Hacked and Backdoored this website in MINUTES! NEVER try this on unauthorized targets!

Поделиться
HTML-код
  • Опубликовано: 6 фев 2025
  • #pentesting #ctf #hacking #cybersecurity
    DISCLAIMER: The techniques shown here should strictly be used on targets you HAVE permission to test. NEVER hack something you don't have permission to.
    In this video, I demonstrate how I hacked a CTF target, got root, and backdoored it in just minutes. You will learn many hacking techniques along the way! Challenge from @indishell1046
    🔥Use Coupon THEHACKERISH and Get 5% discount on CRTP and other courses on www.alteredsec... when you pay with Stripe.
    🚀 🔥 Become a pentester
    academy.thehac...
    📙 Learn the technical skills:
    thehackerish.c...
    📙 Become a successful bug bounty hunter: thehackerish.c...
    🆓 Download your FREE Web hacking LAB and starting hacking NOW: thehackerish.c...
    🌐 Read more on the blog: thehackerish.com
    🇩 Discord: / discord
    💪🏻 Support this work: thehackerish.c...
    Facebook Page: / thehackerish
    Follow us on Twitter: / thehackerish
    Listen on Anchor: anchor.fm/theh...
    Listen on Spotify: open.spotify.c...
    Listen on Google Podcasts: podcasts.googl...

Комментарии • 286

  • @adeelahmed1826
    @adeelahmed1826 Год назад +701

    As a web developer this felt like a horror movie. Would love to see a video hacking a PHP Laravel website. Subscribed

    • @thehackerish
      @thehackerish  Год назад +55

      Cool! I'll see what I can do

    • @TimelessCode
      @TimelessCode Год назад +9

      same lol

    • @TimelessCode
      @TimelessCode Год назад +10

      this is the definition of a horror movie to a web dev

    • @tsogangmosweswe6545
      @tsogangmosweswe6545 Год назад +3

      I'm out here sweating too😅😅 New subscriber gained

    • @BlueJDev
      @BlueJDev Год назад

      Could be wrong but I believe laravel, *when properly installed*, is more secure than Drupal. Just my opinion of course and nothing is ever truly secure.
      I've seen plenty of people installing laravel the wrong way with env public and accessible or all files in www folder etc etc.
      Still would love to see where the more advanced vulnerabilities are... Of course if the video is simply "look a freely accessible env file", I will be truly disappointed teehee

  • @cken27
    @cken27 Год назад +253

    First time seeing hacking attempts like this. Amazing content!

  • @Licardo7
    @Licardo7 Год назад +356

    Came for the back door, stayed for the plot

    • @user-vk2cd9qw7i
      @user-vk2cd9qw7i Год назад +12

      Sure you didn’t come in the back door?

    • @demyk214
      @demyk214 Год назад

      @@user-vk2cd9qw7i🤡

  • @steelko665
    @steelko665 Год назад +48

    Learned a whole lot just by watching the video. Currently a second-year cybersecurity student, this is very helpful. Thank you!

  • @traumaloop
    @traumaloop Год назад +29

    i really understand maybe 5% of what's being said but i can certainly tell that that website got completely folded

  • @sooivervloessem6246
    @sooivervloessem6246 Год назад +165

    This is insane! As a second year Cybersecurity student, my mind is blown by the way of thinking. I often find it hard to not have a tunnel vision when searching for exploits. I'm really wondering, how did you learn all this stuff?

    • @thehackerish
      @thehackerish  Год назад +57

      At first I did not know about anything, but with time and experience I developed my skills. I vividly remember my first app I hacked! I was hooked, and I'm still learning to this day

    • @vneem3758
      @vneem3758 Год назад +9

      @@thehackerish could you name some resources you found helpful along the way to learn

    • @thehackerish
      @thehackerish  Год назад +36

      @@vneem3758 I have shared videos about this yes, watch this one for instance ruclips.net/video/qanMMA5fPlY/видео.html, you can also watch my web hacking playlist which is a step-by-step course for web hacking

    • @elexbeats
      @elexbeats Год назад

      @@thehackerishthe first thing I hacked was when I was 15 and changed the index.html to read PWNED !! via a web shell. I was so damn happy but I quit hacking to focus on other things. Today I feel guilty for not following the path to become a cybersecurity expert. If only did I knew how much money cybersecurity researchers would have been making.

    • @surplus2720
      @surplus2720 Год назад

      Experience whit huge amount of repetition a sprinke of writeDown-em-all and googling skill .....
      p.s. if u start doing 2-3 times the same box u are on the right way
      p.p.s it can be frustrating a lot , specially pen-testing /red-teaming it's one of those things that u love or hate

  • @joelamoako6778
    @joelamoako6778 Год назад +6

    Wow this is insane, i'm a devops engineer and i have learnt a lot from you man, you got a subscriber!

  • @deedikjepijn
    @deedikjepijn Год назад +7

    This is crazy, thanks for the reminder to care about security before its too late

  • @AbDevSec
    @AbDevSec Год назад +7

    I was just about to switch from web developpement to cyber security cause I felt I had learned a lot from web developpement, and I've always loved hacking and backdooring. I found this video and your way of explaining stuff is so good and creative I've learned a lot from one video. guess I'm watching all of them now!

    • @thehackerish
      @thehackerish  Год назад +2

      Enjoy! I am glad you found what you were looking for :)

  • @notsparktion
    @notsparktion Год назад +16

    Wow... This is so cool! I've been thinking about entering the Cyber Security field for a while! As a student, this is really intriging to me! Thank you!

    • @thehackerish
      @thehackerish  Год назад +6

      I decided 10 years ago and I am not disappointed, apart from sitting on desk for hours ;)

    • @gerrardthemeek
      @gerrardthemeek Год назад +3

      @@thehackerish is it too late for someone between ages 23 and 25 to start learning?

    • @thehackerish
      @thehackerish  Год назад +3

      @@gerrardthemeek Absolutely not! You're still young! Go for it if that's something you want to pursue

    • @kehzHD
      @kehzHD Год назад

      @@gerrardthemeekI’m 26 and I started a bachelors of Cyber sec this month

    • @davidddo
      @davidddo Год назад +1

      ​@@thehackerishwhat if im 15

  • @NaughtyKlaus
    @NaughtyKlaus Год назад +6

    I am curious; did you use a website you own, or just a random site you found? I find this video quite interesting, and it's amazing how easy it was for you.

    • @thehackerish
      @thehackerish  Год назад +9

      No it's not random, I never hack something I don't own or have permission to.

  • @neenus
    @neenus Год назад +29

    Watching you go through the process was a rollercoaster I was so into the video when you were able to ssh I shouted YESSSS!!! I love what you do man it's awesome

    • @thehackerish
      @thehackerish  Год назад +8

      Well that's a comment that made my day! Thanks a lot for watching

  • @MrRaja
    @MrRaja Год назад +2

    Finally RUclips is recommending me some quality and useful content

  • @Emmanuel-is7gm
    @Emmanuel-is7gm Год назад +15

    great walkthrough video, very informational.

  • @furti
    @furti Год назад +2

    The One Piece images caught my attention but didn't expect to be this interested in the video! Great one

  • @wave707
    @wave707 Год назад

    This is the first of your videos I have watched and Im definitely hooked! Id love to learn more from ur channel :)

  • @asaad0x
    @asaad0x Год назад

    Very happy that your content got viral andgot number of view,, Keep Going ❤❤

  • @FVT-tn8ji
    @FVT-tn8ji Год назад +1

    This is such an awesome video! I didn't understand everything you did but I still learned a lot, thank you, I would love to see more of this type of videos!!!

    • @thehackerish
      @thehackerish  Год назад +1

      Awesome! Thank you! I will post new ones, but similar videos are ready for you in the same playlist "penetration testing"

  • @Kaughts
    @Kaughts Год назад +17

    Its amazing how good he is at walking through this, I wish to be able to do this someday

    • @Kaughts
      @Kaughts Год назад

      @Sarahmilverton bro what are ya talkin bout

  • @rogo7330
    @rogo7330 Год назад +24

    Instead of rm access.log files I think it's better to copy everything before your activity in another file and then rewrite original with that copy. Or just truncate it to zero if you don't care too much.

    • @lightyagami3492
      @lightyagami3492 Год назад

      That's what I thought to. Just nuking the logs is proof in and of itself of a hack. From my genealogy experience we call it negative evidence.

  • @Log4Jake
    @Log4Jake Год назад +15

    You could also create a .htaccess file that interprets txt as php then you could upload a php shell.

    • @extrempty
      @extrempty Год назад +1

      are you a hacker

    • @LightBlade717
      @LightBlade717 Год назад

      are you learning from port swigger by any chance? if not please advice me im new to this, i started learning and reading like 2 weeks ago

    • @imdanielmartinez
      @imdanielmartinez Год назад

      hey, easy satan.

    • @TheGreenOfficial
      @TheGreenOfficial 2 дня назад

      ya but also directly he can put php rs code insted of :- as content of file and file format as .php insted of txt after finding the exploit...

  • @Gmarkooo
    @Gmarkooo Год назад +5

    This is amazing, made me realize you need to be a debugger first to be a hacker XD

  • @kipchickensout
    @kipchickensout Год назад +3

    the "rpcbind" port could be interesting as well, maybe you can query it for what RPC services are running
    or it's just an obvious thing so that you get stuck on that no idea xD
    very nice video btw, i dont have the time to finish it right now but I will just do it later

  • @StanleySathler
    @StanleySathler Год назад +1

    Great content, dude! Awesome! A few Q's I had while watching, would love to clarify:
    1. Why didn't you need to point nmapq to your root-me URL?
    2. Why doing `cat /etc/passwd` didn't include the whole file, assuming the command does it - did the Web App truncate it?
    3. Why playing with `head -n :line` would be very lame? Any technical reason, or just 'cause it was too difficult to read in general?
    4. What is the `/opt/s` and what it does?

    • @thehackerish
      @thehackerish  Год назад +1

      Wow, I love your questions.
      1. my alias already included the url, with a placeholder for the room number I played in.
      2. the app returns the first line only
      3. With head, I need to use it as many as the lines of the file. Takes time.
      4. /opt/s is the vulnerable executable we're trying to exploit for root access

  • @ToyataSupras
    @ToyataSupras Год назад

    i legit know nothing about this but it is very interesting to watch liked + subbed

  • @deedikjepijn
    @deedikjepijn Год назад +3

    As a person that has his own homelab/server etc this was a crazy horror movie. I should really create more warning (and defense) systems.

  • @tacokoneko
    @tacokoneko Год назад +11

    This Is very awesome but I do think the CTF containing a setuid binary that popens scp is incredibly unrealistically insecure but we can see that it is just placed there to provide an easy privilege escalation after you do the actually realistic part which is the remote code execution exploit

  • @zchantzis
    @zchantzis Год назад

    Amazing!! Congrats man 👏👏

  • @Parrwiz
    @Parrwiz Год назад +2

    Now thats someone I can subscribe to. Even erased the logs: Perfection

  • @codelinx
    @codelinx Год назад +2

    I really like your content and you talking out your ideas and process

  • @williamvickers6473
    @williamvickers6473 Год назад

    Amazing! Very good to see you in action

  • @dertiedemann718
    @dertiedemann718 Год назад +13

    dont forget to clear the authorized_keys file and history file for the root user :3

  • @redlionstudio2750
    @redlionstudio2750 Год назад +1

    wow, that was really interesting, I haven't been that interested in the last 6 months or smth!

  • @byk1lla
    @byk1lla Год назад +3

    Hey man nice content i subscribed!

    • @thehackerish
      @thehackerish  Год назад +1

      Welcome to the family! Lots of similar content already in the pentesting playlist, let me know what you think of them!

  • @tecfan-ix2tj
    @tecfan-ix2tj Год назад

    i love the way you went about this, earned a sub

  • @youssefsabri8051
    @youssefsabri8051 Год назад +2

    Got this vid in my recommendations actual good content thx youtube

  • @euroblueX
    @euroblueX Год назад

    Awesome video!! i was really invested in the story

  • @ilaik
    @ilaik Год назад +2

    Very cool! I want to start learning hacking etc. My qiestion is what did you try to achive by uploading the php file as the picture? What could it have done? Thanks

    • @thehackerish
      @thehackerish  Год назад +1

      If I could upload arbitrary files, like PHP, I could have taken control on the server by running arbitrary commands (Remote Code Execution), Here is a concrete example from on of my previous videos: ruclips.net/video/P44imvLQ6cA/видео.html

    • @ilaik
      @ilaik Год назад

      @@thehackerish thanks! So when you open that file it runs the code and you just made a php file that takes the arg x as a command to run on the server? Also dont most server block access to files via the url?

    • @thehackerish
      @thehackerish  Год назад +2

      That's right, and no they don't block it from url because that's how php app works, unless you use routes, frameworks like laravel use them and so you can't directly access the php files

  • @justarandomcat7
    @justarandomcat7 Год назад +3

    I really enjoy watching your hacking videos , keep up the good work!

  • @mrloyalty4261
    @mrloyalty4261 Год назад

    I'm from portugal, i don't understan a shit, but i stay the all time ahahahha i'm stuck on your videos

  • @Dasher_The_Viral
    @Dasher_The_Viral Год назад +1

    I am right on the border of "I have no idea what he's doing" and "Oh, I kinda understand what they're doing here."
    Me knowing very little about coding makes this very intriguing for me!

    • @lightyagami3492
      @lightyagami3492 Год назад +1

      Same. I noticed at the end that outright deleting log files is not a good idea though. The lack of those files will cause suspicion and cause further investigation.

    • @Dasher_The_Viral
      @Dasher_The_Viral Год назад

      Yeah, it might be better to just replace any of the traces you had left behind with something else that wouldn't look suspicious.@@lightyagami3492

  • @deadspeak5880
    @deadspeak5880 Год назад

    Whoosh!!!! Right over my head

  • @abdessalam8468
    @abdessalam8468 Год назад +2

    We missed you 💗💗💗

  • @troughy3288
    @troughy3288 Год назад +1

    Thank you so much for this video! Learnt a lot.

  • @thymichael
    @thymichael Год назад

    Great vid, earned a new sub! Helped me understand more of what i thought i already knew.

  • @Log4Jake
    @Log4Jake Год назад +1

    You could use a php shell. Or some type of reverse shell.

  • @spyapron
    @spyapron Год назад

    you are awesome and also reveals the realities ..stay tuned

  • @X3ro1-01
    @X3ro1-01 Год назад +3

    duuuuuude i am a full stack dev ( just started ) and i HAVE to learn these things.

    • @thehackerish
      @thehackerish  Год назад +2

      Go for it! I have so many techniques with hands-on examples in this channel, go watch the pentesting playlist

  • @litemint09
    @litemint09 Год назад +2

    awesome stuffs, i learned alot, new subbed🎉

    • @thehackerish
      @thehackerish  Год назад

      Welcome to the club! Many similar videos on the pentesting playlist are available

  • @connorfratantaro7173
    @connorfratantaro7173 Год назад +3

    crazy to see a master at work

  • @arcade7651
    @arcade7651 Год назад

    I liked the video alot. What was the nmapq without the alias?

    • @thehackerish
      @thehackerish  Год назад +1

      Glad you asked. Here it is: nmap --top-ports 200 ctf"$1".root-me.org -Pn -v --open -sV 2>/dev/null. I hacked many challenges on root-me, hence the target hostname

  • @powerball200
    @powerball200 Год назад +1

    do ineed to know web dev, python to do this type of hacking? cuz im learning it

    • @thehackerish
      @thehackerish  Год назад

      Web dev will definitely help you become a great hacker. The first part of hacking is to understand the system, and what better way to understand an app than to code one. Go go go! You got this.
      Python is great to write quick scripts, although you can do it in any high level language really, but it's widely used among security professionals.

  • @yipyiphooray339
    @yipyiphooray339 Год назад +1

    This looks so cool but half the video in and I'm super confused 😂, any resources I can use as a pre requisite before watching ur vids?

    • @thehackerish
      @thehackerish  Год назад +1

      Yeah sure, head over to my playlist about web hacking, it takes your by hand from the start. Also check out Academy.thehackerish.com

    • @yipyiphooray339
      @yipyiphooray339 Год назад

      @@thehackerish thanks!!

  • @Jadkinsa1
    @Jadkinsa1 Год назад

    What's the terminal ur using with term cmd and powershell?

  • @anotherarush
    @anotherarush Год назад +4

    I loved the stuff you did after root. One thing though, to finish up your clean up and stealthy approach, you would want to delete some of your bash history surely?

    • @thehackerish
      @thehackerish  Год назад +3

      yeah, I should have set HISTSIZE and HISTFILESIZE :)

    • @skuge-
      @skuge- Год назад +2

      @@thehackerish What about auth log for ssh connection? Or some "afterscript" which will delete trace of your ssh access after you'll log out?

    • @thehackerish
      @thehackerish  Год назад +3

      @@skuge- You are the man! Good point

  • @spacex6997
    @spacex6997 Год назад +1

    Bro is going to be hired by the FBI

  • @socrayhte
    @socrayhte 5 месяцев назад

    Please what is the code behind the Quickened NMAP alias

  • @bourne_
    @bourne_ Год назад

    3:21 I'd check if & char works since the whole phrase went into URL.
    I'm a newbie tho so idk if it would be even helping in this case, it's just I happen to see the pattern.
    Great channel and even better content!

    • @thehackerish
      @thehackerish  Год назад

      Hmm...interesting, but the & would add a new parameter

  • @RoyalNatangwe
    @RoyalNatangwe Год назад +1

    I’m not sure if you did it already ahead, but at the upload imput since it say you can only upload jpeg and so on..,I suggest changing magic number of a php file I order to trick the site and get a shell

    • @thehackerish
      @thehackerish  Год назад

      Indeed, good point

    • @xt355
      @xt355 Год назад

      are there any client-side filters that can be bypassed?

    • @thehackerish
      @thehackerish  Год назад +1

      @@xt355 Since the server was vulnerable, the impact is much higher than any other potential client-side vuln, but that's also good to test for.

  • @JuanBotes
    @JuanBotes Год назад

    thanks for making the content \o/

  • @TiredjhTwhsj
    @TiredjhTwhsj Год назад

    I have a question, or you a self taught or you have a degree in cybersecurity.

    • @thehackerish
      @thehackerish  Год назад

      Degree in software engineering, self taught cybersecurity

  • @raven-vr5yz
    @raven-vr5yz Год назад +2

    extremely underrated, such a goat

  • @Tchatarero36
    @Tchatarero36 Год назад

    Great Content ; how to exploit 0days and CVEs to get bug bountys Boss .

    • @thehackerish
      @thehackerish  Год назад

      Well, invest time and effort to learn how the system works, to the point of finding a way to abuse something. In short, be a hacker, an ethical hacker of course.

    • @Tchatarero36
      @Tchatarero36 Год назад

      @@thehackerish Thanks Man

  • @ShallowClone
    @ShallowClone Год назад

    Awesome video! Doesn't make me sweat as a web dev at all 🤣

    • @thehackerish
      @thehackerish  Год назад

      If you own a web app you want me to test, you know where to find me 😉

  • @DailyBoosted
    @DailyBoosted Год назад +1

    lol nice video, forgot to change env var PATH back :)

  • @UmUs
    @UmUs Год назад

    I have no idea how any of this works, it's like magic to me, amazing

  • @amin9018
    @amin9018 Год назад

    watched the video and I am confused haha, where can I learn such concepts?

    • @thehackerish
      @thehackerish  Год назад +1

      This channel has many similar videos to learn from. But you can start with the owasp top 10 in the web hacking playlist

    • @amin9018
      @amin9018 Год назад

      @@thehackerish alright thank you!

  • @pavevbogovev4045
    @pavevbogovev4045 Год назад +1

    “Only for educational purposes, yeah yeah” 😂

  • @NickelCityPixels
    @NickelCityPixels 7 месяцев назад

    Isn't that too much work to get default credentials? I must be missing smthg.

  • @I_Unintentionally_Morph
    @I_Unintentionally_Morph Год назад

    i am here to start a career on information security and learn more. i have subbed , where do i start boss.

    • @thehackerish
      @thehackerish  Год назад +1

      Welcome aboard! Start with the web hacking and penetration testing playlists. Good luck!

    • @I_Unintentionally_Morph
      @I_Unintentionally_Morph Год назад

      @@thehackerish thank you .

  • @gabrielkenz
    @gabrielkenz Год назад

    I wonder if its possible to hack into a server that has a firewall well implemented with ip rules and such

    • @thehackerish
      @thehackerish  Год назад +1

      I'd say yes, since you at least need to open the port for the web application. It will be harder, but not impossible. But you can make the hacker's life harder with a WAF as a secondary security measure, and implement detections to spot suspicious activity early. And of course, the most important thing: develop secure code and have a proper SDLC lifecycle that takes security into consideration

  • @taiquangong9912
    @taiquangong9912 Год назад

    What are you using for hacking?

  • @piti6343
    @piti6343 4 месяца назад

    as I'm a noob in this world, I understand that you somehow you used the vulnerability of the druple version to send a txt file that you used to read the server,but it seems so confusing the fact you see the vulnerability of each element of a page, I like it but I don't think I will be able to this even in 10 years from now on

  • @AdrianGoG
    @AdrianGoG Год назад

    What is the name of the tool "request-response terminal"?

    • @thehackerish
      @thehackerish  Год назад +1

      Burpsuite, there is also zap proxy. They are web proxies to play with the http requests

  • @Veraxity
    @Veraxity Год назад +4

    good job articulating your thoughts into words. enjoyed the video ( ͡° ͜ʖ ͡°)

  • @accountdeleted5861
    @accountdeleted5861 Год назад

    Do you use AI for hacking and if so how do you use it?

    • @thehackerish
      @thehackerish  Год назад +1

      Yes, I occasionally use chatgpt to assist me in some tedious tasks. Otherwise nothing else

    • @acc55547
      @acc55547 Год назад

      thats crazy, how do you even use it?? is it for like brainstorming@@thehackerish

    • @thehackerish
      @thehackerish  Год назад

      I write like I am chatting with someone, like please take this csv and extract only the ABC column. These kind of things

  • @JuVallejo1
    @JuVallejo1 Год назад

    Really nice content ! Really interesting !

  • @en_ry
    @en_ry Год назад

    how would i deface a website that has no login and only has one type of redirect link and its just a default page with text

    • @thehackerish
      @thehackerish  Год назад

      With a reduced attack surface, you can't do much really. I'd look at other assets owned by the customer I'm hacking

    • @en_ry
      @en_ry Год назад

      @@thehackerish but someone else has defaced it and im trying to help them figure out how

    • @thehackerish
      @thehackerish  Год назад

      @@en_ry I see, well you need access to logs, and support from the hosting provider if it's shared. It's possible that the website got defaced because of another hacked website on the same hosting server.

    • @en_ry
      @en_ry Год назад

      @@thehackerish so i would have to get into a port still no? also the only thing they have linked is another website

  • @Loop234
    @Loop234 Год назад

    it looks so complicated, but i'm guessing with a ton of experience you can do this casually. Might seem stupid, but what language is this?

    • @thehackerish
      @thehackerish  Год назад +1

      The app is developed in a PHP framework, and the OS commands are just bash

  • @joshuapacheco2898
    @joshuapacheco2898 Год назад

    New sub 😊

  • @zonellobster2509
    @zonellobster2509 Год назад

    At 7:47 what tool did you open?

    • @thehackerish
      @thehackerish  Год назад +2

      BurpSuite, a web proxy. Have a look at this video to see how cool it is ruclips.net/video/p-aCU_C1jKk/видео.html

  • @kushjain6756
    @kushjain6756 Год назад

    create one for wordpress websites

    • @thehackerish
      @thehackerish  Год назад

      Here is a video for a Wordpress example: ruclips.net/video/bxUJuYMSqLs/видео.html

  • @TheChemicalWorkshop
    @TheChemicalWorkshop Год назад

    good job

  • @prathvirajb1052
    @prathvirajb1052 Год назад +1

    Now make a video on how to avoid this exploit🔥

    • @AngryWoodenFork
      @AngryWoodenFork Год назад

      An update is a great start but honestly I wouldn't use Drupal or wordpress to host anything.

    • @bariscodefx
      @bariscodefx Год назад +6

      This video shows you to must use latest versions of softwares :)

    • @thehackerish
      @thehackerish  Год назад +1

      @@bariscodefx Indeed!

  • @Ididor
    @Ididor Год назад

    Couldn't you write a php file that triggers a reverse shell and then just send a request to it in the browser?

    • @thehackerish
      @thehackerish  Год назад +1

      I believe I tried but I don't recall why it didn't work.

  • @DDBAA24
    @DDBAA24 Год назад

    6:30 this is what 'shellcheck' is for, in case you don't understand at your level yet. Its very specific and it will tell you in a clear concise way whats wrong and not to run it.

  • @dHeIoxy
    @dHeIoxy Год назад

    I don't think I understand any of this but it just looks cool 😆

  • @RobinD-e2m
    @RobinD-e2m Год назад

    What to do if i forgot burp suite browser intercept password

  • @AlexP-r2q
    @AlexP-r2q Год назад

    i love the "oooooo"

  • @equivalent0
    @equivalent0 Год назад

    Dont idea what is this. Im not familiar with coding but this is fun

  • @shko0o0
    @shko0o0 Год назад

    Great video! Next time maybe even altering the History of Linux machine would be perfect 😁

  • @anuzravat
    @anuzravat Год назад +1

    looks crazy after weed, it almost like u hacked it like in movies

    • @thehackerish
      @thehackerish  Год назад +1

      Careful with that sh**

    • @anuzravat
      @anuzravat Год назад

      @@thehackerish bro u actually hacked it wtf 🤣

  • @mosesnandi
    @mosesnandi Год назад

    Wow! Impressive. Still so much work though

  • @demolazer
    @demolazer Год назад

    Jesus, that was way too easy. Scary to think how many servers are running old versions of software with exploits like this.

  • @mrfingersss
    @mrfingersss Год назад

    "and it says here only for educational purposes...yeah yeah"

    • @thehackerish
      @thehackerish  Год назад

      Seriously though, never hack something you don't have permission for.

  • @EquaTechnologies
    @EquaTechnologies Год назад

    they hacked it longer than a wii
    respect to them

  • @mdimransarkar1103
    @mdimransarkar1103 Год назад

    Thank God I learned Linux.

  • @rhettpete
    @rhettpete Год назад

    Wow. Wish I had seen you earlier

  • @poneyninja6692
    @poneyninja6692 Год назад

    How did you get the kali linux cmd on windows 11?

    • @thehackerish
      @thehackerish  Год назад +1

      It's not kali, it's Ubuntu running using WSL

  • @ZephyrysBaum
    @ZephyrysBaum Год назад

    subbed