How to exploit port 80 HTTP on Kali Linux

Поделиться
HTML-код
  • Опубликовано: 29 янв 2025

Комментарии • 76

  • @tommymairo8964
    @tommymairo8964 10 месяцев назад +15

    It's kinda amazing that msf is still actively updating its payload database, rather than phased out as an archived project.

  • @MVP-j1c
    @MVP-j1c 11 месяцев назад +14

    This is the real thing i was looking for. Great tutorial

  • @vexed3185
    @vexed3185 10 месяцев назад +8

    This was not just "an http port 80".
    but great tutorial, keep it going❤

  • @shamelessone1987
    @shamelessone1987 9 месяцев назад +4

    needed this example. class lecture just skimmed over the vulnerability. Thanks man

  • @strongisland4081
    @strongisland4081 Год назад +4

    Very good tutorial. Excellent presentation. Can't wait to see future tutorials.

  • @JerrySpallone
    @JerrySpallone 10 дней назад +1

    Great video. I was a little triggered when you copied and pasted the exploit instead of “use 0” haha

  • @Hussein-nz4is
    @Hussein-nz4is Год назад +2

    Great job man, Thanks for the lesson

  • @olafaps5820
    @olafaps5820 9 месяцев назад

    saved my life with this video thanks boss!!!!!

  • @unknownboi9084
    @unknownboi9084 11 месяцев назад

    Nice video man. Keep up the work.

  • @ojochegbe_
    @ojochegbe_ Год назад +1

    Great job brother ❤

  • @Anupambiswas-r1m
    @Anupambiswas-r1m 26 дней назад +1

    After scanning, you need to brute force the posts that most likely contain passwords from that site.

  • @brandonlienhart122
    @brandonlienhart122 9 месяцев назад +2

    Pro tip don’t copy and paste the payload you could ran “use 0” which is nice when browsing multiple options on your aux search

  • @multitaskprueba1
    @multitaskprueba1 9 месяцев назад

    Fantastic! You are a genius! Thank you for your video!

  • @steph-se2yw
    @steph-se2yw 11 месяцев назад +11

    Not many employees can do that at their work

  • @Muzzcraftandhandmade
    @Muzzcraftandhandmade Год назад +1

    Informative video upload more videos like this ❤

  • @Charchar437
    @Charchar437 3 месяца назад +1

    what if php doesnt pop up after running metaploit??

  • @TheMsGayle
    @TheMsGayle Год назад +1

    Thanks for sharing!!

  • @nanabrightatsiatorme1348
    @nanabrightatsiatorme1348 11 месяцев назад

    Great 👍 👌 ....more stuff

  • @snessdalhou
    @snessdalhou Год назад +1

    No payload configured, defaulting to php/meterpreter/reverse_tcp
    I get this when I try to select the php_cgi arg injection, any help?

    • @CreativityRealized
      @CreativityRealized  Год назад +1

      I've been trying to figure out your issue....but try entering the "lhost" with the host IP address before running the running the injection and see if the error is fixed. Depending on your situation, you may need to even set a payload. Good luck!

    • @oni-tj8df
      @oni-tj8df 9 месяцев назад

      said the same thing for me but i typed "use 0" and it worked

    • @SleepyGameFacts
      @SleepyGameFacts Месяц назад

      ​​@@CreativityRealizedIt's a payload error. Using this on an external IP address requires port forwarding in order to launch the reverse shell. Your example was an internal IP on your network

  • @Hermesfurie
    @Hermesfurie 3 месяца назад

    Nice tutorial but i have a question if you can see this
    If i use an actual running website ip address that has 80 opened would it work?🤔

  • @mangohush5946
    @mangohush5946 11 месяцев назад

    I appreciate you. Thank you.

  • @JeremyAbreuReyes
    @JeremyAbreuReyes 6 месяцев назад

    UMGC pentest class?

  • @OfficialSethro
    @OfficialSethro 11 месяцев назад +1

    Good content

  • @lenovorafiq
    @lenovorafiq 11 месяцев назад

    Which version of Kali Linux are you using?

    • @Hooah4206
      @Hooah4206 10 месяцев назад

      Looks like gnome desktop interface and the basic version of Kali but all including the live and vm version all are the same

  • @serenitysscape
    @serenitysscape 6 месяцев назад

    Awesome 😊

  • @theFabz
    @theFabz 11 месяцев назад

    Great job

  • @darkzone5893
    @darkzone5893 10 месяцев назад

    What kind of kali is this please

    • @swag2315
      @swag2315 10 месяцев назад

      if you are refering to the desktop environment it looks like Gnome

  • @angleritamlegam
    @angleritamlegam 6 месяцев назад

    bagaimana jika terhalang firewall unutk phpinfo?

  • @paulrheinert
    @paulrheinert 10 месяцев назад

    You can type 'use {index}' for using the exploit

    • @clariseastimbom6233
      @clariseastimbom6233 9 месяцев назад

      i tried that but i kept getting a failed to loas module kind of message. would you know why

    • @paulrheinert
      @paulrheinert 9 месяцев назад

      Maybe metasploit isn't up to date. What Linux distribution do you use and how did you install metasploit? If you are on Debian or Ubuntu, msfupdate should work

  • @YohansKeste
    @YohansKeste 2 месяца назад

    hello can you help me about hack and about Kali linux please ?

  • @slotdemogacors
    @slotdemogacors 10 месяцев назад

    mine is msf6 and cant got error

  • @khankk9723
    @khankk9723 4 месяца назад

    Good one

  • @helloworld9349
    @helloworld9349 10 месяцев назад

    good job

  • @thatniqqakevin644
    @thatniqqakevin644 6 месяцев назад

    Hey bro I'm having some trouble with and assignment is there anyway you could reach out to me and give me some help please

  • @_z3r0day
    @_z3r0day Год назад

    very nice

  • @RaGhav363
    @RaGhav363 Год назад +2

    Bruh make few vedios on SMTP ftp ssh vnc smb and at last MySQL and postgres

  • @orca2162
    @orca2162 10 месяцев назад

    Nice !

  • @ntrq
    @ntrq 10 месяцев назад

    nice bro

  • @wnnbh
    @wnnbh Год назад

    We want more. xD

  • @lennymoore2443
    @lennymoore2443 11 месяцев назад

    you saved my fucking life broski.

  • @awm_5008
    @awm_5008 10 месяцев назад

    how th is this video not down

  • @K1Secure
    @K1Secure Год назад +1

    upload more vdos bro

  • @Dingus_Grease
    @Dingus_Grease Год назад

    Wicked

  • @DjehutimasAsarRa
    @DjehutimasAsarRa 4 месяца назад

    Gold

  • @brunosantos3852
    @brunosantos3852 4 месяца назад

    Base64 is not and i guess never ever was the standard encryption mode or method to mask a shadow file with Hashes, seems like you've added purposely those strings coded using Base64 for an easy job! No problem for educational purpose, but if you wanna simulate a more realistic environment that's not the right way!

  • @JamalIs-h5x
    @JamalIs-h5x 2 месяца назад

    You could have just typed use 0 u didn't have to copy and paste

  • @shahjahan8997
    @shahjahan8997 10 месяцев назад

    What is the purpose of this for ???

    • @Dmove3
      @Dmove3 10 месяцев назад +1

      Promote world peace

    • @JeremyAbreuReyes
      @JeremyAbreuReyes 6 месяцев назад

      its for a class.

  • @MobileToA
    @MobileToA 10 месяцев назад

    No clue whats going on here. How can i make sure im bot being exploited by this ?

    • @swag2315
      @swag2315 10 месяцев назад +1

      if you keep everything updated this won't work, what he is doing in the video rarely works in any real life scenario and relies on exploits that are several years old

    • @MobileToA
      @MobileToA 10 месяцев назад

      @@swag2315 good news i hope

  • @mwlulud2995
    @mwlulud2995 11 месяцев назад +2

    Bro php is < 8 version and your ubuntu is 5.10 haha veryyyyyyyyyyy old exploit

  • @sunrose8913
    @sunrose8913 10 месяцев назад

    more

  • @ZarakKhan-h3j
    @ZarakKhan-h3j 11 месяцев назад +3

    script kiddie

    • @bozhdiarjordanov6353
      @bozhdiarjordanov6353 4 месяца назад

      where can i learn real shit

    • @manwitduhplan
      @manwitduhplan 4 месяца назад

      Brother in Christ as salty as this may make you msf is a tool like any other and it's not as straight forward as you think script kiddies are much worse when it comes to ripping code and don't tend to have a understanding or grasp what there doing this is low level yes

    • @manwitduhplan
      @manwitduhplan 4 месяца назад

      But it can always be worse

  • @Hunter-x3b
    @Hunter-x3b 9 месяцев назад

    Hi please hack ip that you never know before

  • @nejarmparmolle5161
    @nejarmparmolle5161 10 месяцев назад +1

    2 mount ago 💀

  • @GeorSing
    @GeorSing 4 месяца назад

    My name terorisme hacker cyber Indonesian virus Trojan server nginux and spam internet Department Pertahananan Republik Indonesian system digerd Inc Indonesian