If you spotted any areas for improvement, have alternative techniques, or discovered other creative ways to hack this machine, please share them in the comments. Your insights help us all grow as ethical hackers! 👍
Wow, your tutorials are truly exceptional! 🎉 The way you simplify complex cybersecurity concepts and make them engaging is just amazing. It's clear you put a lot of effort into your teaching, and it's incredibly effective for learners like me. You've inspired me to dive deeper into the field, and I genuinely appreciate the value you're providing to the community. Thank you for sharing your knowledge and making this journey so enjoyable and informative! 🙌💻
Appreciate ya! I'm using kali-dark theme for GTK2 and GTK3 applications, along with the flat remix blue dark icons. Window manager theme is also kali-dark 👍
It's a project I coded locally in svelte & tailwind, that I use to make them which will be expanding on in next.js 👍 nothing big just to keep learning coding
hi Cris, sorry if I allow myself to become familiar in the way to address you, I would just like to know how to get nmap output of the ports out in a colorful way as you show in the videos........ I follow you and I am your follow even if I am Italian and I used Google Translate to write you this message...... Congratulations for your videos that are impeccably explained, even for me who am a beginner
Hello chris , firstly, I wanna thank you for your exceptional content, 2nd , please Ive a question,so, Ive some principles of cybersecurity, I wanna professionalize it, is this possible, although Im currently working as a petroleum engineer, I mean completely outside the field of information security, and plz , can u suggest to me a road map you followed it , big thanks from Algeria.
Hello, I've been following you since your very first video. Honestly, I would really appreciate it if you could make a video about an Active Directory machine, as I struggle with that. I've learned a lot from you about the web! thank u so much sir
If you spotted any areas for improvement, have alternative techniques, or discovered other creative ways to hack this machine, please share them in the comments. Your insights help us all grow as ethical hackers! 👍
Wow, your tutorials are truly exceptional! 🎉 The way you simplify complex cybersecurity concepts and make them engaging is just amazing. It's clear you put a lot of effort into your teaching, and it's incredibly effective for learners like me. You've inspired me to dive deeper into the field, and I genuinely appreciate the value you're providing to the community. Thank you for sharing your knowledge and making this journey so enjoyable and informative! 🙌💻
Thank you so much, that means a lot! Glad to inspire you, keep going! 🙌💻
@@chrisalupului Thank you sir for this precious reply it means a lot 🥺 Big fan sir love you from India ❤️
45:26 😂The file upload vulnerability was so easy sir❤
😂 yup yup, we're able to bypass the whitelist pretty easy and looks like the application is not performing any proper blacklist validation at all
Root privilege escalation is New for me....Thank you !!
Happy to hear that! 😎
great as always...
may i know which theme are you using for kali
Appreciate ya! I'm using kali-dark theme for GTK2 and GTK3 applications, along with the flat remix blue dark icons. Window manager theme is also kali-dark 👍
@@chrisalupului okey
Also, a quick question: Can you do a tutorial on how to set up a Kali Linux VM, including the settings you used? Thanks
Absolutely, great idea! 🚀
how did you make that popup for the commands that's awesome?
It's a project I coded locally in svelte & tailwind, that I use to make them which will be expanding on in next.js 👍 nothing big just to keep learning coding
What is your terminal configuration sir. That's cool
straight from my .zshrc
plugins=(git zsh-syntax-highlighting zsh-autosuggestions colorize grc tmux)
Love the content ❤
Thank you so much! ❤ Glad you’re enjoying it
Great content
So glad you liked it! More on the way! 🔥
hi Cris, sorry if I allow myself to become familiar in the way to address you, I would just like to know how to get nmap output of the ports out in a colorful way as you show in the videos........ I follow you and I am your follow even if I am Italian and I used Google Translate to write you this message...... Congratulations for your videos that are impeccably explained, even for me who am a beginner
Thank you, Appreciate you! My nmap output is colorful from 'grc' which is added in my plugins for zsh
@chrisalupului thanks
You are awesome, keep up the great work.
Appreciate it! Glad you found it helpful. 👍
Man.... amazing!
Thank you! Cheers!
Thank you so much 🎉
Glad you found it helpful!
Hello chris , firstly, I wanna thank you for your exceptional content, 2nd , please Ive a question,so, Ive some principles of cybersecurity, I wanna professionalize it, is this possible, although Im currently working as a petroleum engineer, I mean completely outside the field of information security, and plz , can u suggest to me a road map you followed it , big thanks from Algeria.
Appreciate you! Will make a video on this soon that will cover my roadmap journey and future plans. 👍
@chrisalupului great , thank you so much.
this is a very inspiring tutorial thanks for the content
I’m so glad you found it inspiring! 👍
Hello, I've been following you since your very first video. Honestly, I would really appreciate it if you could make a video about an Active Directory machine, as I struggle with that. I've learned a lot from you about the web! thank u so much sir
Appreciate you! Active Directory is on my list of topics to cover. 👍
Good dude
Appreciate it! 🙏