Vulnerable Software || Linux Privilege Escalation

Поділитися
Вставка
  • Опубліковано 15 лип 2024
  • Learn how vulnerable software can be utilized to perform Privilege Escalation and understand the vulnerabilities in applications like MySQL and Sudo.
    🔒 Welcome to The Cyber Expert! 🔒
    🌐 Website: thetce.com
    ❤️ Support the channel by donating at: thetce.com/support
    🌟 Join our vibrant community on Discord: / discord
    🔔 Join this channel and unlock exclusive perks:
    / @thecyberexpert
    📺 Visit My Channel For More Exciting Videos:
    / @thecyberexpert
    🌎 Where else can you find me? 🌎
    🔬 GITHUB: www.github.com/Hellsender01
    📷 INSTAGRAM: / harshitjoshi01
    🔗 LINKEDIN: / harshitjoshi01
    🐦 TWITTER: / thecyberexpert_
    📧 EMAIL: hj202001@gmail.com
    🙏 Thank you for watching! 🙏
    🔥 Stay tuned for the latest updates and intriguing content from The Cyber Expert.
    Timestamps:
    00:00 - Connecting To Our Lab
    01:09 - Understanding Vulnerable Software
    02:46 - Discovering Vulnerable Software
    04:26 - Getting Shell With MySQL UDF Vulnerability
    18:54 - Connecting To Our Second Lab
    19:29 - Getting Shell With Sudo Vulnerability
    22:49 - Outro
    23:03 - Support
    🎵 Music in this video: "The Way" by LiQWYD
    🎧 Free Download / Stream: bit.ly/3HGU9tD
    🎵 Music promoted by Audio Library: • The Way - LiQWYD (No C...
    ✨ Remember to like, share, and subscribe for more engaging cybersecurity adventures. Stay ahead in the cyber world with The Cyber Expert! ✨
    #thecyberexpert
    #harshitjoshi
    #lpe
  • Наука та технологія

КОМЕНТАРІ • 12