Hello Everyone!
This is SaintDruG for Black Hat Ethical Hacking .
Todays Hacking Minutes Series,
Machines used:
Mac OS: Sierra High / Raspberry Pi Runing Parrot OS
We will create a backdoor PHP, and then run apache2 to start our webserver hosting a webpage on a raspberry pi.
That will be the victim, so after creating the backdoor, we will copy it on that webserver.
We will access our backdoor and get a shell!
Giving us a lot of power and access on that webserver, basically own the machine.
After that, we will open metasploit and load an exploit using the web_delivery scrip/exploit, and escalate our session:
from Shell To a Meterpreter session.
And by doing so, we actually have the strongest power, and can post exploit making our sessions persistent and so on.
This is how Black Hats get access on websites in less than 2 minutes after they finish the first recon part and escalate priviledges, switching from shell to meterpreter and so on!
Hope you enjoyed this, and stay tuned for more!
Disclaimer: This Video is for Educational Purpose Only, what you do is your responsibility and Black Hat Ethical Hacking, SaintDruG or anyone involved, is not held accounted for if any damage for any reason occurs. As a bonus, you can get a free Link on How a Complete Target Scan is done, involving over 2.5K lines - consider it as a FREE Course! Download for Free: https://github.com/blackhatethicalhacking
Its all about the Black Hat "Mindset" - To Understand
this, you need to unlearn and learn again, the mindset.
Sound Track:
ROYALTY FREE Background Music For Videos Fashion Films - Dark Hip-Hop Trap [Royalty Free - Commercial Use] Dark - Trap Kevin MacLeod - Spellbound Mind Trap Original Composition (Cinematic Dark Epic) Royalty Free Music Download for Free our Conky Theme https://github.com/blackhatethicalhacking/bheh_conky_theme
Support our work on Patreon:
https://www.patreon.com/blackhatethicalhacking
Source:
https://www.youtube.com/watch?v=N9rpEawQv_UUploader:
Black Hat Ethical Hacking