How to exploit port 80 HTTP on Kali Linux

How to exploit port 80 HTTP on Kali Linux

CreatyR

1 год назад

62,723 Просмотров

Ссылки и html тэги не поддерживаются


Комментарии:

@Charchar437
@Charchar437 - 26.10.2024 21:21

what if php doesnt pop up after running metaploit??

Ответить
@Hermesfurie
@Hermesfurie - 12.10.2024 07:04

Nice tutorial but i have a question if you can see this

If i use an actual running website ip address that has 80 opened would it work?🤔

Ответить
@brunosantos3852
@brunosantos3852 - 30.09.2024 04:29

Base64 is not and i guess never ever was the standard encryption mode or method to mask a shadow file with Hashes, seems like you've added purposely those strings coded using Base64 for an easy job! No problem for educational purpose, but if you wanna simulate a more realistic environment that's not the right way!

Ответить
@khankk9723
@khankk9723 - 29.09.2024 04:12

Good one

Ответить
@DjehutimasAsarRa
@DjehutimasAsarRa - 15.09.2024 16:24

Gold

Ответить
@GeorSing
@GeorSing - 08.09.2024 10:32

My name terorisme hacker cyber Indonesian virus Trojan server nginux and spam internet Department Pertahananan Republik Indonesian system digerd Inc Indonesian

Ответить
@angleritamlegam
@angleritamlegam - 02.08.2024 21:04

bagaimana jika terhalang firewall unutk phpinfo?

Ответить
@thatniqqakevin644
@thatniqqakevin644 - 24.07.2024 20:34

Hey bro I'm having some trouble with and assignment is there anyway you could reach out to me and give me some help please

Ответить
@JeremyAbreuReyes
@JeremyAbreuReyes - 21.07.2024 14:39

UMGC pentest class?

Ответить
@serenitysscape
@serenitysscape - 11.07.2024 20:31

Awesome 😊

Ответить
@olafaps5820
@olafaps5820 - 03.05.2024 16:59

saved my life with this video thanks boss!!!!!

Ответить
@shamelessone1987
@shamelessone1987 - 30.04.2024 06:49

needed this example. class lecture just skimmed over the vulnerability. Thanks man

Ответить
@multitaskprueba1
@multitaskprueba1 - 18.04.2024 16:41

Fantastic! You are a genius! Thank you for your video!

Ответить
@brandonlienhart122
@brandonlienhart122 - 12.04.2024 18:36

Pro tip don’t copy and paste the payload you could ran “use 0” which is nice when browsing multiple options on your aux search

Ответить
@Hunter-x3b
@Hunter-x3b - 12.04.2024 14:13

Hi please hack ip that you never know before

Ответить
@helloworld9349
@helloworld9349 - 13.03.2024 22:20

good job

Ответить
@ntrq
@ntrq - 11.03.2024 16:12

nice bro

Ответить
@darkzone5893
@darkzone5893 - 11.03.2024 04:18

What kind of kali is this please

Ответить
@slotdemogacors
@slotdemogacors - 10.03.2024 19:28

mine is msf6 and cant got error

Ответить
@jeliazkozlatev3940
@jeliazkozlatev3940 - 10.03.2024 18:51

The video name is kind of misleading. I would name it ->
Metasploit: Exploit PHP CGI arg injection and dictionary password cracking via John the Ripper.

Ответить
@paulrheinert
@paulrheinert - 10.03.2024 11:17

You can type 'use {index}' for using the exploit

Ответить
@awm_5008
@awm_5008 - 10.03.2024 06:21

how th is this video not down

Ответить
@sunrose8913
@sunrose8913 - 10.03.2024 03:13

more

Ответить
@BossModeGod
@BossModeGod - 10.03.2024 02:36

No clue whats going on here. How can i make sure im bot being exploited by this ?

Ответить
@shahjahan8997
@shahjahan8997 - 09.03.2024 19:39

What is the purpose of this for ???

Ответить
@nejarmparmolle5161
@nejarmparmolle5161 - 08.03.2024 17:54

2 mount ago 💀

Ответить
@orca2162
@orca2162 - 07.03.2024 02:34

Nice !

Ответить
@tommymairo8964
@tommymairo8964 - 07.03.2024 01:43

It's kinda amazing that msf is still actively updating its payload database, rather than phased out as an archived project.

Ответить
@mangohush5946
@mangohush5946 - 05.03.2024 19:13

I appreciate you. Thank you.

Ответить
@mwlulud2995
@mwlulud2995 - 04.03.2024 23:58

Bro php is < 8 version and your ubuntu is 5.10 haha veryyyyyyyyyyy old exploit

Ответить
@lenovorafiq
@lenovorafiq - 04.03.2024 23:13

Which version of Kali Linux are you using?

Ответить
@steph-se2yw
@steph-se2yw - 02.03.2024 16:16

Not many employees can do that at their work

Ответить
@ZarakKhan-h3j
@ZarakKhan-h3j - 02.03.2024 16:03

script kiddie

Ответить
@theFabz
@theFabz - 29.02.2024 07:36

Great job

Ответить
@lennymoore2443
@lennymoore2443 - 27.02.2024 02:13

you saved my fucking life broski.

Ответить
@TudarHimis
@TudarHimis - 26.02.2024 12:19

This is the real thing i was looking for. Great tutorial

Ответить
@OfficialSethro
@OfficialSethro - 26.02.2024 10:10

Good content

Ответить
@nanabrightatsiatorme1348
@nanabrightatsiatorme1348 - 20.02.2024 08:57

Great 👍 👌 ....more stuff

Ответить
@unknownboi9084
@unknownboi9084 - 09.02.2024 16:32

Nice video man. Keep up the work.

Ответить
@h4ckh3lp
@h4ckh3lp - 14.01.2024 09:06

When you search for something in metasploit such as php_cgi and it gives you a numbered list of modules that fit your search, you can just say "use 0" or "use 1" instead of having to copy and paste the module's name

Ответить
@Hussein-nz4is
@Hussein-nz4is - 12.01.2024 14:53

Great job man, Thanks for the lesson

Ответить
@snessdalhou
@snessdalhou - 11.01.2024 22:54

No payload configured, defaulting to php/meterpreter/reverse_tcp
I get this when I try to select the php_cgi arg injection, any help?

Ответить
@wnnbh
@wnnbh - 01.01.2024 01:41

We want more. xD

Ответить
@ojochegbe_
@ojochegbe_ - 31.12.2023 19:01

Great job brother ❤

Ответить
@K1Secure
@K1Secure - 29.12.2023 15:34

upload more vdos bro

Ответить
@RaGhav363
@RaGhav363 - 27.12.2023 16:45

Bruh make few vedios on SMTP ftp ssh vnc smb and at last MySQL and postgres

Ответить
@strongisland4081
@strongisland4081 - 27.12.2023 02:24

Very good tutorial. Excellent presentation. Can't wait to see future tutorials.

Ответить
@TheMsGayle
@TheMsGayle - 23.12.2023 00:48

Thanks for sharing!!

Ответить
@_z3r0day
@_z3r0day - 22.12.2023 23:55

very nice

Ответить