YoVDO

Linux Red Team Exploitation Techniques - Red Team Series

Offered By: Linode via YouTube

Tags

Red Team Courses Cybersecurity Courses Ethical Hacking Courses Spear Phishing Courses

Course Description

Overview

Explore Linux red team exploitation techniques in this comprehensive video tutorial from the HackerSploit Red Team series. Learn about initial access methods like targeted spear phishing and exploiting vulnerabilities in public-facing web servers. Discover how to perform nmap scans, analyze web applications, conduct directory brute force attacks, and enumerate WordPress sites. Practice SSH brute force techniques using Hydra, access remote servers, and manipulate MySQL databases. Gain hands-on experience in penetration testing and ethical hacking as you work through practical examples on a target server. Master essential tools and strategies for red team operations, including wpscan, netstat, and WordPress admin access.

Syllabus

Introduction
What We’ll Be Covering
Mitre Attack Initial Access Techniques
Our Target Server
Infrastructure Overview
Let’s Get Started
Performing an nmap Scan
nmap Results
Accessing their Web Server
Analyzing the Web Application
Running a Directory Brute Force
Configuring the Hosts File
Tips for Enumerating a WordPress Site
Scanning a WordPress Site with wpscan
Working with Users as a Vector
SSH Brute Force with Hydra
Logging in with our Brute Forced Credentials
Enumerating Data on the Remote Server
Using netstat
How Do We Access the MySQL Database Server?
Listing Databases & Tables
Changing a Database User’s Password
Logging into wp-admin
Conclusion


Taught by

Linode

Related Courses

Application of the MITRE ATT&CK Framework
Cybrary
Windows Red Team Exploitation Techniques | Red Team Series 3-13
Linode via Independent
People Information Gathering with the Social Engineering Toolkit (SET)
Pluralsight
Phishing Pholks Phor Phun and Prophit
YouTube
Social Engineering Toolkit
YouTube