- 791
- 120 680
Junhua Wong
United States
เข้าร่วมเมื่อ 9 ส.ค. 2013
Welcome to my channel! Dive into the world of cybersecurity and ethical hacking with in-depth tutorials, real-world pentesting techniques, and expert insights. Whether you're a beginner or an experienced professional, this channel is your gateway to mastering the art of securing systems and uncovering vulnerabilities. Subscribe now and join our community of cybersecurity enthusiasts!
Cyber Security | Python | Vulnhub | Walkthrough | Pwn The Tron | Python | CSRF
Pentesting Lab Exercises Series - Vulnhub
Virtual Machine Name: Pwn The Tron: 1
Link: www.vulnhub.com/entry/pwn-the-tron-1,721/
My Twitter:@ junhua_cyber
Tips:
CHECK🧡USERNAME💛WITH💚THE💙FOLLOWING💜LINK
instantusername.com
RETRIEVE🧡HISTORY💛SNAPSHOT💚WITH💙WAYBACK💜MACHINE
web.archive.org/
CSRF❤️ATTACK🧡TO💛ABUSE💚TRANSFER💙FUNCTION
USE❤️PYTHON❤️TO❤️CRACK❤️MD5
CAPITAL❤️LIST
github.com/GFDRR/admin-boundaries/issues/1
Virtual Machine Name: Pwn The Tron: 1
Link: www.vulnhub.com/entry/pwn-the-tron-1,721/
My Twitter:@ junhua_cyber
Tips:
CHECK🧡USERNAME💛WITH💚THE💙FOLLOWING💜LINK
instantusername.com
RETRIEVE🧡HISTORY💛SNAPSHOT💚WITH💙WAYBACK💜MACHINE
web.archive.org/
CSRF❤️ATTACK🧡TO💛ABUSE💚TRANSFER💙FUNCTION
USE❤️PYTHON❤️TO❤️CRACK❤️MD5
CAPITAL❤️LIST
github.com/GFDRR/admin-boundaries/issues/1
มุมมอง: 47
วีดีโอ
Cyber Security | Python | Vulnhub | Walkthrough | De-ICE: S2.100 | Python
มุมมอง 524 ชั่วโมงที่ผ่านมา
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: De-ICE: S2.100 Link: www.vulnhub.com/entry/de-ice-s2100,13/ My Twitter:@ junhua_cyber USE💛PYTHON💛A💛LOT💛IN💛THE💛VIDEO ~ Use REQUESTS Module To Retrieve Web Pages ~ Use RE Module To Match Pattern To Extract Specific Information TEST❤️YOUR❤️PATTERN❤️ON❤️THE❤️FOLLOWING❤️WEBSITE pythex.org/ SSH💛COMPATIBILITY💛ISSUES💛To💛BE💛SOLVED💛WITH💛THE💛...
Cyber Security | Python | Vulnhub | Walkthrough | De-ICE: S1.110 | Python
มุมมอง 1147 ชั่วโมงที่ผ่านมา
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: De-ICE: S1.110 Link: www.vulnhub.com/entry/de-ice-s1110,9/ My Twitter:@ junhua_cyber USE💛PYTHON💛A💛LOT💛IN💛THE💛VIDEO ~ Use OS.WALK To Retrieve All Files Under Particular Directory ~ Use Subprocess Module To Execute John The Ripper SOLVE❤️PROBLEMS🧡💛OF💚SSH💙COMPATIBILITY askubuntu.com/questions/836048/ssh-returns-no-matching-host-key-ty...
Cyber Security | Python | Vulnhub | Walkthrough | De-ICE: S1.100 | Python
มุมมอง 1489 ชั่วโมงที่ผ่านมา
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: De-ICE: S1.100 Link: www.vulnhub.com/entry/de-ice-s1100,8/ My Twitter:@ junhua_cyber Tips: USE💛PYTHON💛A💛LOT💛IN💛THE💛VIDEO ~ Extract Username from Web Page With Python ~ Process Dictionary With Python ~ Crack SSH With Python and 3rd Party Module Paramiko ~ Use Module - ThreadingExectuor to Speed Cracking TEST❤️PYTHON🧡REGULAR💛EXPRESSI...
Pentesting General | How To Install Guest OS from ISO Image in VMWARE
มุมมอง 5714 ชั่วโมงที่ผ่านมา
To install the OS from an ISO image in a virtual machine.
Cyber Security | Python | Vulnhub | Walkthrough | 21LTR Scene | Automate Port Scan With Python
มุมมอง 5614 ชั่วโมงที่ผ่านมา
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: 21LTR: Scene 1 Link: www.vulnhub.com/entry/21ltr-scene-1,3/ My Twitter:@ junhua_cyber Tips:(Very good machine to practice Python) H𝐨w T𝐨 𝐔s𝐞 𝐏y𝐭h𝐨n T𝐨 𝐀u𝐭o𝐦a𝐭e P𝐫o𝐜e𝐬s O𝐟 𝐏o𝐫t S𝐜a𝐧n𝐢n𝐠 Continuously Python Is So Fantastic !!!!!! - Object Oriented Programming - Threading Module To Speed Up Full Range Ports Scanning Subscribe to my ch...
Pentesting General | Virtualization | How To Configure Network With VirtualBox
มุมมอง 6716 ชั่วโมงที่ผ่านมา
ℍ𝕆𝕎👏 𝕋𝕆👏 CONFIG👏 VIRTUALBOX Learn the essential steps to configure network with VirtualBox Virtualbox Networks Explanation: forums.virtualbox.org/viewtopic.php?t=96608 Don’t forget to like, comment, and subscribe for more in-depth cybersecurity tutorials!
Cyber Security | Pentesting | Vulnhub | Walkthrough | Jangow | AntSword
มุมมอง 94วันที่ผ่านมา
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: Jangow: 1.0.1 Link: www.vulnhub.com/entry/jangow-101,754/ My Twitter:@ junhua_cyber Tips: ̷H̷̷O̷̷W̷ ̷T̷̷O̷ ̷U̷̷S̷̷E̷ ̷A̷̷N̷̷T̷̷S̷̷W̷̷O̷̷R̷̷D̷ ̷T̷̷O̷ ̷M̷̷A̷̷N̷̷A̷̷G̷̷E̷ ̷W̷̷E̷̷B̷ ̷S̷̷H̷̷E̷̷L̷̷L̷̷S̷ - Download AntSword github.com/AntSwordProject/AntSword-Loader - Upload Web Shell - Manage Web Shell Subscribe to my channel for more cy...
Cyber Security | Pentesting | Vulnhub | Walkthrough | Rattus Loophole | Beginner
มุมมอง 96วันที่ผ่านมา
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: Rattus: Loophole Link: www.vulnhub.com/entry/rattus-loophole,27/ My Twitter:@ junhua_cyber
Pentesting General | How to Exploit Wordpress | Very Comprehensive
มุมมอง 11114 วันที่ผ่านมา
ℍ𝕆𝕎👏 𝕋𝕆👏 𝔼𝕏ℙ𝕃𝕆𝕀𝕋👏 𝕎𝕆ℝ𝔻ℙℝ𝔼𝕊𝕊 Learn the essential steps to exploit WordPress 𝗘𝗡𝗨𝗠𝗘𝗥𝗔𝗧𝗘 𝗪𝗢𝗥 𝗣𝗥𝗘𝗦𝗦 - Enumerate Username - Enumerate Plugins - Crack Passwords 𝗨𝗣𝗟𝗢𝗔 𝗪𝗘𝗕 𝗦𝗛𝗘𝗟𝗟 - Replace Code of 404.php Template with PHP Reverse Shell - Compress PHP Reverse Shell File and Install Plugin - Install Plugin Directly - MetaSploit Framework (WP_Aadmin Module) Don’t forget to like, comment, and subscribe...
Cyber Security | Pentesting | Vulnhub | Walkthrough | Funbox: Scriptkiddie | Beginner
มุมมอง 8914 วันที่ผ่านมา
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: Funbox: Scriptkiddie Link: www.vulnhub.com/entry/funbox-scriptkiddie,725/ My Twitter:@ junhua_cyber Tips: 𝓤𝓢𝓔 𝓜𝓔𝓣𝓐𝓢𝓟𝓛𝓞𝓘𝓣 𝓣𝓞 𝓔𝓧𝓟𝓛𝓞𝓘𝓣 𝓜𝓐𝓒𝓗𝓘𝓝𝓔 I demonstrate how to easily penetrate the target machine using Metasploit. This simple and straightforward challenge is perfect for beginners looking to get hands-on experience with one of the ...
Cyber Security | Pentesting | Vulnhub | Walkthrough | Doubletrouble | Beginner
มุมมอง 7514 วันที่ผ่านมา
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: doubletrouble: 1 Link: www.vulnhub.com/entry/doubletrouble-1,743/ My Twitter:@ junhua_cyber Tips: In this beginner-friendly Capture the Flag (CTF) walkthrough, I demonstrate how following a structured methodology can simplify the process and lead to success. Perfect for those new to ethical hacking, this video provides a clear, ste...
Cyber Security | Pentesting | Vulnhub | Walkthrough | Billy Madison | Port Knocking | TCPFlow
มุมมอง 8114 วันที่ผ่านมา
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: Billy Madison: 1.1 Link: www.vulnhub.com/entry/billy-madison-11,161/ My Twitter:@ junhua_cyber Tips: In this Capture the Flag (CTF) walkthrough, I explore unique approaches to solving challenges, including: 1. Using tcpflow instead of Wireshark for packet analysis-proving to be more efficient in this scenario. 2. Additionally, I de...
Pentesting General | How To Enable File Transfer between Virtual Machine and Host | VirtualBox
มุมมอง 2814 วันที่ผ่านมา
In this tutorial, I demonstrate how to enable seamless file transfer between a virtual machine and the host system using VirtualBox. Watch as I walk you through the step-by-step process to configure shared folders, making it easy to share files and enhance your workflow. Perfect for beginners and those looking to optimize their virtual environment setup. Don’t forget to like, comment, and subsc...
Cyber Security | Pentesting | Vulnhub | Walkthrough | SpyderSec: Challenge | Truecrypt
มุมมอง 8114 วันที่ผ่านมา
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: SpyderSec: Challenge Link: www.vulnhub.com/entry/spydersec-challenge,128/ My Twitter:@ junhua_cyber Tips: In this Capture the Flag (CTF) walkthrough, we tackle a unique challenge involving the extraction of a hidden TrueCrypt volume embedded within a movie file. Watch as I demonstrate the step-by-step process to uncover and decrypt...
Cyber Security | Pentesting | Vulnhub | Walkthrough | Lord Of The Root | SQL Injection
มุมมอง 13614 วันที่ผ่านมา
Cyber Security | Pentesting | Vulnhub | Walkthrough | Lord Of The Root | SQL Injection
Cyber Security | Pentesting | Vulnhub | Walkthrough | 6Days Lab | Manual Exploit SQL Injection
มุมมอง 8021 วันที่ผ่านมา
Cyber Security | Pentesting | Vulnhub | Walkthrough | 6Days Lab | Manual Exploit SQL Injection
Cyber Security | Pentesting | Vulnhub | Walkthrough | Gibson | Exploit imagemagick
มุมมอง 17621 วันที่ผ่านมา
Cyber Security | Pentesting | Vulnhub | Walkthrough | Gibson | Exploit imagemagick
Cyber Security | Pentesting | Vulnhub | Walkthrough | SecTalks BNE0x00 Minotaur | WordPress
มุมมอง 8921 วันที่ผ่านมา
Cyber Security | Pentesting | Vulnhub | Walkthrough | SecTalks BNE0x00 Minotaur | WordPress
Cyber Security | Pentesting | Vulnhub | Walkthrough | SecTalks BNE0x02 Fuku | Python | Joomla
มุมมอง 11321 วันที่ผ่านมา
Cyber Security | Pentesting | Vulnhub | Walkthrough | SecTalks BNE0x02 Fuku | Python | Joomla
Cyber Security | Pentesting | Vulnhub | Walkthrough | SecTalks BNE0x03 Simple | Remote File Upload
มุมมอง 12028 วันที่ผ่านมา
Cyber Security | Pentesting | Vulnhub | Walkthrough | SecTalks BNE0x03 Simple | Remote File Upload
Cyber Security | Pentesting | Vulnhub | Walkthrough | Mr Robot | WordPress Cracking | Python
มุมมอง 12828 วันที่ผ่านมา
Cyber Security | Pentesting | Vulnhub | Walkthrough | Mr Robot | WordPress Cracking | Python
Pentesting General | Crunch Tutorial | Wordlist Generator
มุมมอง 6928 วันที่ผ่านมา
Pentesting General | Crunch Tutorial | Wordlist Generator
Cyber Security | Pentesting | Vulnhub | Walkthrough | Tommy Boy 1 | BurpSuite | Crunch | Wordpress
มุมมอง 10528 วันที่ผ่านมา
Cyber Security | Pentesting | Vulnhub | Walkthrough | Tommy Boy 1 | BurpSuite | Crunch | Wordpress
Cyber Security | Pentesting | Vulnhub | Walkthrough | DC416 | Fortress | Bypass Filter | Crunch
มุมมอง 116หลายเดือนก่อน
Cyber Security | Pentesting | Vulnhub | Walkthrough | DC416 | Fortress | Bypass Filter | Crunch
Cyber Security | Pentesting | Vulnhub | Walkthrough | HackDay Albania | Bypass Login with Python
มุมมอง 86หลายเดือนก่อน
Cyber Security | Pentesting | Vulnhub | Walkthrough | HackDay Albania | Bypass Login with Python
Cyber Security | Pentesting | Vulnhub | Walkthrough | SkyDog 1 | Python | Pspy
มุมมอง 76หลายเดือนก่อน
Cyber Security | Pentesting | Vulnhub | Walkthrough | SkyDog 1 | Python | Pspy
Cyber Security | Pentesting | Vulnhub | Walkthrough | SkyDog 2016 | Hydra | Volatility
มุมมอง 75หลายเดือนก่อน
Cyber Security | Pentesting | Vulnhub | Walkthrough | SkyDog 2016 | Hydra | Volatility
Pentesting General | Virtual Machine IP Address Failure | Vmware | VirtualBox
มุมมอง 67หลายเดือนก่อน
Pentesting General | Virtual Machine IP Address Failure | Vmware | VirtualBox
Cyber Security | Pentesting | Vulnhub | Walkthrough | Proteus | Bypass File Upload | Command Inject
มุมมอง 99หลายเดือนก่อน
Cyber Security | Pentesting | Vulnhub | Walkthrough | Proteus | Bypass File Upload | Command Inject
I hacked my router and I get total control of my router now.😁😁😁 However, I have not hacked the box yet.
You are great.
@@junhuawong1419 Thx
Love it
Thank you.
Thank you very much 🎉🎉
Always welcome
I am here.😁😁😁
Thanks
This is extremely helpful these walk throughs. Especially your explanations. I wish to one day be as proficient as you.
You will. We keep going together along the journey of cybersecurity.
I am here.
Thanks.
very good!
Glad you think so!
Thanks for using python
Python is so great language.
Thanks for demonstrating more python examples
You are welcome!
I am here.😁😁😁
Thanks
I am here.😁😁😁
Thanks
there is a machine called double one, this was made for you.
Thanks. Could you share its link.
happy new year sir
Happy new year
straight to the point , thank you
Thanks a lot.
Thank you for your video.
Thanks for watching!
hello sir can you please do the pentest of this machine its bean 10 days i tried but it didt work please help : digitalworld.local: electrical
Hey , im trying to pentest the digitalworld.local:electrical machine and im finding some difficulties,
Let’s go. Hope this year brings us lots of contents and master hacking. Could we also try some windows hacking please and diffident vulnerabilities: SQL, CI, XSS, CSRF etc please
Yes, I will.
I am here. I do not want to use VMWARE.😁😁😁
Vmware workstaton is now also free, haha
Please please continue to do walk through like this. It helps me understand the process or methodology on penetration testing. Thank you!
Yes, I will.
I am here.😁😁😁
Thanks
When I read news, I find other people are celebrating New Year. We are celebrating New Year too, right? Shifu, we just celebrate New Year by coding and hacking...🤣🤣🤣
HAHA, you are right. The best wishes for you.
the problem was that after turnning on the second adapter, I had two adapters but only 1 connection-wlanconnection1, so I had to create another connection Ethernet to be connected by the second adapter. In theory just like this, and I do not know why I cannot reply to you, maybe google delete it.
You may enable the adapter in the system sometimes.
At last, I choose Advanced Network Configuration, because I do not need to edit the config file.😁😁😁
Great 👍
I have 2 ways to solve this problem, one is editing the config file another is Advanced Network Configuration.😁😁😁
Great 👍
Yeah, you are right, I successfully turn on both interfaces.😆😆😆(You said I can solve this problem. I saw what you said.)
Thanks .
I tried to activate both networks, but both of them under the wired connection 1, so I only could activate one of them.🤣🤣🤣
I don't think one adapter can be configured to use two types of connection at the same time.
But in this way I have to switch the networks between NAT and host only adapter, how can I activate both networks?
Maybe I understand wrongly . You can have two network adapters, each of them can be configured to any connection type. It is that you mean?
@@junhuawong1419 No. I mean I have eth0 and eth1 adapters, after turn on the second adapter but I only have one connection- the wlanconnection1, so I have to switch, which means I only can use one adapter to connect to wlanconnection1, but at last I created a new Ethernet and use eth0(adapter) to connect to Ethernet, then problem was solved.😁😁😁In theory just like that.
Happy New Year, Shifu.😁😁😁
Happy new year, dear bro.
was just do it sudo ip netns add foo sudo ip netns exec foo /bin/sh
thanks you helped me a lot with this machine my Tunnle Pivont dosnt workd by mknod backpipe. thx mate.
Great
My pleasue
my while true; do ./47172.sh ;done keeps looping :(
YES DID 20 MORE LOOPS AND IT GOT THROUGH THANK U MAN
I am here.😁😁😁
haha ,thanks
Really good work!
Glad you enjoyed it!
Could you please help to connect my kali to vulnhub machines via NAt network please?. Still not working with me
Bro, your problem is easy, if your virtual box does not have bugs. Cllick tools, and find NAT networks, and click create.
If your virtual box had bugs, that problem would be a complicated one.🤣🤣🤣
Could you checkout the latest video on this? To see whether anything is wrong. I think you can configure your Kali to have two network adapters. One of them can be configured as NAT, which can allow you to update software, another can be configured as host-only. Kali Linux can use this host-only network adapter to communicate with your vulnhub machines. Your vulnhub machine can be configured as host-only.
@junhuawong1419 • 0 seconds ago Could you checkout the latest video on this? To see whether anything is wrong. I think you can configure your Kali to have two network adapters. One of them can be configured as NAT, which can allow you to update software, another can be configured as host-only. Kali Linux can use this host-only network adapter to communicate with your vulnhub machines. Your vulnhub machine can be configured as host-only.
Maybe.
Great one as always!
Thank you! Cheers!
I mean for example, normally you can log in by using ssh and passwd, but if the software has some mysterious bugs...you know you need to find out why you cannot log in, in this case, if you do not have more walk throughs to reference some problem is caused by the bugs, you will waste a lot of time to deal with this.
you are right.
Only if you do practice you will know how import to have a walkthrough because sometimes the software has bugs causing mysterious phenomena 🤣🤣🤣if you do not have a walkthrough or more walkthroughs, you will never know what happens.🤣🤣🤣
Yeah.
Thx, Shifu
Thank you.
Shifu, you are the best, I learn from you. Thx.💗💗💗
Wow, thank you
123
Thanks
I attack my device because I don't have the **** privileges on this device.
I am attacking one of my devices and the virtual machine simultaneously...
Wow.
@@junhuawong1419 I attack my device because I don't have the root privileges on this device.🤣🤣🤣
@@junhuawong1419 I at*** my device because I don't have the root privileges on this device.
41:55
Thanks, any other message?
Good video but you are using WordPress 2016 version. Its outdated. For your next videos, try WordPress 6.7 version
Your channel has great quality contents but still it is not delivering its right audiences due to SEO problems. You should focus on your SEO so that You can get a big fanbase.Due to SEO problems your videos don't get views and videos don't reach people. Your videos are truly amazing and inspiring! If you want, I can show you these problems and discuss how to solve them.
Thanks a lot, dear friend, could you share your suggestions. My email: junhua.wong.2013@gmail.com. Thanks again.
Thanks, I watch one of your vids a day :)
Glad you enjoy them!
let's keep out activity, right? Even Christmas or holidays...🤣🤣🤣💗💗💗
Always!
I am here. 😁😁😁💗💗💗Welcome back from Christmas...🤣🤣🤣
Welcome back!
I am not able to get into the meterpreter when doing the reverse tcp handler.. it is stuck showing - started reverse tcp handler on host:port.. any way to fix this
I think you've already transferred meterpreter payload to the target, right? Make it executable and run it. There should be not error on the target? Sometimes you need to change port number for the tcp handler, such as 80,443, in case firewall would block some connections.
"incorrect" is magic word
haha