RIS602 Lab 3 Timestamps: Web & Database Attack Chapters
1. Introduction and Attack Chain Overview
Salah introduces the lab on attacking vulnerable web and database services, outlining the full attack chain and the five stages of the attack.
2. Deploying and Using Tomcat Web Shell
Creating a GSP web shell, packaging it into a WAR file, deploying it via Tomcat manager, and executing non-interactive commands through the shell.
3. Privilege Escalation via Windows Sticky Keys
Explaining and demonstrating privilege escalation by replacing sethc.exe with cmd.exe to gain a fully interactive system shell through the Windows login screen.
4. Exploiting Jenkins Script Console for Command Execution
Using Jenkins built-in script console to run Groovy code for OS-level command execution on a separate machine with admin access.
5. Compromising Microsoft SQL Server
Using Metasploit to authenticate to MSSQL with weak credentials, enabling xp_cmdshell, and executing OS commands through the database server.
6. Extracting Windows Password Hashes
Exporting registry hives via xp_cmdshell, sharing and downloading them over SMB, and extracting NLM password hashes for offline cracking and pass-the-hash attacks.
7. Conclusion and Lab Summary
Recap of the chained attack steps, highlighting how each vulnerability led to the next, privilege escalation simplicity, database to OS compromise, and credential theft impact.
[0:00] Introduction and Attack Chain Overview Salah introduces the lab on attacking vulnerable web and database services, outlining the full attack chain and the five stages of the attack. [2:00] Deploying and Using Tomcat Web Shell Creating a GSP web shell, packaging it into a WAR file, deploying it via Tomcat manager, and executing non-interactive commands through the shell. [15:00] Privilege Escalation via Windows Sticky Keys Explaining and demonstrating privilege escalation by replacing sethc.exe with cmd.exe to gain a fully interactive system shell through the Windows login screen. [23:00] Exploiting Jenkins Script Console for Command Execution Using Jenkins built-in script console to run Groovy code for OS-level command execution on a separate machine with admin access. [27:00] Compromising Microsoft SQL Server Using Metasploit to authenticate to MSSQL with weak credentials, enabling xp_cmdshell, and executing OS commands through the database server. [31:00] Extracting Windows Password Hashes Exporting registry hives via xp_cmdshell, sharing and downloading them over SMB, and extracting NLM password hashes for offline cracking and pass-the-hash attacks. [37:00] Conclusion and Lab Summary Recap of the chained attack steps, highlighting how each vulnerability led to the next, privilege escalation simplicity, database to OS compromise, and credential theft impact.
Heads up!
These timestamps were automatically generated using AI with the Free YouTube Video Timestamp Tool by LunaNotes.
Generate timestamps for freeRelated Videos
SQL for Beginners Timestamps: Learn SQL Step-by-Step Chapters
Explore the detailed timestamps for our beginner-friendly SQL course to quickly navigate through essential SQL concepts and hands-on exercises. These chapters enable you to efficiently skip to topics from basic queries to advanced database management, enhancing your learning experience.
Next.js 16 Full Course Timestamps | Build & Deploy Full Stack App
Explore the detailed chapter breakdowns of this comprehensive Next.js 16 full course. Use these timestamps to easily navigate through essential topics like routing, UI development, API building, database modeling, and deployment strategies, making your learning experience efficient and organized.
Racist Lady Shocked: Romance Scam Video Timestamps & Chapters
Explore the detailed timestamps and chapters of this eye-opening video uncovering a Nigerian romance scam involving a long-term victim. These chapters help you navigate key moments in the story, from the initial scam to the victim's shocking revelations and the investigation process. Understand how romance scams work and learn valuable lessons to protect yourself.
Power BI Full Course Timestamps: Complete Tutorial for Beginners
Explore detailed timestamps for the Power BI Full Course 2026, guiding you through each chapter from basics to advanced analytics. These chapters help you easily navigate topics like data modeling, DAX, visualization, and dashboard creation for effective learning.
Sniper Elite Resistance Part 1 Timestamps: Mission Breakdown
Explore the detailed chapter breakdowns of Sniper Elite Resistance Part 1 to follow every crucial moment of the mission that changes everything. These timestamps help you navigate key gameplay events and strategies effortlessly for a better viewing experience.
Most Viewed
AI Search Timestamps: How SEO Works in 2026 Explained
Explore detailed chapters breaking down how AI search functions in 2026 from an SEO professional's perspective. These timestamps help you navigate key topics such as AI vs traditional SEO, major AI models, and practical strategies for SEO agencies.
Anjali Schmuck SPLITSVILLA 16 Timestamps: Connection, Fight & More
Explore detailed timestamps breaking down Anjali Schmuck's revelations about her connections, conflicts, and experiences on SPLITSVILLA 16. These chapters help viewers navigate key moments for a deeper understanding of the show's behind-the-scenes drama and personal stories.
Etsy Ads Timestamps: 2026 Strategy Guide Breakdown
Explore the detailed chapter breakdowns of the 2026 Etsy Ads Strategy Guide video to easily navigate key topics like when to start ads, how they work, and tips for success. These timestamps help you understand and implement profitable Etsy ad campaigns effectively for your shop growth.
2025's Most Intense Calls Timestamps: Drama and Debate
Explore the chapter breakdowns of 2025's most intense and debated calls in this video. These timestamps highlight the greatest hits that sparked thousands of comments and strong reactions, perfect for viewers who want to jump directly to the most engaging moments. Dive into the discussions that caused the biggest buzz and stay informed with easy navigation.
John Muir Biography Timestamps: Life, Legacy, and Conservation
Explore the detailed chapter breakdown of the John Muir biography video, highlighting key moments from his childhood to his impact on conservation. These timestamps allow you to navigate through his inspiring journey and understand the evolution of his environmental legacy.

