Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Linux Red Team Exploitation Techniques - Exploiting WordPress & MySQL

HackerSploit via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore the process of identifying and exploiting vulnerabilities on a public-facing web Linux server hosting a web application in this 33-minute video tutorial. Learn how to target a Linux server using a vulnerable VM configured to teach exploitation and privilege escalation techniques. Download the target VM from the provided link to follow along. Discover practical red team exploitation techniques for WordPress and MySQL, and gain insights into the MITRE ATT&CK Framework. Access additional resources, including a free registration for part 2 of the series and a writeup for further study. Enhance your cybersecurity skills and understanding of Linux red team tactics through this hands-on demonstration.

Syllabus

Linux Red Team Exploitation Techniques | Exploiting WordPress & MySQL

Taught by

HackerSploit

Reviews

Start your review of Linux Red Team Exploitation Techniques - Exploiting WordPress & MySQL

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.