Linux Red Team Exploitation Techniques - Exploiting WordPress & MySQL
Offered By: HackerSploit via YouTube
Course Description
Overview
Explore the process of identifying and exploiting vulnerabilities on a public-facing web Linux server hosting a web application in this 33-minute video tutorial. Learn how to target a Linux server using a vulnerable VM configured to teach exploitation and privilege escalation techniques. Download the target VM from the provided link to follow along. Discover practical red team exploitation techniques for WordPress and MySQL, and gain insights into the MITRE ATT&CK Framework. Access additional resources, including a free registration for part 2 of the series and a writeup for further study. Enhance your cybersecurity skills and understanding of Linux red team tactics through this hands-on demonstration.
Syllabus
Linux Red Team Exploitation Techniques | Exploiting WordPress & MySQL
Taught by
HackerSploit
Related Courses
The RedTeam Blueprint - A Unique Guide To Ethical HackingUdemy Red Team Ethical Hacking - Beginner
Udemy Active Directory Pentesting Full Course - Red Team Hacking
Udemy Active Directory Pentesting With Kali Linux - Red Team
Udemy Red Team Tools for Emulated Adversary Techniques with MITRE ATT&CK
Pluralsight