Learning Windows Server Exploitation – Metasploitable 3
In this video walkthrough, we demonstrated the exploitation process of the windows server attached to the Metasploitable 3 lab box. During the enumeration, we discovered an unauthenticated way to the Jenkins server and uploaded a payload to the Tomcat server that gave us back a privileged shell.
—
Receive video documentation, QA and request special video training
https://www.youtube.com/channel/UCNSdU_1ehXtGclimTVckHmQ/join
—-
Do you need private cybersecurity training? sign up here
—
Twitter
https://www.linkedin.com/in/motasem-hamdan-7673289b/
https://www.instagram.com/superior.coaching/
https://www.facebook.com/motasemhamdantty
windows server