VulnHub Kioptrix Level 11 CTF Walkthrough Stepbystep with Explanations
>> YOUR LINK HERE: ___ http://youtube.com/watch?v=1Lvze47K60o
#vulnhub Kioptrix Level 1.1 #ctf #walkthrough - Step-by-step with Explanations • π Download Kioptrix Level 1.1 and try it yourself as you practice for your #oscp π • https://www.vulnhub.com/entry/kioptri... • π PLAYLIST: VulnHub Boxes CTF Walkthrough - Step-by-step with Explanations (Beginner Friendly) π • • VulnHub Boxes CTF Walkthrough - Step-... • π¨π» Need an installation guide to setup and run your own VM for free? π©π» • 1. Installation Guide for VMware Workstation Player π • How to setup any Virtual Machines (VM... • 2. Installation Guide for VirtualBox π • How to setup any Virtual Machines (VM... • π Thanks for watching my video! π • If you like it, please SHARE, COMMENT, LIKE and SUBSCRIBE for more upcoming videos regarding #cybersecurity #bugbounty #ethicalhacking π • π¬ Follow me on Social Media π¬ • / kongwenbin • / kongwenbin • https://infosec.exchange/@kongwenbin • https://threads.net/@kongwenbin_ • / kongwenbin_ • / kongwenbin • π Check out my personal blog π • https://kongwenbin.com • β οΈ Disclaimer β οΈ • Unauthorized hacking is illegal! Always seek permission to conduct any #security testing. In all of my #hacking videos, I set up the targets within my home lab, so I have granted permission to myself to conduct all kinds of security testing within my own home lab π • π Chapters π • 00:00 Sneak Peak • 01:34 Introduction • 02:39 Prepare target machine (Kioptrix Level 1.1) • 03:35 Prepare attacker machine (kali linux) • 05:35 Identify hosts and perform port scan • 06:17 Assess target machine's web application • 07:24 SQL injection exploitation to login • 13:06 Binaries enumeration for attack path • 17:52 Execute reverse shell to gain low privilege access • 18:46 Enumeration for privilege escalation • 21:08 Look for publicly known kernel exploits • 24:14 Transfer and compile the exploit • 27:45 Run the exploit to become root
#############################
