Комментарии:
very nice
ОтветитьThanks for sharing!!
ОтветитьVery good tutorial. Excellent presentation. Can't wait to see future tutorials.
ОтветитьBruh make few vedios on SMTP ftp ssh vnc smb and at last MySQL and postgres
Ответитьupload more vdos bro
ОтветитьGreat job brother ❤
ОтветитьWe want more. xD
ОтветитьNo payload configured, defaulting to php/meterpreter/reverse_tcp
I get this when I try to select the php_cgi arg injection, any help?
Great job man, Thanks for the lesson
ОтветитьWhen you search for something in metasploit such as php_cgi and it gives you a numbered list of modules that fit your search, you can just say "use 0" or "use 1" instead of having to copy and paste the module's name
ОтветитьNice video man. Keep up the work.
ОтветитьGreat 👍 👌 ....more stuff
ОтветитьGood content
ОтветитьThis is the real thing i was looking for. Great tutorial
Ответитьyou saved my fucking life broski.
ОтветитьGreat job
Ответитьscript kiddie
ОтветитьNot many employees can do that at their work
ОтветитьWhich version of Kali Linux are you using?
ОтветитьBro php is < 8 version and your ubuntu is 5.10 haha veryyyyyyyyyyy old exploit
ОтветитьI appreciate you. Thank you.
ОтветитьIt's kinda amazing that msf is still actively updating its payload database, rather than phased out as an archived project.
ОтветитьNice !
Ответить2 mount ago 💀
ОтветитьWhat is the purpose of this for ???
ОтветитьNo clue whats going on here. How can i make sure im bot being exploited by this ?
Ответитьmore
Ответитьhow th is this video not down
ОтветитьYou can type 'use {index}' for using the exploit
ОтветитьThe video name is kind of misleading. I would name it ->
Metasploit: Exploit PHP CGI arg injection and dictionary password cracking via John the Ripper.
mine is msf6 and cant got error
ОтветитьWhat kind of kali is this please
Ответитьnice bro
Ответитьgood job
ОтветитьHi please hack ip that you never know before
ОтветитьPro tip don’t copy and paste the payload you could ran “use 0” which is nice when browsing multiple options on your aux search
ОтветитьFantastic! You are a genius! Thank you for your video!
Ответитьneeded this example. class lecture just skimmed over the vulnerability. Thanks man
Ответитьsaved my life with this video thanks boss!!!!!
ОтветитьAwesome 😊
ОтветитьUMGC pentest class?
ОтветитьHey bro I'm having some trouble with and assignment is there anyway you could reach out to me and give me some help please
Ответитьbagaimana jika terhalang firewall unutk phpinfo?
ОтветитьMy name terorisme hacker cyber Indonesian virus Trojan server nginux and spam internet Department Pertahananan Republik Indonesian system digerd Inc Indonesian
ОтветитьGold
ОтветитьGood one
ОтветитьBase64 is not and i guess never ever was the standard encryption mode or method to mask a shadow file with Hashes, seems like you've added purposely those strings coded using Base64 for an easy job! No problem for educational purpose, but if you wanna simulate a more realistic environment that's not the right way!
ОтветитьNice tutorial but i have a question if you can see this
If i use an actual running website ip address that has 80 opened would it work?🤔
what if php doesnt pop up after running metaploit??
Ответить