A step-by-step guide teaching you how to discover and exploit IDOR vulnerabilities + xp_cmdshell + local buffer overflow to hack a RaaS (Ransomware-as-a-Service) platform and gain full remote control over their servers. 🔴 Enhance your organisation’s cybersecurity with the power of Zero Trust and ThreatLocker👇 http://threatlocker.com/zsecurity --------------------------------------------------------------- 🌟 Hacking Masterclass & Memberships 👇 https://zsecurity.org/memberships/ 🧠 My hacking courses 👇 https://zsecurity.org/courses/ --------------------------------------------------------------- zSecurity Company - https://zsecurity.com/ Community - https://zsecurity.org/ Facebook - https://www.facebook.com/zSecurty Twitter - https://twitter.com/_zSecurity_ Instagram - https://www.instagram.com/zsecurity_org/ LinkedIn - https://www.linkedin.com/company/zsecurity-org/ TikTok - https://www.tiktok.com/@zsecurity_org --------------------------------------------------------------- ⚠️ This video is made for educational purposes only, we only test devices and systems that we own or have permission to test, you should not test the security of devices that you do not own or do not have permission to test. ⚠️ --------------------------------------------------------------- Resources: Lab Link: https://tryhackme.com/jr/zsecurity2024anniversaryctf --------------------------------------------------------------- Time Stamps: 00:00 - intro 01:45 - Zero Trust with Threatlocker 03:09 - Exploiting IDOR Vulnerability 05:58 - Scanning the Server 06:52 - Gaining DB Access 08:38 - Exploiting cmd_xpshell 13:32 - Escalating Privileges