Student Reviews
( 5 Of 5 )
1 review
Video of Web Application Exploitation & Linux Privielge Escalation EP2 Metasploitable 1 Walkthrough in Metasploit Framework course by Motasem Hamdan Cyber Security & Tech channel, video No. 26 free certified online
In this video walkthrough, we covered the first part of Metasploitable 1 lab where we demonstrated Twiki exploitation and Linux privielge escalation through kernel exploitation.
Receive Cyber Security Field Notes and Special Training Videos
https://buymeacoffee.com/notescatalog/membership
Writeup
https://motasem-notes.net/metasploitable-1-complete-walkthrough-tutorial/
Store
https://buymeacoffee.com/notescatalog/extras
Patreon
https://www.patreon.com/motasemhamdan
LinkedIn
[1]: https://www.linkedin.com/in/motasem-hamdan-7673289b/
[2]: https://www.linkedin.com/in/motasem-eldad-ha-bb42481b2/
Instagram
https://www.instagram.com/mastermindstudynotes/
Google Profile
https://maps.app.goo.gl/eLotQQb7Dm6aiL8z6
Twitter
https://twitter.com/ManMotasem
Facebook
https://www.facebook.com/motasemhamdantty/
0:00 Introduction to the Metasploitable Vulnerability
0:17 Overview of the Exploit Approach
0:39 Accessing the Web Server
1:11 Using Nmap to Discover Vulnerabilities
2:00 Launching the Exploit with Metasploit
2:52 Configuring the Exploit Payload
4:02 Establishing Initial Shell Access
5:03 Privilege Escalation Preparation
5:53 Identifying Kernel Vulnerabilities
7:14 Choosing an Exploit for Linux 2.6
8:01 Configuring Udev Privilege Escalation Exploit
10:07 Exploit Execution and Verification
13:24 Gaining Root Access
13:41 Conclusion and Upcoming Tutorials