NETWORK ADMINISTRATIONSWindows server

Learning Windows Server Exploitation – Metasploitable 3

In this video walkthrough, we demonstrated the exploitation process of the windows server attached to the Metasploitable 3 lab box. During the enumeration, we discovered an unauthenticated way to the Jenkins server and uploaded a payload to the Tomcat server that gave us back a privileged shell.

Receive video documentation, QA and request special video training
https://www.youtube.com/channel/UCNSdU_1ehXtGclimTVckHmQ/join
—-
Do you need private cybersecurity training? sign up here



Twitter


LinkedIn
https://www.linkedin.com/in/motasem-hamdan-7673289b/
Instagram
https://www.instagram.com/superior.coaching/
Facebook
https://www.facebook.com/motasemhamdantty

source

windows server

Alice AUSTIN

Alice AUSTIN is studying Cisco Systems Engineering. He has passion with both hardware and software and writes articles and reviews for many IT websites.

Leave a Reply

Your email address will not be published. Required fields are marked *