Python Basics course (coupon applied):
Join my SQUAD for free (for more discounts):
Cristi's Youtube:
In this video I'm gonna show you how cron jobs can be exploited for privilege escalation purposes. I'm Chris, I'm a penetration tester and I do a lot of cybersecurity videos.
Video Thread:
Alright, so we are on attackdefense labs, which is a platform for practicing or growing your skills in cybersecurity and penetration testing in a safe and legal manner. And one of the challenges, the one I'm gonna walk you through today is this 'Cron Jobs Gone Wild'.
What we need to do is to get root on the system by exploiting cron jobs.
Connect with me:
Linkedin:
Twitter:
Facebook page:
Facebook group:
Hackthebox:
Tryhackme:
Peerlyst:
Books I recommend for Penetration Testing and Ethical Hacking:
1. TJ O'Connor - Violent Python:
2. Dafydd Stuttard - Web App Hacker' s Handbook (2nd Ed):
3. Peter Yaworski - Web Hacking 101:
4. Jon Erickson - Hacking: The Art of Exploitation (2nd Ed):
5. Peter Kim - The Hacker Playbook 3 (2018):
My free Developing Ethical Hacking Tools with Python course on Cybrary:
__________
In this hands-on video I show you how I solved the 'Cron Jobs gone Wrong!' challenge on AttackDefenseLabs platform.
Only perform these types of engagements in safe and legal environments and with the appropriate permissions.
0 Comments