From the course: Kali Linux for Advanced Pen Testing and Ethical Hacking
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Hiding in plain sight - Linux Tutorial
From the course: Kali Linux for Advanced Pen Testing and Ethical Hacking
Hiding in plain sight
- [Instructor] Let's take a look at Port 1524 on Metasploitable. nmap -PS -sV - p1524 10.0.2.8, and it's reported there's a Metasploitable root shell. Let's see. telnet 10.0.2.8 1524, and we're in root at Metasploitable. And it is root. Someone set up a convenient, quick shell access for themselves and hoped it would be hidden. We don't need to exploit a target if someone's left a door open for us.
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
-
(Locked)
Targeting Metasploitable44s
-
(Locked)
Exploiting VSFTPD3m 22s
-
(Locked)
Exploiting with ProFTPD4m 52s
-
(Locked)
Exploiting Tomcat2m 58s
-
(Locked)
Exploiting IRC1m 23s
-
(Locked)
Exploiting the distributed compile system1m 35s
-
(Locked)
Exploiting network files2m 59s
-
(Locked)
Hiding in plain sight43s
-
(Locked)
Escalating to root5m 18s
-
(Locked)
-
-
-
-