Exploiting Joomla Web Application with OWASP Top 10 - TryHackMe Daily Bugle
Description
In this video walkthrough, we demonstrated in various ways the exploitation of the Joomla content management system vulnerable to SQL Injection in order to gain administrative access. Then we elevated to root privileges by exploiting the package manager in Linux Red Hat yum.
----
Receive video documentation, QA and request special video training
https://www.youtube.com/channel/UCNSdU_1ehXtGclimTVckHmQ/join
----
Do you need private cybersecurity training? sign up here
https://motasem-notes.net/cybersecurity-consultation/
--
Twitter
https://twitter.com/ManMotasem
LinkedIn
https://www.linkedin.com/in/motasem-hamdan-7673289b/
Instagram
https://www.instagram.com/mo.vultu/
Facebook
https://www.facebook.com/motasemhamdantty
Comments