Windows Privilege Escalation - Unquoted Service Paths

Поделиться
HTML-код
  • Опубликовано: 15 дек 2024

Комментарии • 24

  • @brianobey4368
    @brianobey4368 3 года назад +4

    I've never bought a youtubers merch before. But I gotta get a shirt or something. Thanks for all the content homie.

  • @usamahussain1580
    @usamahussain1580 3 года назад +3

    Alexis Ahmed ! Bro your content is very useful. Thanks for providing us with opportunity to learn without any cost.
    ❤️❤️❤️

  • @XDGame34r99
    @XDGame34r99 2 года назад

    Very informative video, thanks for your efforts.
    May you share your terminal configuration, I liked how it looks.👌

  • @aspirohk3558
    @aspirohk3558 Год назад

    What did you learn to have the prerequisites for all this

  • @CodeCraft-Mn
    @CodeCraft-Mn 7 часов назад

    what about antivirus on windows?

  • @A-No-One
    @A-No-One 3 года назад

    The vulnerability is the IP addresses and water is wet?

  • @taiquangong9912
    @taiquangong9912 2 года назад

    @Hackersploit I have you book. Can this be used by a beginner? In your book for this section, it seems like I am missing a step. What protocol should be used to connect first to check for unquoted path, RDP??

  • @mikewykes1624
    @mikewykes1624 3 года назад +1

    Did you explain that the reason the exploit is named Common.exe is the next folder in the path was 'Common Files' - windows just appends .exe to the end of the folder name (when searching along the path) so when there is a space it just trys appending .exe to Common (the first part of the folder name) - hence the file name. Sorry if you did.....i missed it.

    • @joegrass721
      @joegrass721 3 года назад

      You are right, he got that bit wrong. He seemed to be suggesting that Windows searches each folder for the executable name, but as you said it’s all about the space that follows the folder name

    • @HackerSploit
      @HackerSploit  3 года назад

      Thank you for pointing this out, i had this in my notes and forgot to mention this.

    • @8080VB
      @8080VB 3 года назад

      Oh man , i thought we can name our payload anything we want. . i was worried why this is not working. . , at the end i was able to figure it on my own .

  • @alexalderson5767
    @alexalderson5767 3 года назад +1

    A very great video sir

  • @whoisPremier
    @whoisPremier 3 года назад +1

    Great content per usual!

  • @Anton2452r2n
    @Anton2452r2n 3 года назад

    Are u using parrot os? I started to watch your playlist of ethical hacking, there u recomended using parrot os instead of kali linux, so should i use now parrot os? ar eu using now parrot os?

  • @konfushon
    @konfushon 3 года назад +1

    Nothing important to say....just wanted to be among the first 10 people to comment 😂

  • @gamemorvikaxh
    @gamemorvikaxh 2 года назад

    Nice video

  • @theethicalhadwani4091
    @theethicalhadwani4091 3 года назад

    Since windows is used 98% of the time
    Does that mean In real life scenarios we would almost never encounter linux as privilege escalation vector?

    • @8080VB
      @8080VB 3 года назад

      No linux can also be escalated .

  • @BitFitMits
    @BitFitMits 3 года назад

    Yes!

  • @MrGFYne1337357
    @MrGFYne1337357 3 года назад

    Notification squad