jongood.com/equipment/

📇Affiliates📇
___________________________________________
https://www.jongood.com/affiliates/

DISCLAIMER: I am an ambassador or affiliate for many of the brands referenced on the channel. As an Amazon Associate, I earn a commission from qualifying purchases.

DISCLAIMER (MUSIC): I only use royalty free music and sound effects.

#Hack #Box #Knife #PHP #Sudo #CTF #Easy

Jon Good,cybersecurity,education,technology,cyber security,data security,hack the box,hack the box tutorial,hackthebox,hacking,htb,ethical hacking,hack the box getting started,ctf,capture the flag,privilege escalation,writeup,scstoragepathfromurl,privesc,hacktheboxknife,hack the box knife,web,knife,penetration testing,pentesting,kali linux,hacker,nmap,hack thebox tutorial,gobuster,php,software vulnerability,linux vulnerability,php vulnerability,root.txt,user.txt