TRYHACKME | ADVENT OF CYBER DAY 3 | DIRBUSTER

The-Digital-Empress

TRYHACKME | ADVENT OF CYBER DAY 3 | DIRBUSTER by The-Digital-Empress

In this section of the "TRYHACKME | ADVENT OF CYBER DAY 3 | DIRBUSTER" video, the YouTuber explains how she is using the tool DirBuster to find hidden sites, such as admin panels, on a server. She discusses the use of default credentials and common word lists to access these panels and prevent unauthorized access to personal information. The video also covers the use of various other recon tools the YouTuber has used, including dns recon, dns enum, enum for Linux, and admin panel finders such as Dimitri URL Scanner and FineAdminPanel. The YouTuber successfully uses the AdminFinder tool to find an admin panel on Facebook and encourages viewers to try out different tools as well.

00:00:00

In this section, the YouTuber shares her experience with the Bug Bounty Boot Camp book and what she has learned so far from chapters one to three. She explains how the book takes readers through the process of picking a bug bounty program and the different types of assets that can be uncovered. She also mentions that she is still catching up on the book and taking notes before setting up environmental setup and traffic interception in tomorrow's challenge. The focus for day three is on using investigatory techniques to find unlisted content and attempting some comment authentication using the clues around them to find admin panels for the hacking challenge. The tool being used is called DirBuster, and the YouTuber is trying to familiarize herself with it.

00:05:00

In this section of the transcript from the YouTube video "TRYHACKME | ADVENT OF CYBER DAY 3 | DIRBUSTER", the speaker discusses the graphical interface version of Dirbuster, a tool used to find certain content for websites. They explain how hidden sites, such as admin panels, can be stored on a server and how hackers can use default credentials to access them. The video also covers the use of common word lists and default credentials to discover the location of an administrator dashboard and how to prevent unauthorized access to personal information. The speaker then goes on to answer questions related to the tool.

00:10:00

In this section of the video, the user discovers the word list necessary to perform a DirBuster attack. They use the command "dirbuster" to begin the attack and find some useful information such as the names 'administrator' and 'admin'. They continue the attack and eventually gain access to the admin panel by using the default credentials 'administrator:administrator'. Finally, they successfully answer the question about the flag value to complete the challenge.

00:15:00

In this section, the speaker discusses the various recon tools she has learned and used prior to day 19, including dns recon, dns enum, enum for Linux, and admin panel finders such as Dimitri URL Scanner and FineAdminPanel. She then proceeds to try another tool called AdminFinder and successfully finds an admin panel on Facebook. She encourages viewers to try the different tools and provides a link to the course where she learned about them. The speaker signs off, promising to return for day four.

More from
The-Digital-Empress

No videos found.

Related Videos

No related videos found.

Trending
AI Music

No music found.