This is such a brilliant and mature real-world breakdown of some of the things that most of us take for granted. You explain the technical exploit in the context of the, "relatable person". This is rare and I can't wait to see the next one.
Great video! I have a question: have their been many or any systems, connected to the Internet, that could *not* be compromised or exploited? I would be interested in hearing some experiences of failed hacking attempts and learn more about how the various techniques were effectively thwarted. Thanks for posting!
It looks really neat, I love the video. it's easy to see how word is a weak software when it comes to this. how would you deploy a keylogger? I think the tricky part is to mail it to someone without getting detected by the mail-systems antivirus ? it looks like it's a constant battle for making the malware FUD and the anti virus to detect it. I still think a keylogger and sniffing are some of the most powerfull tools around. but from I know of it's very hard to deploy a keylogger, even by this word trick, windows will block it straight away and stop it from starting automatically with windows.
Cody i wished you would go more in depth on this, maybe a different time? As in this is all quite basic and the stuff you discuss is exactly what I would want to see, especially defense-evasion.
This is such a brilliant and mature real-world breakdown of some of the things that most of us take for granted. You explain the technical exploit in the context of the, "relatable person". This is rare and I can't wait to see the next one.
Great work as always
Great video! I have a question: have their been many or any systems, connected to the Internet, that could *not* be compromised or exploited? I would be interested in hearing some experiences of failed hacking attempts and learn more about how the various techniques were effectively thwarted. Thanks for posting!
Nice pls do more of this
It looks really neat, I love the video. it's easy to see how word is a weak software when it comes to this. how would you deploy a keylogger? I think the tricky part is to mail it to someone without getting detected by the mail-systems antivirus ? it looks like it's a constant battle for making the malware FUD and the anti virus to detect it. I still think a keylogger and sniffing are some of the most powerfull tools around. but from I know of it's very hard to deploy a keylogger, even by this word trick, windows will block it straight away and stop it from starting automatically with windows.
Why do software companies prioritize convenience over security?
Because it's convenient.
I liked and learnt :)
release those magnificent locks
finally non blinker and head shaker meet
I always missed the stream!
really cool ,i enjoyed it
I am just starting with networking can you suggest me a good WiFi network adapter for beginners?
how about a class on how to bypass IDS
Seeing this work on a local network is cool and all, but why does no one ever show how this works across a WAN and not just a LAN
well explained
Please 🙏 can you say about how can I access a phone/ get info of that phone using only mobile number 😭😭😭 please can you please say
Cody i wished you would go more in depth on this, maybe a different time? As in this is all quite basic and the stuff you discuss is exactly what I would want to see, especially defense-evasion.
Saved everything.
So this is what it's like inside the matrix
Hi sir can you please how to mobile hacking in start to end please explain I'm your new subscriber sir
Would an instance of linux and wine prevented the successful attack?
Kevin I know that's a poke at me bro.l'd like some help.
French subtitle pls :(
Hello sir
How to jam cell phone signal on kali
And, How to hack fb account
Sir I wait your reply
Any fb hacker here ?
messi careca
kkkkkkk
Test
Lemme suggest something.
Talk less do more.