Exfiltrate Data in a Restricted Environment - 64Base Challenge Episode 5
This video demonstrates techniques for exfiltrating data within a restricted environment, part of the 64Base challenge series. Includes insights on pentesting, hacking, and the use of tools like Metasploit and Kali Linux. Part 1: https://youtu.be/uAqlQrJf

thehackerish
757 views β’ Mar 31, 2023

About this video
#pentesting #ctf #hacking #metasploit #kalilinux
Part 1: https://youtu.be/uAqlQrJf2NY
Part 2: https://youtu.be/Di0I9b8QIkw
Part 3: https://youtu.be/F4y3wDUlz84
Part 4: https://youtu.be/xGvjq0DxZ9s
Part 5: https://youtu.be/XtynZxMg0qE
Part 6: https://youtu.be/u4e6aPcpI7Q
Hey whatβs up? In this video series, I will h4ck the 64base web app challenge. In this episode, I will exfiltrate the SSH private key in a restricted environment.
π π₯ Become a pentester
https://academy.thehackerish.com/p/from-zero-to-signing-your-first-ethical-hacker-job?utm_source=social&utm_medium=youtube&utm_campaign=desc
π Learn the technical skills:
https://thehackerish.com/best-hacking-websites-for-ethical-hackers/
π Become a successful bug bounty hunter: https://thehackerish.com/a-bug-bounty-hunting-journey-book
π Download your FREE Web hacking LAB and starting hacking NOW: https://thehackerish.com/owasp-top-10-lab-vm-free
π Read more on the blog: https://thehackerish.com
πͺπ» Support this work: https://thehackerish.com/how-to-support
- Facebook Page: https://www.facebook.com/thehackerish
- Follow us on Twitter: https://twitter.com/thehackerish
- Listen on Anchor: https://anchor.fm/thehackerish
- Listen on Spotify: https://open.spotify.com/show/4Ht8jEbPzyZnfbIlhFG91x
- Listen on Google Podcasts: https://podcasts.google.com/?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy8xYTVkYTgxYy9wb2RjYXN0L3Jzcw%3D%3D
Part 1: https://youtu.be/uAqlQrJf2NY
Part 2: https://youtu.be/Di0I9b8QIkw
Part 3: https://youtu.be/F4y3wDUlz84
Part 4: https://youtu.be/xGvjq0DxZ9s
Part 5: https://youtu.be/XtynZxMg0qE
Part 6: https://youtu.be/u4e6aPcpI7Q
Hey whatβs up? In this video series, I will h4ck the 64base web app challenge. In this episode, I will exfiltrate the SSH private key in a restricted environment.
π π₯ Become a pentester
https://academy.thehackerish.com/p/from-zero-to-signing-your-first-ethical-hacker-job?utm_source=social&utm_medium=youtube&utm_campaign=desc
π Learn the technical skills:
https://thehackerish.com/best-hacking-websites-for-ethical-hackers/
π Become a successful bug bounty hunter: https://thehackerish.com/a-bug-bounty-hunting-journey-book
π Download your FREE Web hacking LAB and starting hacking NOW: https://thehackerish.com/owasp-top-10-lab-vm-free
π Read more on the blog: https://thehackerish.com
πͺπ» Support this work: https://thehackerish.com/how-to-support
- Facebook Page: https://www.facebook.com/thehackerish
- Follow us on Twitter: https://twitter.com/thehackerish
- Listen on Anchor: https://anchor.fm/thehackerish
- Listen on Spotify: https://open.spotify.com/show/4Ht8jEbPzyZnfbIlhFG91x
- Listen on Google Podcasts: https://podcasts.google.com/?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy8xYTVkYTgxYy9wb2RjYXN0L3Jzcw%3D%3D
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
757
Likes
21
Duration
10:12
Published
Mar 31, 2023
Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.
Trending Now