Premium Only Content

JUPITER | Hack the Box | Malayalam | Walkthrough | HTB | Ethical hacking
Jupiter is an linux hosting hosting a Grafana dashboard on http. Inital foothold is exploiting raw SQL queries executed by POSTgresQL database via code execution in copy command. Privilege escaltion is made by accessing Jupyter notebook running by jovian user. To get shell we will exploit config files of a binary using root permissions.
00:00 - intro
00:24 - nmap
01:27 - vhost enumeration
02:02 - directory enumeration
02:50 - port 80
04:05 - kiosk subdomain
06:55 - Grafana raw sql injection
09:20 - postgresql copy to execute exploitation
14:16 - shell as postgres
26:55 - pivoting to juno
30:35 - shell as juno
32:13 - escalating to jovian
35:28 - root
Link for Hack the box
https://affiliate.hackthebox.com/29icft3zq24o
Disclaimer :
All video’s and tutorials are for informational and educational purposes only. The tutorials and videos provided there is only for those who are interested to learn about Cyber security, Penetration Testing and malware analysis. Hacking tutorials is against misuse of the information and we strongly suggest against it.
All tutorials and videos have been made using our own routers, servers, websites and other resources, they do not contain any illegal activity. We do not promote, encourage, support or excite any illegal activity or hacking without written permission in general. We want to raise security awareness and inform our readers on how to prevent themselves from being a victim of hackers. If you plan to use the information for illegal purposes, please leave this website now. We cannot be held responsible for any misuse of the given information.
1. Information provided on this Channel are for educational purposes only. This channel is no way responsible for any misuse of the information.
2. This Channel is all about ethical hacking.
3. This Channel is totally meant for providing information on “Computer Security”, “Computer Programming” and other related computer tricks and tweaks topics and is no way related towards the terms “CRACKING” or “HACKING” (Unethical).
4. I’ll include few blogs which may contain the information related to ‘Hacking Password’ or ‘Hacking email accounts’ or similar terms. You shall not misuse the information the information to gain unauthorised access. Also be aware, performing hack attempts without permission on computers that you do not own is illegal.
5. I’ll not be responsible for any direct or indirect damage caused due to the usage of the information provided on this site.
6. I reserve the right to modify the Disclaimer at any time without notice.
#parrotos
#kalilinux
#cybersecurity
#ethicalhackingmalayalam
#cybersecuritymalayalam
-
LIVE
MYLUNCHBREAK CHANNEL PAGE
23 hours agoFault Lines are GATES - Pt 2
911 watching -
LIVE
Grant Cardone
1 day agoHow to Build Wealth in 2025 - Grant Cardone LIVE!
1,628 watching -
LIVE
Major League Fishing
4 days agoLIVE! - Bass Pro Tour: Stage 6 - Day 3
804 watching -
1:20:15
Jeff Ahern
2 hours ago $3.50 earnedThe Saturday Show with Jeff Ahern
143K4 -
LIVE
Spartan
3 hours agoPro Halo Player | HCS Open Series #7 with OMiT Halo
390 watching -
LIVE
GritsGG
7 hours agoWe Are Winning Every Game! Win Streaking! 👑 2998+ Ws
218 watching -
8:28
nospeedlimitgermany
3 days ago $2.87 earnedFord Mustang GT 5.0 V8 421 PS Top Speed Drive German Autobahn No Speed Limit POV
26.8K14 -
LIVE
SilverFox
6 hours ago🔴LIVE - Fox FINALLY plays FORTNITE
126 watching -
LIVE
Fragniac
3 hours ago🌕 Claire Obscur: EXPEDITION 33 - Act II⚔
170 watching -
28:39
The Shannon Joy Show
20 hours ago🔥🔥Are Big Tech ‘Wearables’ Really The Key To Good Health? Dr. Chad Walding Says NO! Special Health Update: (Sponsored By Native Path!)🔥🔥
41.9K7