Комментарии:
what if php doesnt pop up after running metaploit??
ОтветитьNice tutorial but i have a question if you can see this
If i use an actual running website ip address that has 80 opened would it work?🤔
Base64 is not and i guess never ever was the standard encryption mode or method to mask a shadow file with Hashes, seems like you've added purposely those strings coded using Base64 for an easy job! No problem for educational purpose, but if you wanna simulate a more realistic environment that's not the right way!
ОтветитьGood one
ОтветитьGold
ОтветитьMy name terorisme hacker cyber Indonesian virus Trojan server nginux and spam internet Department Pertahananan Republik Indonesian system digerd Inc Indonesian
Ответитьbagaimana jika terhalang firewall unutk phpinfo?
ОтветитьHey bro I'm having some trouble with and assignment is there anyway you could reach out to me and give me some help please
ОтветитьUMGC pentest class?
ОтветитьAwesome 😊
Ответитьsaved my life with this video thanks boss!!!!!
Ответитьneeded this example. class lecture just skimmed over the vulnerability. Thanks man
ОтветитьFantastic! You are a genius! Thank you for your video!
ОтветитьPro tip don’t copy and paste the payload you could ran “use 0” which is nice when browsing multiple options on your aux search
ОтветитьHi please hack ip that you never know before
Ответитьgood job
Ответитьnice bro
ОтветитьWhat kind of kali is this please
Ответитьmine is msf6 and cant got error
ОтветитьThe video name is kind of misleading. I would name it ->
Metasploit: Exploit PHP CGI arg injection and dictionary password cracking via John the Ripper.
You can type 'use {index}' for using the exploit
Ответитьhow th is this video not down
Ответитьmore
ОтветитьNo clue whats going on here. How can i make sure im bot being exploited by this ?
ОтветитьWhat is the purpose of this for ???
Ответить2 mount ago 💀
ОтветитьNice !
ОтветитьIt's kinda amazing that msf is still actively updating its payload database, rather than phased out as an archived project.
ОтветитьI appreciate you. Thank you.
ОтветитьBro php is < 8 version and your ubuntu is 5.10 haha veryyyyyyyyyyy old exploit
ОтветитьWhich version of Kali Linux are you using?
ОтветитьNot many employees can do that at their work
Ответитьscript kiddie
ОтветитьGreat job
Ответитьyou saved my fucking life broski.
ОтветитьThis is the real thing i was looking for. Great tutorial
ОтветитьGood content
ОтветитьGreat 👍 👌 ....more stuff
ОтветитьNice video man. Keep up the work.
ОтветитьWhen you search for something in metasploit such as php_cgi and it gives you a numbered list of modules that fit your search, you can just say "use 0" or "use 1" instead of having to copy and paste the module's name
ОтветитьGreat job man, Thanks for the lesson
ОтветитьNo payload configured, defaulting to php/meterpreter/reverse_tcp
I get this when I try to select the php_cgi arg injection, any help?
We want more. xD
ОтветитьGreat job brother ❤
Ответитьupload more vdos bro
ОтветитьBruh make few vedios on SMTP ftp ssh vnc smb and at last MySQL and postgres
ОтветитьVery good tutorial. Excellent presentation. Can't wait to see future tutorials.
ОтветитьThanks for sharing!!
Ответитьvery nice
Ответить