У нас вы можете посмотреть бесплатно Whoami to Root : Your Guide Beyond Hacking Web Applications | OWASP Algiers или скачать в максимальном доступном качестве, видео которое было загружено на ютуб. Для загрузки выберите вариант из формы ниже:
Если кнопки скачивания не
загрузились
НАЖМИТЕ ЗДЕСЬ или обновите страницу
Если возникают проблемы со скачиванием видео, пожалуйста напишите в поддержку по адресу внизу
страницы.
Спасибо за использование сервиса ClipSaver.ru
So you are able to execute whoami by command injection vulnerability. Now what ? This talk is about going beyond the whoami to the Linux prievelege escalation. Follow Me : 1️⃣ Facebook : / iamnasef 2️⃣ Linkedin : / iamnasef 3️⃣ Twitter : / iamnasef 4️⃣ Github : https://github.com/iamnasef/ 5️⃣ Website : https://iamnasef.com 📩 For Business Inquires : business@iamnasef.com ⌛⌛⌛ Timestamps [00:00:00] OWASP and OWASP Algiers introduction by the chapter leader [00:02:16] Speaker introduction by speaker [00:03:38] Workshop introduction [00:04:30] The Bug Hunter's dream [00:12:56] Permission model in *nix based systems (Theoretical) [00:23:47] Permission model in *nix based systems (Practical) [00:28:27] The concept of prievelege escalation [00:29:15] Prievelege escalation #1 - Misplaced Password (Theoretical) [00:30:13] Prievelege escalation #1 - Misplaced Password (Practical) [00:35:03] Prievelege escalation #2 - Misconfigured Permissions (Theoretical) [00:35:54] Prievelege escalation #2 - Misconfigured Permissions (Practical) [00:39:55] Prievelege escalation #3 - SUDO (Theoretical) [00:42:01] Prievelege escalation #3 - SUDO (Practical) [00:50:24] Prievelege escalation #4 - SUID & SGID (Theoretical) [00:52:06] Prievelege escalation #4 - SUID & SGID (Practical) [00:56:06] Prievelege escalation #5 - Cronjobs [00:57:02] Prievelege escalation #6 - Misconfigured Services [00:57:48] Prievelege escalation #7 - Kernel Exploitations [00:58:20] Prievelege escalation #8 - Vulnerable Applications [00:58:28] Prievelege escalation #9 - Capabilities [00:58:50] What after this session [01:00:36] Story behind the session and the course [01:07:58] questions & Answers 🛑🛑🛑 Disclaimer 🛑🛑🛑 All videos in this channel - including this one - are 100% educational and legal content for information security students. This channel doesn't teach people how to use computers or information technology with the intent to steal credentials, compromise personal data or cause serious harm to others such as (but not limited to) hacking into social media accounts