when are you coming back with similar tut but with mitigations turned on in windows and using sth like ROP chains to bypass DEP and ASLR. that would be more fun ! looking forward to!
sth doesnt click, target is to control EIP, we identify payload size that is able to cause the crash, we then identify EIP offset from the payload, till here makes sense. you used mona to search for jmp instructions assembly that doesnt have termination chars, it found 9, why did you use the 1st one? also q2, if the payload size was normal(no crash), the program would have used function epiloge instructions from strcmp to resume to execution after successful copying?? what was mona exact purpose after knowing the offset?
Hi bro I want your help in learning ethical hacking, I'm learning it from your course but I have completed only 3 classes in that you have showed that how to use virtualbox for the uses of multiple os but I have installed virtualbox application and after that I have downloaded kali os from your official site but I can't install it in the virtualbox application, so that's why I want your help
Ephraisto - i really like the greek accent - thanx for the video from Palermo, Sicily
Perfect, comprehensive and clear explanation!
wow!! i was overwhelmed by that technical stuff awesome video
Amazing video Good explanation!
great work. thanks.
Long live your channel
when are you coming back with similar tut but with mitigations turned on in windows and using sth like ROP chains to bypass DEP and ASLR. that would be more fun ! looking forward to!
i bought your course and have problem with one of the thinks i tryed to find support but its says that i can open a thicket in your forum
Tell me one thing, both the attacker and victim machines were in LAN or a different network as a vm setup?
sth doesnt click, target is to control EIP, we identify payload size that is able to cause the crash, we then identify EIP offset from the payload, till here makes sense. you used mona to search for jmp instructions assembly that doesnt have termination chars, it found 9, why did you use the 1st one? also q2, if the payload size was normal(no crash), the program would have used function epiloge instructions from strcmp to resume to execution after successful copying?? what was mona exact purpose after knowing the offset?
For a real life scenario - how do I know what services are installed in a victim machine if he's outside lf LAN (in MAN or WAN).?
wooooow bro good explain
Can u teach us reverse engineering copy program and change name, photo like creating new program?
Leave it to Zaid to come up with some amazing content and instructors
Mantap❤
Hi bro I want your help in learning ethical hacking, I'm learning it from your course but I have completed only 3 classes in that you have showed that how to use virtualbox for the uses of multiple os but I have installed virtualbox application and after that I have downloaded kali os from your official site but I can't install it in the virtualbox application, so that's why I want your help
Please reply me because I want to learn ethical hacking
Dimitris 😍😍
Hi I need ur help please 🙏
I'm your subscriber I'm from India I'm not understand English language I understand hindi language
Cool
I am interested in hacking you can teach me
what does that suppose to mean? can you not write like an idiot
What is he doing in the video? Dancing?
I want to be a great hat
A fedora or boulder or cowboy?
Yo subscribe them
FREE ISRAEL
I'm your subscriber I'm from India I'm not understand English language I understand hindi language
I'm your subscriber I'm from India I'm not understand English language I understand hindi language