Тёмный

Pwn TeamCity in the Cloud! - CVE-2024-27198 -- [Pwned Labs!] 

Tyler Ramsbey
Подписаться 16 тыс.
Просмотров 675
50% 1

Join the Hack Smarter community: hacksmarter.org
--- In this video, I demonstrate the process of completing the "Pwn TeamCity in the Cloud" Lab from Pwned Labs.
I utilize CVE-2024-27198 to gain initial access, an exploit currently being employed by threat actors, to highlight the critical need for patching your TeamCity instances.
Additionally, I showcase the following techniques:
- Accessing and utilizing EC2 instance user data
- Employing Pacu for IAM Permissions brute-forcing
- Gaining server shell access through a TeamCity terminal
- Decrypting TeamCity secrets
- Conducting S3 enumeration
- Understanding measures to prevent such attacks
Enjoy watching!

Наука

Опубликовано:

 

16 июл 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 3   
@shocked3165
@shocked3165 4 месяца назад
Hey tyler, amazing video been watching ur content for a while now and I had a small question. Is it possible to get a job if I know only AD pentesting or should a pentester know web, network and cloud pemtesting to get a job?
@nothing.ghost4547
@nothing.ghost4547 4 месяца назад
Second 😊
@abudi45
@abudi45 4 месяца назад
First 😌🥇
Далее
Advanced SQL Injection - (TryHackMe!)
1:33:08
Просмотров 1,3 тыс.
Healthcare Software Exploit: CVE-2023-43208
25:14
Просмотров 63 тыс.
A Vulnerability to Hack The World - CVE-2023-4863
18:00
Playing with Jenkins File Read [CVE-2024-23897]
20:44
Просмотров 2,8 тыс.
Yet another OSCP exam experience video
15:47
Просмотров 2,7 тыс.
mKingdom - Detailed Walkthrough - (TryHackMe!)
1:16:44
Battery  low 🔋 🪫
0:10
Просмотров 7 млн
😮Новый ДИРЕКТОР Apple🍏
0:29
Просмотров 41 тыс.
Красиво, но телефон жаль
0:32
Просмотров 988 тыс.