Vulnerable Software || Linux Privilege Escalation
Learn how vulnerable software can be utilized to perform Privilege Escalation and understand the vulnerabilities in applications like MySQL and Sudo. π Welcome to The Cyber Expert! π π Website: https://thetce.com β€οΈ Support the channel by donating at: https://thetce.com/support π Join our vibrant community on Discord: https://discord.gg/VH6twtc9VM π Join this channel and unlock exclusive perks: https://www.youtube.com/@TheCyberExpert/join πΊ Visit My Channel For More Exciting Videos: https://www.youtube.com/@TheCyberExpert π Where else can you find me? π π¬ GITHUB: https://www.github.com/Hellsender01 π· INSTAGRAM: https://www.instagram.com/harshitjoshi01 π LINKEDIN: https://www.linkedin.com/in/harshitjoshi01/ π¦ TWITTER: https://twitter.com/TheCyberExpert_ π§ EMAIL: [email protected] π Thank you for watching! π π₯ Stay tuned for the latest updates and intriguing content from The Cyber Expert. Timestamps: 00:00 - Connecting To Our Lab 01:09 - Understanding Vulnerable Software 02:46 - Discovering Vulnerable Software 04:26 - Getting Shell With MySQL UDF Vulnerability 18:54 - Connecting To Our Second Lab 19:29 - Getting Shell With Sudo Vulnerability 22:49 - Outro 23:03 - Support π΅ Music in this video: "The Way" by LiQWYD π§ Free Download / Stream: https://bit.ly/3HGU9tD π΅ Music promoted by Audio Library: https://youtu.be/lUADHP3dmrI β¨ Remember to like, share, and subscribe for more engaging cybersecurity adventures. Stay ahead in the cyber world with The Cyber Expert! β¨ #thecyberexpert #harshitjoshi #lpe
Download
0 formatsNo download links available.