Thank you Sir, you the best taking your for our care to understand each of your lesson and tutorials I appreciate i love you gotta keep it going for us, thanks a lot.. I'll support
just absolutely love your videos and are my favorite to watch when i see new videos comes out .. thank you a million for teaching so much in such a great way you really are one of the best youtube mentors in this field to find , watch , liked as always and cant wait for next keep up the great work and videos!!!!!
You have to test this application, tugarecon is a python tool designed to enumerate subdomains using modules. It helps penetration testers and bug hunters collect and gather subdomains
Thanks for the video! At 15:52 you qualify having the query params in the URL to be a dumb thing because it allows you to play with the parameters directly from the URL. I understand, this is because it's implemented as GET request and not as a POST one. But I've been wondering: concretely, how can this be more easily exploited than the POST implementation to be qualified for a "dumb thing" ?
as far as i understood. showing which function/script is currently running is insecure. there can be more than more that one script running by redirect. seeing that in the url. one can try to skip steps in a process .. this explanation can be wrong. please correct me if it is wrong.
I have a question when you login to a site our request to the Website go through post request method when we are sending data . But in this it was get method used to send the data to the web server ? Why this has happened ? I don't understand that thing
Please make installation n usage videos 📹 on ... 1. Jok3r automated web penetration framework. 2. Vajra automated web penetration framework. Using Kali parrotsec Linux distributions. Thanks 🤝💯👍❤💚💙💜🥰😘✌
Thank you Sir, you the best taking your for our care to understand each of your lesson and tutorials I appreciate i love you gotta keep it going for us, thanks a lot.. I'll support
just absolutely love your videos and are my favorite to watch when i see new videos comes out .. thank you a million for teaching so much in such a great way you really are one of the best youtube mentors in this field to find , watch , liked as always and cant wait for next keep up the great work and videos!!!!!
Great! We're on the track again.
Thanks a lot for another video on web application pentesting. Please make more on this topic. Your videos really helps me a lot.
You have to test this application, tugarecon is a python tool designed to enumerate subdomains using modules. It helps penetration testers and bug hunters collect and gather subdomains
great video about URL , again i know new thing tqu for providing such types of video
Hell yeah Prof. Sploit 🙌
big thanks for this video sir
Thank you sir,,,great learning video,, love from India
Beautiful video...
THANK YOU!!
*8:56* how do we know/inspect a website to see how many subdirectories it has?
Thanks for the video!
At 15:52 you qualify having the query params in the URL to be a dumb thing because it allows you to play with the parameters directly from the URL. I understand, this is because it's implemented as GET request and not as a POST one. But I've been wondering: concretely, how can this be more easily exploited than the POST implementation to be qualified for a "dumb thing" ?
as far as i understood. showing which function/script is currently running is insecure. there can be more than more that one script running by redirect. seeing that in the url. one can try to skip steps in a process ..
this explanation can be wrong. please correct me if it is wrong.
great video
I was watching your video and suddently it popped up. 😅
Is the question mark used to simply delimit the resource from the parameter? Thanks.
Love from India
I have a question when you login to a site our request to the Website go through post request method when we are sending data . But in this it was get method used to send the data to the web server ? Why this has happened ? I don't understand that thing
Amazing
Please make installation n usage videos 📹 on ...
1. Jok3r automated web penetration framework.
2. Vajra automated web penetration framework.
Using Kali parrotsec Linux distributions.
Thanks 🤝💯👍❤💚💙💜🥰😘✌
Can you do a series on scapy please please please
13:09 Start of the demo
🥰thks sir
Sir where we practice like ctf,try hack me,hack the box ,pentester lab hacker one
Hey does anyone know how to get wifi set correctly in Kali Linux bare metal dual boot
What is the name of the system you are using
Please I'm a student and i want to be a cyber security, can you please help me with how to start?
th-cam.com/video/lhz0-qAQlBM/w-d-xo.html
How to hack Power grid 🤔🤔🤔🤔🤔🤔🤔🤔🤔🤔
:)
Going to Grammar slap you. “What is an URL?”
I wish more people watch these educational videos rather than shitty motivation videos.
I love you man Are you Muslim