Advertisement

Hack The Box - Hacking Optimum

Hack The Box - Hacking Optimum For those who are starting in the cyber security area, the Hack The Box is an online platform that allows you to test your penetration testing skills and you can exchange ideas in the hacking community with thousands of people in the security field.

The platform has a bunch of machines(active and retired) to hack, as also machines to test forensics skills, and when you feel real comfortable you can go for the challenges, pretty awesome.

In this Seventh episode, it will guide you step by step in order to hack the box Beep, Optimum is a beginner-level machine which mainly focuses on enumeration of services with known exploits. The user exploit is easy to obtain and have associated Metasploit modules, the root flag however, is a little bit harder, we have to manually escalate our admin privileges in order to have success, anyway, globally, this machine fairly simple to complete. Watch and enjoy, and if you have any comments or suggestions, leave a comment below.

Have fun...

More to come...

--------------------------------------------------------------

HACK THE BOX SERIES

#1 Hack the Invitation Code -
#2 Hack The Box - Getting Started
#3 Hack The Box - Hacking Lame Box
#4 Hack The Box - hacking Legacy Box
#5 Hack The Box - hacking Devel Box
#6 Hack The Box - hacking Beep Box

--------------------------------------------------------------

USEFUL LINKS:

HACK THE BOX


DECODERS:



EXPLOITS INFO:



--------------------------------------------------------------

TOOLS AND EXPLOITS:

NMAP


ZENMAP


SEARCHSPLOIT


METASPLOIT


METERPRETER


NSFVENOM


DIRBUSTER


ELASTIX


NETCAT


LOCAL FILE INCLUSION


vTIGER CRM


HFS - HTTP FILE SERVER


Rejetto HttpFileServer (HFS) - REMOTE COMMAND EXECUTION


MS16-032 - SECONDARY LOGON HANDLE PRIVELEGE ESCALATION


GDSSECURITY


SHERLOCK


RGNOBJ Integer Overflow





--------------------------------------------------------------

FLAVORS OF THE WORLD - Other Videos


"FLAVORS FROM FIGUEIRA DA FOZ from the series Flavors of the world Ep. 4" -

"FLAVORS FROM PRAGUE from the series Flavors of the world Ep. 5" -

"FLAVORS FROM ISTAMBUL from the series Flavors of the world Ep. 6" -

"FLAVORS FROM LONDON from the series Flavors of the world Ep. 7" -

---------------------------------------------------------------

FOLLOW ME:

FACEBOOK:
TWITTER:
INSTAGRAM:
500PX.com:

--------------------------------------------------------------

Cyber security,ethical hacking,pen testing,penetration testing,hack the box,optimum box,whaite hat,hacker,networks,networks protocols,exploits,nmap,searchsploit,netcat,python server,metasploit,gdssecurity,sherlock,HFS,HTTP File Server,

Post a Comment

0 Comments