I had read your book about Privilege Escalation Techniques... And man that is really awesome... It is one of my favorite hacking books... Keep going I mean write more books I know it takes a long time to write a book but that book is really really fantastic...
I had read your book about Privilege Escalation Techniques... And man that is really awesome... It is one of my favorite hacking books... Keep going I mean write more books I know it takes a long time to write a book but that book is really really fantastic...
Thank you for the feedback, i am gad that you have found value in the book.
Can l have the name of the book please?
@@nathannyabvure8227 Name of the book is "Privilege Escalation Techniques"
thank you so much @@viruldojitha9341 . Privilege escalation is really a point weakness for me.
I have been watching you for a while and you make it all so clear and understandable for begginers like me! keep it up you are amazing
To detect I use lsof -p and recursively check the jars reported for log4j classes.
Great content. This is one of those vulns that is kinda fun to watch (as a threat responder) what slips past the IPS as the days go on.
You're really giving proper knowledge about everything with full detail. Thank U.
Lots of Love to you from India. ❤🇮🇳
You have no idea how grateful I am for tNice tutorials series
I can't believe I am getting this information... FOR FREE!
ooh finally, thanks man.. also pls could you do a lil video on buffer overflow or any u could recommend
hi there i followed everything but my netcat has issues whereby it doesnt listen even though it says it is "listening". pls help
It got behind my Untangle home firewall....ate it for lunch. Yea this one is insane. Will probably install pfsense for a while
I have exploit no rate limit, but now its been duplicate, what else i can do based on no rate limit. Further what can i exploit?
How you record screen and your cam in Linux?
Thank you for such a great and to the point explanation!!!
had to watch this for a class but... why does the intro music go so hard?
please make a video about JNDI what is JNDI and how it works
ooooooooooooohhhhhhhhhhh very informative awswome sir awsome
Great tutorial, thanks.
This was so good. Thank you!
Keep up the good work man 💯
Very good video, thank you very much 👍
Sir I've one doubt why log4 used in apche server for keep track logging
There's lot is language for using keep track logging
Nice tutorial
What about showing how NSO 0 day iMessage exploit worked
Damn you
Sir please , I want to know how to get the files build-debug , from the Quasar program , thanks for your videos ❤️
sir please explian RCE whatsapp by GIF
As usual 🪓
Bro...