Cybergen
Cybergen
  • Видео 8
  • Просмотров 1 226
LFI & RCE Vulnerabilities
In this class, we look into two critical web security vulnerabilities: Remote Code Execution (RCE) and Local File Inclusion (LFI). Learn how attackers exploit these vulnerabilities to execute malicious code and access sensitive files on web servers. We cover the technical details of how RCE and LFI work, demonstrate real-world examples, and discuss the best practices for preventing these vulnerabilities in your applications.
Просмотров: 210

Видео

Hacking MySQL Database with Python
Просмотров 419День назад
In this video, I demonstrate how to exploit a Metasploitable's MySQL database using Python. This tutorial is for cybersecurity enthusiasts looking to understand penetration testing techniques and improve their ethical hacking skills. Metasploitable 2 download : information.rapid7.com/download-metasploitable-2017.html Python Script : github.com/Cybargeneration/sql_brute.git
Evil reCAPTCHA: Hackers Can Easily Hack Your Computer!
Просмотров 5928 дней назад
In this video, I break down how hackers use a fake reCAPTCHA to trick you into thinking you're verifying you're not a robot. But instead, they’re trying to hack into your computer! I’ll show you step-by-step how this attack works, what makes it so sneaky, and how you can protect yourself from falling for it. No technical knowledge is needed-just an eye for detail and some basic tips to stay saf...
Exploiting and Patching ShellShock Vulnerability with Metasploit | Ethical Hacking Tutorial
Просмотров 280Месяц назад
In this video, I demonstrate how to exploit a vulnerable web server using the Metasploit Framework by targeting the ShellShock vulnerability. Watch as we walk through configuring and launching the attack, gaining access to the target system, and then patching the vulnerability to secure the system. This hands-on ethical hacking tutorial highlights the importance of keeping systems updated to pr...
Ransomware Attack Using Telegram: A New Cyber Threat!
Просмотров 107Месяц назад
In this video, we explore a growing cyber threat: ransomware that uses Telegram as its Command and Control (C2) platform. As ransomware attacks become more sophisticated, cybercriminals are turning to encrypted messaging apps like Telegram to manage their malicious operations. We’ll break down how these attacks work, why Telegram is a popular choice for hackers, and what you can do to protect y...
Scammers are using LinkedIn
Просмотров 542 месяца назад
In this video, we expose the tactics used by hackers on LinkedIn to steal personal and professional data. Learn how these cybercriminals pose as legitimate recruiters to deceive users, gather sensitive information, and compromise your security. Don't fall victim to these attacks-stay informed and stay safe!
Trap Hackers Like a Pro with Honeypots
Просмотров 962 месяца назад
In this video, you'll learn how to effectively use low interactive honeypots to detect and trap hackers like a pro. I'll guide you through the process of deploying and configuring an FTP honeypot with Python, showing you how it can be a powerful tool in your cybersecurity toolkit. Whether you're new to honeypots or looking to refine your skills, this video offers practical insights and tips to ...

Комментарии

  • @GeniusFranklyn
    @GeniusFranklyn 10 дней назад

    Once again, Nice one 💯✅

  • @DannyUde
    @DannyUde Месяц назад

    Keep it up bro My 🐐

  • @stevenahoy3248
    @stevenahoy3248 Месяц назад

    hello can i get the code ? im try to study this , my english is bad sorry

  • @TopPunks
    @TopPunks 2 месяца назад

    From the community

  • @lukeiyaak8880
    @lukeiyaak8880 2 месяца назад

    Great!..

  • @Cybergenenation
    @Cybergenenation 2 месяца назад

    Note: If you want to start up a reverse shell you have to edit the “data_transfer.py” script(you can use nano or vi). Locate the line where you have server_ip = “your_ip_address” and change that to the ip address of the machine you started your listener on. Best of luck!!!!

  • @Motherofboys256
    @Motherofboys256 2 месяца назад

    From X