Junhua Wong
Junhua Wong
  • 761
  • 110 283
Cyber Security | Pentesting | Vulnhub | Walkthrough | BlackMarket | SQLI | Decryption
Pentesting Lab Exercises Series - Vulnhub
Virtual Machine Name: BlackMarket: 1
Link: www.vulnhub.com/entry/blackmarket-1,223/
My Twitter:@ junhua_cyber
Tips:
1. Another MD5 decryption:
www.md5online.org/md5-decrypt.html
2. Convert hex to string
www.rapidtables.com/convert/number/hex-to-ascii.html
3. Vigenere decrypt:
www.quipqiup.com/#google_vignette
มุมมอง: 71

วีดีโอ

Cyber Security | Pentesting | Vulnhub | Walkthrough | Gemini Inc 2 | Python | Command Execution
มุมมอง 3344 ชั่วโมงที่ผ่านมา
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: Gemini Inc: 2 Link: www.vulnhub.com/entry/gemini-inc-2,234/ My Twitter:@ junhua_cyber Tips: 1. Uses Python to crack activation code rather than Burp-suite or others. Cookies should be considered. 2. Has to escape blacklist of command execution. 3. Python regular expression editor: pythex.org/ 4. Redis penetration: book.hacktricks.x...
Cyber Security | Pentesting | Vulnhub | Walkthrough | Android 4 | Phonesploit | Metasploit | Adb
มุมมอง 727 ชั่วโมงที่ผ่านมา
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: Android4: 1 Link: www.vulnhub.com/entry/android4-1,233/ My Twitter:@ junhua_cyber Tips: 1. 3 ways are used in this video to penetrate into Android mobile phone.
Cyber Security | Pentesting | Vulnhub | Walkthrough | Trollcave | Python | Port Forwarding
มุมมอง 589 ชั่วโมงที่ผ่านมา
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: Trollcave: 1.2 Link: www.vulnhub.com/entry/trollcave-12,230/ My Twitter:@ junhua_cyber Tips: 1. I use a lot the following website to edit regular expression: pythex.org/
Cyber Security | Pentesting | Vulnhub | Walkthrough | Jarbas | Jenkins RCE | Escalate Priv By Cron
มุมมอง 8116 ชั่วโมงที่ผ่านมา
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: Jarbas: 1 Link: www.vulnhub.com/entry/jarbas-1,232/ My Twitter:@ junhua_cyber Tips: 1. Exploit Jenkins blog.pentesteracademy.com/abusing-jenkins-groovy-script-console-to-get-shell-98b951fa64a6 2. Groovy script for reverse shell (Didn't work for me) gist.github.com/rootsecdev/273f22a747753e2b17a2fd19c248c4b7
Cyber Security | Pentesting | Vulnhub | Walkthrough | WinterMute | Neuromancer | Pivot Metasploit
มุมมอง 4319 ชั่วโมงที่ผ่านมา
Tips: 1. The entire video for the machine as follows: th-cam.com/video/c4R6xMKLsyo/w-d-xo.htmlsi=le_ZAh2Zwgn5dgV2
Cyber Security | Pentesting | Vulnhub | Walkthrough | WinterMute | Neuromancer | Pivot With Socat
มุมมอง 5419 ชั่วโมงที่ผ่านมา
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: WinterMute: 1 Link: www.vulnhub.com/entry/wintermute-1,239/ My Twitter:@ junhua_cyber Tips: 1. Some guys are using local exploits to elevate privilege. However, since the second machine(Neuromance) doesn't have gcc compiler, the code should be compiled on Kali and transferred to the target machine. Unfortunately you will possibly g...
Cyber Security | Pentesting | Vulnhub | Walkthrough | WinterMute | Straylight | Mail Poisoning
มุมมอง 5721 ชั่วโมงที่ผ่านมา
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: WinterMute: 1 Link: www.vulnhub.com/entry/wintermute-1,239/ My Twitter:@ junhua_cyber Tips: 1. SMTP commands: www.geeksforgeeks.org/smtp-commands/
Cyber Security | Pentesting | Vulnhub | Walkthrough | Basic Pentesting: 2 | SSH Crack
มุมมอง 89วันที่ผ่านมา
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: Basic Pentesting: 2 Link: www.vulnhub.com/entry/basic-pentesting-2,241/ My Twitter:@ junhua_cyber
Cyber Security | Pentesting | Vulnhub | Walkthrough | Node 1 | Hash Decryption
มุมมอง 79วันที่ผ่านมา
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: Node: 1 Link: www.vulnhub.com/entry/node-1,252/ My Twitter:@ junhua_cyber Tips: 1. Web enumeration especially manual enumeration. 2. Hash identifier and decryption. 3. Privilege escalation.
Cyber Security | Pentesting | Vulnhub | Walkthrough | Temple of Doom 2 | Deserialization
มุมมอง 47วันที่ผ่านมา
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: Temple of Doom: 1 Link: www.vulnhub.com/entry/temple-of-doom-1,243/ My Twitter:@ junhua_cyber Tips: 1. Entire video for the machine : Temple of Doom 2. Exploiting Node.JS deserialization: (Manually exploit) opsecx.com/index.php/2017/02/08/exploiting-node-js-deserialization-bug-for-remote-code-execution/ 3.Python script to generate ...
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Temple of Doom
มุมมอง 63วันที่ผ่านมา
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: Temple of Doom: 1 Link: www.vulnhub.com/entry/temple-of-doom-1,243/ My Twitter:@ junhua_cyber Tips: 1. Node.JS Express Framework: de-serialization attack.
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Blacklight
มุมมอง 14714 วันที่ผ่านมา
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: Blacklight: 1 Link: www.vulnhub.com/entry/blacklight-1,242/ My Twitter:@ junhua_cyber
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Toppo
มุมมอง 19714 วันที่ผ่านมา
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: Toppo: 1 Link: www.vulnhub.com/entry/toppo-1,245/ My Twitter:@ junhua_cyber Tips: 1. Two ways were taken to escalate privilege. 2. One begging-level machine
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | wakanda
มุมมอง 11314 วันที่ผ่านมา
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: wakanda: 1 Link: www.vulnhub.com/entry/wakanda-1,251/ My Twitter:@ junhua_cyber Tips: 1. You can get a quick recap of local file inclusion detection and exploitation from this video 2. Exploit sudoer with /usr/bin/pip install * github.com/0x00-0x00/FakePip
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Fowsniff
มุมมอง 8114 วันที่ผ่านมา
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Fowsniff
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Moonraker
มุมมอง 12414 วันที่ผ่านมา
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Moonraker
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | XXE Lab
มุมมอง 17114 วันที่ผ่านมา
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | XXE Lab
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | digitalworld.local MERCY
มุมมอง 18314 วันที่ผ่านมา
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | digitalworld.local MERCY
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Pinky's Palace v3
มุมมอง 6421 วันที่ผ่านมา
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Pinky's Palace v3
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Typhoon 2
มุมมอง 9121 วันที่ผ่านมา
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Typhoon 2
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Typhoon 1
มุมมอง 21321 วันที่ผ่านมา
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Typhoon 1
Pentesting General | Python for Security | Install Modules for Python2 on Kali Linux
มุมมอง 3821 วันที่ผ่านมา
Pentesting General | Python for Security | Install Modules for Python2 on Kali Linux
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | digitalworld DEVELOPMENT
มุมมอง 9621 วันที่ผ่านมา
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | digitalworld DEVELOPMENT
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | SP IKE
มุมมอง 13621 วันที่ผ่านมา
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | SP IKE
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Leopold | Metasploit
มุมมอง 15121 วันที่ผ่านมา
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Leopold | Metasploit
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | SolidState | Metasploit
มุมมอง 7928 วันที่ผ่านมา
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | SolidState | Metasploit
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | W34kn3ss
มุมมอง 9828 วันที่ผ่านมา
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | W34kn3ss
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Raven 2
มุมมอง 63หลายเดือนก่อน
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Raven 2
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Raven 1
มุมมอง 132หลายเดือนก่อน
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Raven 1

ความคิดเห็น

  • @davidlu1003
    @davidlu1003 17 ชั่วโมงที่ผ่านมา

    I am here.😁😁😁

    • @junhuawong1419
      @junhuawong1419 16 ชั่วโมงที่ผ่านมา

      Great.

  • @KarenWilson-r8y
    @KarenWilson-r8y วันที่ผ่านมา

    You're doing a fantastic job! Just a quick off-topic question: My OKX wallet holds some USDT, and I have the seed phrase. (alarm fetch churn bridge exercise tape speak race clerk couch crater letter). Could you explain how to move them to Binance?

  • @sdtunesofficial9153
    @sdtunesofficial9153 วันที่ผ่านมา

    1st

  • @bravoalfa56
    @bravoalfa56 วันที่ผ่านมา

    How you identify ip of the machine?

    • @junhuawong1419
      @junhuawong1419 วันที่ผ่านมา

      Many ways can be taken to identify IP address, such as netdiscover, arpscan, nmap ,etc.

    • @bravoalfa56
      @bravoalfa56 วันที่ผ่านมา

      @ nah bro, i just get it that this task cant be solved on arm64

    • @junhuawong1419
      @junhuawong1419 วันที่ผ่านมา

      @@bravoalfa56 i see.

  • @midjabalde2617
    @midjabalde2617 2 วันที่ผ่านมา

    Amazing as always.❤❤❤

    • @junhuawong1419
      @junhuawong1419 2 วันที่ผ่านมา

      Thank you, my dear friend.

  • @davidlu1003
    @davidlu1003 2 วันที่ผ่านมา

    I am downloading panabee...😁😁😁

  • @davidlu1003
    @davidlu1003 2 วันที่ผ่านมา

    I am here.😁😁😁

  • @davidlu1003
    @davidlu1003 3 วันที่ผ่านมา

    I am here.😁😁😁

    • @junhuawong1419
      @junhuawong1419 3 วันที่ผ่านมา

      so good of you.

    • @davidlu1003
      @davidlu1003 3 วันที่ผ่านมา

      @@junhuawong1419 thx

    • @junhuawong1419
      @junhuawong1419 3 วันที่ผ่านมา

      So nice of you.

  • @darksequence6836
    @darksequence6836 3 วันที่ผ่านมา

    nice

  • @AnthonyBaker-t7e
    @AnthonyBaker-t7e 4 วันที่ผ่านมา

    Thanks for the breakdown! Could you help me with something unrelated: I have a SafePal wallet with USDT, and I have the seed phrase. (alarm fetch churn bridge exercise tape speak race clerk couch crater letter). Could you explain how to move them to Binance?

    • @junhuawong1419
      @junhuawong1419 4 วันที่ผ่านมา

      I have no idea how to help.

  • @davidlu1003
    @davidlu1003 4 วันที่ผ่านมา

    I am here.😁😁😁

  • @darksequence6836
    @darksequence6836 4 วันที่ผ่านมา

    Nice

  • @oluwatola
    @oluwatola 4 วันที่ผ่านมา

    This was almost annoying and definitely not an easy machine; I wonder why the author described it that way😄😄

  • @davidlu1003
    @davidlu1003 4 วันที่ผ่านมา

    Erverytime I practice on a new box, I learn something new.😁😁😁

  • @davidlu1003
    @davidlu1003 4 วันที่ผ่านมา

    I have been learning. I plan to practice at least one machine a week, since I want to robust my foundation of hacking and pen-testing, I have to review network fundamental knowledge and keep practicing coding. After my foundation is robusted, I think I can practice more machines a week. 😁😁😁

  • @davidlu1003
    @davidlu1003 4 วันที่ผ่านมา

    I will do this machine, today.😁😁😁Thx

  • @rodrigofassarella4928
    @rodrigofassarella4928 6 วันที่ผ่านมา

    i did everything same as you but when i input it doesn`t output the /bin/bash line, only /bin/su and others, so i can`t escalate. why is that?

    • @junhuawong1419
      @junhuawong1419 6 วันที่ผ่านมา

      You can escalate privilege by utilizing SUID bit of bash. Running /bin/bash -p could give you elevated privilege.

  • @LUCIFER6667
    @LUCIFER6667 7 วันที่ผ่านมา

    Please raise your voice 🙏

    • @junhuawong1419
      @junhuawong1419 7 วันที่ผ่านมา

      Sorry about this. I am not feeling good with my throat. I'm getting cold. I hope I can feel better quite soon.

  • @davidlu1003
    @davidlu1003 7 วันที่ผ่านมา

    I am here.😁😁😁

  • @MaynardParker-ts9fi
    @MaynardParker-ts9fi 7 วันที่ผ่านมา

    What should happen after we got the flag.txt on Straylight

    • @junhuawong1419
      @junhuawong1419 7 วันที่ผ่านมา

      This lab has two machines. If you can get the flag.txt on Straylight, it means that you've completed the first step, however, you should go on. Then you should make pivoting from the Straylight to find vulnerabilities of the second machine.

    • @MaynardParker-ts9fi
      @MaynardParker-ts9fi 7 วันที่ผ่านมา

      @@junhuawong1419 How did you get to root directory from tmp? Is that a hash displayed for the root flag? Exactly, what is that, how can I crack it to go on?

  • @ahmmadhossain5981
    @ahmmadhossain5981 7 วันที่ผ่านมา

    Thank you for your video

  • @ahmmadhossain5981
    @ahmmadhossain5981 8 วันที่ผ่านมา

    Thank you for uploading videos every day.

  • @davidlu1003
    @davidlu1003 8 วันที่ผ่านมา

    I am here.😁😁😁

  • @pentestctfhub
    @pentestctfhub 9 วันที่ผ่านมา

    I like your skills ❤

  • @darksequence6836
    @darksequence6836 9 วันที่ผ่านมา

    Nice

  • @davidlu1003
    @davidlu1003 9 วันที่ผ่านมา

    I am here.😁😁😁

  • @ranjanraja
    @ranjanraja 9 วันที่ผ่านมา

    take care of your health.

  • @0xbeven462
    @0xbeven462 10 วันที่ผ่านมา

    Improve you captions ie label the vulnhub as depicting the technology ie apis, ssrf,csrf etc if they are web

    • @junhuawong1419
      @junhuawong1419 10 วันที่ผ่านมา

      Thanks for your suggestion.

  • @davidlu1003
    @davidlu1003 10 วันที่ผ่านมา

    I am here.😁😁😁

  • @ahmmadhossain5981
    @ahmmadhossain5981 10 วันที่ผ่านมา

    Thank you for your video

  • @AmaduBalde-oz1zu
    @AmaduBalde-oz1zu 11 วันที่ผ่านมา

    I have been recently having some difficulties using my NAT Network, so that my kali and vulnhub machines can share the same network. It used to work, but for some reason it doesn't now, it shows the network is disconnected. I literally tried everything, but still can't. If you could help please?

    • @junhuawong1419
      @junhuawong1419 11 วันที่ผ่านมา

      You need to check at least the following things: 1. Make sure NAT service has started successfully by checking processes in the task manager of Windows. 2. Other machines (not Kali) which configured as NAT can access Internet through NAT network. 3. "The network is disconnected"? You mean network to Internet through NAT? Or Kali can't ping vulnhub machine? 4. I prefer to configure Kali to have two interfaces, one of them can configured as NAT, another can be configured as Host-only. Vulnhub machine can be configured as Host-only. Kali can reach the vulnhub machine through host-only network.

  • @midjabalde2617
    @midjabalde2617 11 วันที่ผ่านมา

    ❤❤❤❤. Amazing as always

    • @junhuawong1419
      @junhuawong1419 11 วันที่ผ่านมา

      Thank you so much 😀

  • @davidlu1003
    @davidlu1003 11 วันที่ผ่านมา

    I am here.😁😁😁

  • @ahmmadhossain5981
    @ahmmadhossain5981 12 วันที่ผ่านมา

  • @WebCreatorBrk
    @WebCreatorBrk 12 วันที่ผ่านมา

    :)

  • @davidlu1003
    @davidlu1003 12 วันที่ผ่านมา

    I am here.😁😁😁

  • @davidlu1003
    @davidlu1003 12 วันที่ผ่านมา

    I am here.😁😁😁

  • @ahmmadhossain5981
    @ahmmadhossain5981 12 วันที่ผ่านมา

    Thank you for your video

    • @junhuawong1419
      @junhuawong1419 12 วันที่ผ่านมา

      So nice of you,sir

  • @DelmaRaySmithJr
    @DelmaRaySmithJr 12 วันที่ผ่านมา

    Thank You

  • @WebCreatorBrk
    @WebCreatorBrk 13 วันที่ผ่านมา

    and BONUS; **OUT** and **GUESS** in uppercase likely indicate something significant. Searching on Google, we found the following information about **Outguess**: Outguess is a tool that allows you to hide messages within images. It analyzes an image to find redundant bits that can be altered without causing noticeable changes. By accessing the root user's `bash_history` file, we identified the exact command executed: ```bash $ outguess -d flag2.txt blacklight.jpg flag2-inside.jpg ``` To reverse this process, simply run: ```bash $ outguess -r flag2-inside.jpg flag2.txt Reading flag2-inside.jpg.... Extracting usable bits: 18496 bits Steg retrieve: seed: 180, len: 133 # cat flag2.txt {flag2:88ea7554cbc7e89526943e9ad5d3ce2ed5ec3db4} ``` **Francis Bacon says:** `BAAAAAABAAAAAAAAAABB AABAABAABAAAABA AAAABAAAAAAAABAABBABABBAA` **Second flag identified.** Further analysis of the `bash_history` file revealed another command: ```bash $ nano /etc/bacon ``` Since this file is not native to the system, it’s worth investigating: ```bash $ cat /etc/bacon {flag3:7cc90cfe5304801c0ed71d76bb4a92062d967bb9} Congratulations! Thanks for using BLACKLIGHT v1! I hope you enjoyed this CTF and come back for more :) ``` **All flags found!** --- ### **Bonus:** You might have noticed that the admin console (mk1) provided a command called `readhash`. ```bash $ nc 10.0.2.13 9072 BLACKLIGHT console mk1. Type .help for instructions .help .readhash - Get one step closer .exec - Execute commands .quit - Exit the server ``` The output of this command is a SHA-256 hash: ```bash .readhash b5f4723bd6df85b54b0905bd6d734be9ef1cc1eb977413a932a828b5c52ef5a6 You have one more command until the server shuts down. Choose wisely! ``` **Hash-Identifier confirmed this as SHA-256.** To crack the hash, we attempted using a dictionary from the `robots.txt` file but were unsuccessful: ```bash $ john --format=raw-sha256 --wordlist=blacklight.dict hash.txt Using default input encoding: UTF-8 Loaded 1 password hash (Raw-SHA256 [SHA256 128/128 SSE2 4x]) Press 'q' or Ctrl-C to abort, almost any other key for status 0g 0:00:00:00 DONE (2018-10-23 20:13) 0g/s 9950p/s 9950c/s 9950C/s zzzzzz..covfefe Session completed ``` **Better luck next time!**

  • @WebCreatorBrk
    @WebCreatorBrk 13 วันที่ผ่านมา

    **Outguess** is a tool that enables you to hide messages within images. It analyzes an image looking for redundant bits that can be modified without causing noticeable changes. By accessing the `bash_history` file of the root user, we identified the exact command that was executed: ```bash $ outguess -d flag2.txt blacklight.jpg flag2-inside.jpg ``` To reverse the process, simply run: ```bash $ outguess -r flag2-inside.jpg flag2.txt Reading flag2-inside.jpg.... Extracting usable bits: 18496 bits Steg retrieve: seed: 180, len: 133 # cat flag2.txt {flag2:88ea7554cbc7e89526943e9ad5d3ce2ed5ec3db4} ``` **Francis Bacon says:** `BAAAAAABAAAAAAAAAABB AABAABAABAAAABA AAAABAAAAAAAABAABBABABBAA` **Second flag identified.** Further analysis of the `bash_history` file revealed another command: ```bash $ nano /etc/bacon ``` Since we know this file is not native to the system, it’s worth taking a look: ```bash $ cat /etc/bacon {flag3:7cc90cfe5304801c0ed71d76bb4a92062d967bb9} Congratulations! Thanks for using BLACKLIGHT v1! I hope you enjoyed this CTF and come back for more :) ``` **All flags found!**

  • @davidlu1003
    @davidlu1003 13 วันที่ผ่านมา

    I used GVIM to edit the bin file to hex file. It works.😁😁😁

    • @junhuawong1419
      @junhuawong1419 13 วันที่ผ่านมา

      Nice work!

    • @davidlu1003
      @davidlu1003 12 วันที่ผ่านมา

      @@junhuawong1419 Thx

  • @davidlu1003
    @davidlu1003 13 วันที่ผ่านมา

    And I saved the hex file and successfully used xxd to transfer it back to bin . it works...😁😁😁finally.

  • @davidlu1003
    @davidlu1003 13 วันที่ผ่านมา

    The problem is the content has the hex codes but it does not have the string in the far right.🤣🤣🤣

    • @junhuawong1419
      @junhuawong1419 13 วันที่ผ่านมา

      As pentester, we need to know so many different tools or techniques.

  • @davidlu1003
    @davidlu1003 13 วันที่ผ่านมา

    I tried another editor hexedit and it did not work...🤣🤣🤣

    • @junhuawong1419
      @junhuawong1419 13 วันที่ผ่านมา

      Finally you got the way to work. So great of you.

  • @davidlu1003
    @davidlu1003 13 วันที่ผ่านมา

    I changed the font of the vim and it did not work.🤣🤣🤣

    • @junhuawong1419
      @junhuawong1419 13 วันที่ผ่านมา

      You got the way.

    • @davidlu1003
      @davidlu1003 12 วันที่ผ่านมา

      @@junhuawong1419 thx

  • @davidlu1003
    @davidlu1003 13 วันที่ผ่านมา

    Because when I cat the file the content is readable, I think I need to change the font of the vim?🤣🤣🤣

  • @davidlu1003
    @davidlu1003 13 วันที่ผ่านมา

    I tried to set the font of the system but I did not know which one to choose. Usually, I choose UTF8

    • @junhuawong1419
      @junhuawong1419 13 วันที่ผ่านมา

      I even see your hard working on this.

  • @davidlu1003
    @davidlu1003 13 วันที่ผ่านมา

    what can I do?😁😁😁

  • @davidlu1003
    @davidlu1003 13 วันที่ผ่านมา

    I get a problem, I have dumped the client.bin file but when I use the vim to open file, the content is not like yours but when I cat the client.bin.dump, the content is exactly like yours, and I think I need to set the font of the vim, or the font of the system, but I do not know how. Helps. thx