Комментарии:
when will you do smasher2? is there going to be unintended routes in the video
ОтветитьThank you for including a way to eliminate this vulnerability!
ОтветитьI love when you do videos that go into specific subjects like this. 👍
ОтветитьAmazing video.. i would like if you could continue this series..
ОтветитьThank you, your last video are really cool ! I hope you will do more like that !
I just have a question : in a black box testing, is there a way to know that there is a vulnerability or do you just try it and see if it works ?
Thanks heaps for this, very interesting.
I am just wondering, how are the methods "unlink", "md5sum" triggering the destruct magic method of the object you're creating? Is is apart of the phar:// read processing? When is the object unset?
When is it possible to use phar://, only with methods that involve reading data?
Hi. Would be great to have a little bit more volume on the audio. Otherwise, really great.
ОтветитьWhat application do you use to edit phar file
ОтветитьCan you teach me step by step for ethical hacking or pentesting
ОтветитьYou can't do this if you don't know the name of the class that's already present on the server, right?
ОтветитьGreat content 👍. All your videos are awsome. And really thanks for your support 👍
ОтветитьYou're My Inspiration ♥ :)
ОтветитьIts been 2yrs of this video,learned a lot from it. But it somehow doesn't work with php 8.1,it works good with php 7.4 . I think they changed something in new update so it doesn't work. I spend to find why it is not working (I was working with php8.1),then ran it with php7.4 and voila,magic happened. Thanks for such quality learning meterial...
Ответить