DerpNStink CTF: Mastering Server Access – Part 1 πŸ”“

Join us as we explore how to gain access to the server in the DerpNStink CTF. Enhance your skills with our Burp Suite Deep Dive course: https://bit.ly/burpforpros

DerpNStink CTF: Mastering Server Access – Part 1 πŸ”“
Cristi Vlad
1.5K views β€’ Apr 12, 2018
DerpNStink CTF: Mastering Server Access – Part 1 πŸ”“

About this video

Burp Suite Deep Dive course: https://bit.ly/burpforpros
________________________________________________________________________________________________ Recon in Cybersecurity course: https://bit.ly/cybersecrecon
Python Basics course: http://bit.ly/37cmhlx
Python for Pentesters course: http://bit.ly/2I0sRkm

Join me and other cyber-geeks on discord: http://bit.ly/2KH6aST
Join my SQUAD (for discounts'n'stuff): http://bit.ly/2xhSvM2

Hire me as a penetration tester: https://dgtsec.com/penetration-testing-services/
101 Pentesting Training: https://dgtsec.com/cybersec-pentesting-training/
101 Cybersecurity Consulting: https://dgtsec.com/cybersec-pentesting-training/

Connect with me:

Help me continue creating videos: https://www.buymeacoffee.com/cristivlad

Linkedin: https://www.linkedin.com/in/cristivlad/
Twitter: https://twitter.com/CristiVlad25
Facebook page: https://www.facebook.com/CristiVladZ/
Facebook group: https://www.facebook.com/groups/cybersecpros/
Hackthebox: https://www.hackthebox.eu/profile/27034
Tryhackme: https://tryhackme.com/p/cristi
Peerlyst: https://www.peerlyst.com/users/cristi-vlad
Discord: https://disboard.org/server/608756357801443343

Books I recommend for Penetration Testing and Ethical Hacking:

1. TJ O'Connor - Violent Python: https://amzn.to/31vH2GB
2. Dafydd Stuttard - Web App Hacker' s Handbook (2nd Ed): https://amzn.to/2MRcjk3
3. Peter Yaworski - Web Hacking 101: https://amzn.to/2KTvJSy
4. Jon Erickson - Hacking: The Art of Exploitation (2nd Ed):
https://amzn.to/2WHr3BD
5. Peter Kim - The Hacker Playbook 3 (2018): https://amzn.to/2MQiTXK
6. Peter Yaworski - Real-World Bug Hunting: https://amzn.to/37GB87K

It helps me tremendously if you support these educational videos:
https://www.patreon.com/cristivlad

My course Developing Ethical Hacking Tools with Python on Cybrary: http://bit.ly/2J5USbC

If you're a Youtuber, how can you survive without TubeBuddy? http://bit.ly/37dgFYr
Learn hands-on pentesting (free trial): http://bit.ly/2LzKrPJ
Hacker Wearables: http://bit.ly/2IDAQEo

Short-clips via: https://mixkit.co/
__________

Whatever type of tests you're doing, only perform them in safe and legal environments and with the appropriate permissions.
__________

Millions of websites run Wordpress, and a ridiculous amount of them run versions that are outdated or are vulnerable to different exploits. This makes them potential targets to malicious users.

In this walkthrough we start working our way into another vulnerable machine from vulnhub, which runs a Wordpress blog that has multiple vulnerabilities. In this video in particular we want to get in, while in subsequent videos we're going to work our way to escalating our privileges to root.

If you want to see more of these cybersecurity related videos, please hit the like button and leave a comment below.

Only perform these types of engagements in safe and legal environments and with the appropriate permissions. This video is for educational purposes only.

Tags and Topics

Browse our collection to discover more content in these categories.

Video Information

Views

1.5K

Likes

24

Duration

19:36

Published

Apr 12, 2018

User Reviews

4.5
(1)
Rate:

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.