“Hacking HOMMIE — MySQL Exploitation & Misconfigured Permissions PrivEsc to Root (Full CTF Walkthrough)”

3 days ago
46

In this full hacking walkthrough, we root the HOMMIE machine by exploiting a vulnerable MySQL configuration and abusing misconfigured file permissions to escalate privileges.

This video walks through every step — from enumeration to initial foothold to full system compromise.

🧭 What You'll Learn:
• Service enumeration & vulnerability discovery
• MySQL credential extraction + database exploitation
• Using leaked credentials to pivot
• Privilege escalation through misconfigured permissions

🛠 Tools / Concepts Covered:
Nmap, MySQL exploitation, credential reuse, sudoers & permission abuse, Linux privilege escalation, reverse shell, OSCP methodology

Whether you're preparing for OSCP, learning penetration testing, or sharpening your CTF skills — HOMMIE is a perfect training machine.

👍 Like & follow for daily hacking videos.

Loading comments...