YoVDO

Linux Red Team Exploitation Techniques - Exploiting WordPress & MySQL

Offered By: HackerSploit via YouTube

Tags

Red Team Courses Cybersecurity Courses MySQL Courses WordPress Courses Privilege Escalation Courses

Course Description

Overview

Explore the process of identifying and exploiting vulnerabilities on a public-facing web Linux server hosting a web application in this 33-minute video tutorial. Learn how to target a Linux server using a vulnerable VM configured to teach exploitation and privilege escalation techniques. Download the target VM from the provided link to follow along. Discover practical red team exploitation techniques for WordPress and MySQL, and gain insights into the MITRE ATT&CK Framework. Access additional resources, including a free registration for part 2 of the series and a writeup for further study. Enhance your cybersecurity skills and understanding of Linux red team tactics through this hands-on demonstration.

Syllabus

Linux Red Team Exploitation Techniques | Exploiting WordPress & MySQL


Taught by

HackerSploit

Related Courses

CNIT 127: Exploit Development
CNIT - City College of San Francisco via Independent
Enterprise Security Fundamentals
Microsoft via edX
Penetration Testing - Post Exploitation
New York University (NYU) via edX
Ultimate Ethical Hacking and Penetration Testing (UEH)
Udemy
Hands-on Penetration Testing Labs 4.0
Udemy