@Hackersploit I have you book. Can this be used by a beginner? In your book for this section, it seems like I am missing a step. What protocol should be used to connect first to check for unquoted path, RDP??
Did you explain that the reason the exploit is named Common.exe is the next folder in the path was 'Common Files' - windows just appends .exe to the end of the folder name (when searching along the path) so when there is a space it just trys appending .exe to Common (the first part of the folder name) - hence the file name. Sorry if you did.....i missed it.
You are right, he got that bit wrong. He seemed to be suggesting that Windows searches each folder for the executable name, but as you said it’s all about the space that follows the folder name
Oh man , i thought we can name our payload anything we want. . i was worried why this is not working. . , at the end i was able to figure it on my own .
Are u using parrot os? I started to watch your playlist of ethical hacking, there u recomended using parrot os instead of kali linux, so should i use now parrot os? ar eu using now parrot os?
I've never bought a youtubers merch before. But I gotta get a shirt or something. Thanks for all the content homie.
Thank you for the support :)
I was thinking the same thing
Alexis Ahmed ! Bro your content is very useful. Thanks for providing us with opportunity to learn without any cost.
❤️❤️❤️
Very informative video, thanks for your efforts.
May you share your terminal configuration, I liked how it looks.👌
What did you learn to have the prerequisites for all this
what about antivirus on windows?
The vulnerability is the IP addresses and water is wet?
@Hackersploit I have you book. Can this be used by a beginner? In your book for this section, it seems like I am missing a step. What protocol should be used to connect first to check for unquoted path, RDP??
Did you explain that the reason the exploit is named Common.exe is the next folder in the path was 'Common Files' - windows just appends .exe to the end of the folder name (when searching along the path) so when there is a space it just trys appending .exe to Common (the first part of the folder name) - hence the file name. Sorry if you did.....i missed it.
You are right, he got that bit wrong. He seemed to be suggesting that Windows searches each folder for the executable name, but as you said it’s all about the space that follows the folder name
Thank you for pointing this out, i had this in my notes and forgot to mention this.
Oh man , i thought we can name our payload anything we want. . i was worried why this is not working. . , at the end i was able to figure it on my own .
A very great video sir
Great content per usual!
Are u using parrot os? I started to watch your playlist of ethical hacking, there u recomended using parrot os instead of kali linux, so should i use now parrot os? ar eu using now parrot os?
I use Kali by default.
@@HackerSploit okay thx
Nothing important to say....just wanted to be among the first 10 people to comment 😂
Nice video
Since windows is used 98% of the time
Does that mean In real life scenarios we would almost never encounter linux as privilege escalation vector?
No linux can also be escalated .
Yes!
Notification squad