Chain 2 Bugs, Get Code Execution!

Поделиться
HTML-код
  • Опубликовано: 6 июн 2023
  • #pentesting #ctf #hacking #sqlinjection
    Hey what’s up? In this video series, I will demonstrate penetration testing on a vulnerable CTF challenge named Bulldog. In this episode, I will chain two vulnerabilities to get a remote code execution on the server.
    🚀 🔥 Become a pentester
    academy.thehackerish.com/p/fr...
    📙 Learn the technical skills:
    thehackerish.com/best-hacking...
    📙 Become a successful bug bounty hunter: thehackerish.com/a-bug-bounty...
    🆓 Download your FREE Web hacking LAB and starting hacking NOW: thehackerish.com/owasp-top-10...
    🌐 Read more on the blog: thehackerish.com
    🇩 Discord: / discord
    💪🏻 Support this work: thehackerish.com/how-to-support
    - Facebook Page: / thehackerish
    - Follow us on Twitter: / thehackerish
    - Listen on Anchor: anchor.fm/thehackerish
    - Listen on Spotify: open.spotify.com/show/4Ht8jEb...
    - Listen on Google Podcasts: podcasts.google.com/?feed=aHR...

Комментарии • 12

  • @conradrobinson7941
    @conradrobinson7941 11 месяцев назад

    Great videos. I've just come across you but this is fantastic

    • @thehackerish
      @thehackerish  11 месяцев назад +1

      Glad you enjoy it! Welcome aboard

  • @relaxingvideoschannel5710
    @relaxingvideoschannel5710 Год назад

    The best

  • @mrrahim3252
    @mrrahim3252 Год назад

    Hey can you please make a detailed video on WAF Bypass. We know same methodology is applied on live targets/bug bounty programs. But they use waf and we don't have enough experience in dealing with waf to exploit successfully

  • @relaxingvideoschannel5710
    @relaxingvideoschannel5710 Год назад

    Hey why don’t you make a discord server for your channel, it will be great i think

    • @thehackerish
      @thehackerish  Год назад +1

      The link is in the description box below the video ;)

  • @firos5381
    @firos5381 Год назад

    wont code get blocked by av pr any firewalls

    • @thehackerish
      @thehackerish  Год назад

      Depends on which OS and AV you are using. If it's flagged by AV, then you'd have to bypass it. But it wasn't the case here.

    • @firos5381
      @firos5381 Год назад

      @@thehackerish ya cool would u ever show vedios on av bypassing techniques ?

    • @thehackerish
      @thehackerish  Год назад

      @@firos5381 do you mean WAF or AV, like getting a reverse shell in Windows with AV on it?

    • @firos5381
      @firos5381 Год назад

      @@thehackerish ya it could be defender as well like to gain an initial access u would have to get past any basic defence na i meant that