Back to Browse

Vulnerable Software || Linux Privilege Escalation

1.6K views
Mar 31, 2024
23:15

Learn how vulnerable software can be utilized to perform Privilege Escalation and understand the vulnerabilities in applications like MySQL and Sudo. πŸ”’ Welcome to The Cyber Expert! πŸ”’ 🌐 Website: https://thetce.com ❀️ Support the channel by donating at: https://thetce.com/support 🌟 Join our vibrant community on Discord: https://discord.gg/VH6twtc9VM πŸ”” Join this channel and unlock exclusive perks: https://www.youtube.com/@TheCyberExpert/join πŸ“Ί Visit My Channel For More Exciting Videos: https://www.youtube.com/@TheCyberExpert 🌎 Where else can you find me? 🌎 πŸ”¬ GITHUB: https://www.github.com/Hellsender01 πŸ“· INSTAGRAM: https://www.instagram.com/harshitjoshi01 πŸ”— LINKEDIN: https://www.linkedin.com/in/harshitjoshi01/ 🐦 TWITTER: https://twitter.com/TheCyberExpert_ πŸ“§ EMAIL: [email protected] πŸ™ Thank you for watching! πŸ™ πŸ”₯ Stay tuned for the latest updates and intriguing content from The Cyber Expert. Timestamps: 00:00 - Connecting To Our Lab 01:09 - Understanding Vulnerable Software 02:46 - Discovering Vulnerable Software 04:26 - Getting Shell With MySQL UDF Vulnerability 18:54 - Connecting To Our Second Lab 19:29 - Getting Shell With Sudo Vulnerability 22:49 - Outro 23:03 - Support 🎡 Music in this video: "The Way" by LiQWYD 🎧 Free Download / Stream: https://bit.ly/3HGU9tD 🎡 Music promoted by Audio Library: https://youtu.be/lUADHP3dmrI ✨ Remember to like, share, and subscribe for more engaging cybersecurity adventures. Stay ahead in the cyber world with The Cyber Expert! ✨ #thecyberexpert #harshitjoshi #lpe

Download

0 formats

No download links available.

Vulnerable Software || Linux Privilege Escalation | NatokHD