Premium Only Content

Inject | Hack the Box | malayalam | Walkthrough
Inject is easy linux box which hosts a website port 8080. LFI vulnerability allows us to read the source code for the site and also another user's creds. Leaked source allow use to identify RCE which enables us the initial access to the box. Then exploiting the cron we will gain root access.
0:00 nmap
01:07 enumeration
02:22 file upload
02:47 lfi
08:52 RCE
11:02 frank user
14:15 Phil
19:17 Root
https://affiliate.hackthebox.com/29icft3zq24o
Disclaimer :
All video’s and tutorials are for informational and educational purposes only. The tutorials and videos provided there is only for those who are interested to learn about Cyber security, Penetration Testing and malware analysis. Hacking tutorials is against misuse of the information and we strongly suggest against it.
All tutorials and videos have been made using our own routers, servers, websites and other resources, they do not contain any illegal activity. We do not promote, encourage, support or excite any illegal activity or hacking without written permission in general. We want to raise security awareness and inform our readers on how to prevent themselves from being a victim of hackers. If you plan to use the information for illegal purposes, please leave this website now. We cannot be held responsible for any misuse of the given information.
1. Information provided on this Channel are for educational purposes only. This channel is no way responsible for any misuse of the information.
2. This Channel is all about ethical hacking.
3. This Channel is totally meant for providing information on “Computer Security”, “Computer Programming” and other related computer tricks and tweaks topics and is no way related towards the terms “CRACKING” or “HACKING” (Unethical).
4. I’ll include few blogs which may contain the information related to ‘Hacking Password’ or ‘Hacking email accounts’ or similar terms. You shall not misuse the information the information to gain unauthorised access. Also be aware, performing hack attempts without permission on computers that you do not own is illegal.
5. I’ll not be responsible for any direct or indirect damage caused due to the usage of the information provided on this site.
6. I reserve the right to modify the Disclaimer at any time without notice.
#parrotos
#kalilinux
#cybersecurity
#ethicalhackingmalayalam
#cybersecuritymalayalam
#lfi
#spring
-
54:12
Donald Trump Jr.
1 hour agoCharlie's Vision. Our Future. | TRIGGERED Ep274
123K67 -
1:03:35
BonginoReport
2 hours agoKirk’s Alleged Killer Dating Hateful Transgender??? - Nightly Scroll w/ Hayley Caronia (Ep.134)
61.5K47 -
1:01:12
The Nick DiPaolo Show Channel
4 hours agoKirk Assassination Exposes Insane Left | The Nick Di Paolo Show #1793
25.9K9 -
LIVE
The Mike Schwartz Show
3 hours agoTHE MIKE SCHWARTZ SHOW Evening Edition 09-15-2025
5,247 watching -
LIVE
Quite Frankly
5 hours agoStaggering Evil, Official Stories & Open Lines | Rich Baris 9/15/25
715 watching -
1:09:33
TheCrucible
3 hours agoThe Extravaganza! EP: 36 (9/15/25)
131K9 -
1:13:06
Candace Show Podcast
2 hours agoThey Are Lying About Charlie Kirk. | Candace Ep 235
37.2K253 -
1:47:40
Kim Iversen
3 hours agoWas There a Second Shooter in the Charlie Kirk Attack?
46K48 -
DVR
Redacted News
3 hours ago“They’re NOT stopping with Charlie Kirk!” JD Vance TORCHES violent leftists | Redacted
230K85 -
39:45
Kimberly Guilfoyle
3 hours agoCharlie's Legacy and Our Mission | Ep.253
30.9K12