Premium Only Content
“Hacking HOMMIE — MySQL Exploitation & Misconfigured Permissions PrivEsc to Root (Full CTF Walkthrough)”
In this full hacking walkthrough, we root the HOMMIE machine by exploiting a vulnerable MySQL configuration and abusing misconfigured file permissions to escalate privileges.
This video walks through every step — from enumeration to initial foothold to full system compromise.
🧭 What You'll Learn:
• Service enumeration & vulnerability discovery
• MySQL credential extraction + database exploitation
• Using leaked credentials to pivot
• Privilege escalation through misconfigured permissions
🛠 Tools / Concepts Covered:
Nmap, MySQL exploitation, credential reuse, sudoers & permission abuse, Linux privilege escalation, reverse shell, OSCP methodology
Whether you're preparing for OSCP, learning penetration testing, or sharpening your CTF skills — HOMMIE is a perfect training machine.
👍 Like & follow for daily hacking videos.
-
44:51
American Thought Leaders
14 hours agoHow This Tech Can Break China’s Rare Earth Monopoly | Dr. James Tour
2.54K2 -
1:16
From Zero → Viral with AI
21 hours agoAI Isn’t Killing Work. It’s Killing the Wrong Kind of Work.
995 -
2:47:27
Squaring The Circle, A Randall Carlson Podcast
19 hours agoEPIC! Randall & Sabin Howard, Master Sculptor Known As "Michelangelo of America," talk WAR or PEACE!
1.48K -
22:42
Benjamin Sahlstrom
1 day ago $18.01 earnedHow To Refill 1lb Portable Propane Tanks!
110K14 -
46:39
The Bold Lib
1 day agoOwen Shroyer: BOLDTALK W/Angela Belcamino
9.31K21 -
7:57
Blackstone Griddles
1 day agoDouble Barrel Sausage Sandwich | Blackstone Griddles
26.2K1 -
32:24
Forrest Galante
13 hours agoHunting and Eating The World's WORST Fish (Everglades At Night)
109K7 -
32:10
Nikko Ortiz
18 hours agoSecret Agent Infiltrates Neo-Nazis...
28.3K18 -
15:04
MetatronGaming
1 day agoOriginal Commodore 64 VS C64 Maxi - Review and Comparison
31.6K9 -
9:46
MattMorseTV
16 hours ago $24.50 earnedTrump just SHUT DOWN a $287,000,000 FRAUD RING.
38.6K94