Description: In this video I'm showcasing some ProxyChains pivoting kungfu within my home lab using SSH tunnels. Please comment if you find it useful.
STAGE1 - pwning OWASP BWA
WackoPicko SQL Injection Auth Bypass + Malicious PHP File Upload
Local Root Exploit CVE-2010-4258 CVE-2010-3849 CVE-2010-3850
STAGE2 - pwning METASPLOITABLE
ProxyChains Pivot thru SSH connection to OWASP BWA
Metastploit Framework exploit/multi/samba/usermap_script
STAGE3 - pwning Windows XP unpatched
ProxyChains Pivot thru METASPLOITABLE
Metasploit Framework exploit/windows/smb/ms08_067_netapi
For educational purposes only!
* ProxyChains - http://goo.gl/nEi3Y
* Metasploit Framework - http://goo.gl/jUdyn
* Metasploitable - http://goo.gl/m90uE
* OWASP BWA - http://goo.gl/km0j1
* BackTrack - http://goo.gl/irgyl
* CVE-2010-4258 CVE-2010-3849 CVE-2010-3850 - http://goo.gl/kTJ7H
* OpenSSH - http://goo.gl/g21u1
* Nmap - http://
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
nice video man. thanks
This too is very useful when you want to run a program using proxy :) and this too feature is good. nice video !