Hi ,thanks for your video. what if Internet is blocked in the system where older log4j is being used? still the risk is there ? and if Internet is there then blocking of LDAP query will work or not ?
Just 3weeks before I started watching ur channel and I do think to that now security become so n so high on its peek. may be there no more hacking posible, and just there another bug get in public 😂😂😂 and it was on another level 😂 :)
Thanks brother for guiding us. I learned very well theoretically as well practically also. So again thank you very much and make more videos on recent OWASP top 10.
bhai jb mai metasploit se ssh/ssh_login brute force attack kr ra hu kioptrix machine pr to connection closed by remote host ara h aur wo puri Pass_file hi nhi read kr para h aur jbki hydra se ho jara h help kr do yr
This is Amezing for r the best please iska patch bata dena and live kab aa rahy ho bro bhot se question h puchne ke liya mai instagram nahi chalata isiliyr waha nahi puch pata And thanks again
sir in the occasion of 200k subscribers of channel are you giving your "Techhacker EHCS bundle Course" for 1 lucky guy with skills. like last time. thank you.
Be the smart fella than fart smella , black hat hackers are criminals they use their skills to exploit the poor and innocent and ask ransom money in cryptocurrencies white hat hackers are the ones who pentest the system time to time to fix the issues like this, log4j is the severe vulnerability in the decade who found this vulnerability ? white hat hackers and pentesters found this vulnerability and reported it, So thanks them for so they found this before any major cyber attack and all over the world developers are fixing it
Hello Brother Muje cyber security me bahut interest hai or me ek ethical hacker banaa chatha hu but mene 12th arts se ki hai to kiya me cyber security me career bana saktha hu Plz reply I'm also Big fan of you❤️ love you🤎
Please share your product support email id.I am not able to reset my password. The password reset email is not receiving.I have checked the spam folder as well. The error shows "The invalid username or email". Please help me to resolve this issue.
bhai bhaut mistakes hai tumhari video me 14:06 LDAP (Lightweight Directory Access Protocol ) ek application protocol hai na ki database or jin logo ko smz nhi aaya ye sab kya bol rha hai ye to ye dekh lo RMI : Remote Method Invocation JNDI: Java Naming and Directory Interface API RCE: Remote Code Execution
sir i am a child from bangladesh my fb id had been hacked from 7-8 month which was very important for me can you pls help me to get back my fb id that id was important for me because that fb id was linked with free fire game
I'm not a Java dev but still understood the concept of this vulnerability very well. Thanks, brother!
brother nobody teaches the way you do your fan ❤️❤️
Video with awesome presentation. Also everyone telling about the vulnerability but no one how to mitigate or prevent it.💯
kya hi video bnaya hai, sab kuch samajh aagya. bhai ur the best
Finally a video with proper explanation along with implementation. Thanks a lot Ansh bhai, love your videos ❤️💯
I really appreciate you sir, still then I don't understand anything but i believe that one day I'll come to knw 😂
Bhai gajab 😂😂😂😂😂
@@navneet_singh1 😂
Same here
In this hacker can hold command over Java based Web servers.
Seedhi baat no bakwaas. Sureshot explanation well done Ansh bro
Clean and Crisp Explanation thank you for sharing your knowledge brother!
Hi ,thanks for your video. what if Internet is blocked in the system where older log4j is being used? still the risk is there ? and if Internet is there then blocking of LDAP query will work or not ?
Dont understand these technical terms but i like it ❤️
Etalic Hacking corse sir 1200 me insagarm par de ray he sir kiya la lu sir ..
Will you please suggest how to check log4j vulnerable in windows server 2008 r2?
as always...., awesome explanation. 🤩
Just 3weeks before I started watching ur channel and I do think to that now security become so n so high on its peek. may be there no more hacking posible, and just there another bug get in public 😂😂😂 and it was on another level 😂 :)
Thanks brother for guiding us. I learned very well theoretically as well practically also. So again thank you very much and make more videos on recent OWASP top 10.
bhai jb mai metasploit se ssh/ssh_login brute force attack kr ra hu kioptrix machine pr to connection closed by remote host ara h aur wo puri Pass_file hi nhi read kr para h aur jbki hydra se ho jara h help kr do yr
Can anyone please tell in which folder the docker file is ?
Best video on this matter
bhai ek request hai please bolo ethical hacking kr liya kya study karna parta hai please bolo
ethical hacking my pashion 😭
Any free good resource for computer networks ?
sir encrypted sd card ko hack kaise kare.. how to decrypt sd card
That waybackurl repo is also not working can someone please provide me the code?...
Bhai ham bca ka student hai to ham ethical hacking kar sakta hai
Awesome explanation Sir
Bro you are from Airoli??? I want to meet you I live nearby
Bhai aap best ho yaar
good explaination
sir aap ne description me shelloshock ke bare likha hai log4j ki jagah kyu ??
Sir I want to take your "TechHacker" course can i take it or you have closed it and how i will ask my doubt
Mail me: anshbhawnani@gmail.com
@@BittenTech
Sir I have to mail my doubt here?
Brother networking ki kitne video or aane wale hai. Or kab aayegi?
Thanks, looking for this explanation !!
I want to give your exam but how to do that?🙄 I can't find, completed two courses of your website 😐
Thanks a lot Ansh bhai,
Bhai rat attack kalilinux se kese kre video bna do
thanks bro bt how we find using logs in website
Sir please tell us difference between computer science vs cyber security love from haryana 😘❤️❤️
Sir one video ethical hacking ke liye loptop buy kre uske bare me apni advise de
Thanks bro...nice video
Sir main app ke sath contact kar sakte hun ?
Awesome dude!
Great explanation 🙆
Hey can you share that jar file. Now not available on web archieve
@Rahul Dhankhar yes. If u have on this mail
How to find vulnerable web apps
Waiting for this sir
I think if we update jar app it's can be solved
Great explanation ❤️❤️
Brother jndi exploit is no more exist on web archive machine. Kindly upload this file on your drive and provide the link. Please Please Please.
Sir please make a video on how to decrypt .nnqp files encrypted by ransonware
Please tell me the tips to prevent it..
This is Amezing for r the best please iska patch bata dena and live kab aa rahy ho bro bhot se question h puchne ke liya mai instagram nahi chalata isiliyr waha nahi puch pata
And thanks again
Great sir.
Woo nice 👍👍👍🙏
Bhaiya I am not able to log in even I have tried for several times I just want to buy your course plz bhaiya help me plz plz I want to buy
sir in the occasion of 200k subscribers of channel are you giving your "Techhacker EHCS bundle Course" for 1 lucky guy with skills. like last time. thank you.
👀wow
thank you sir
Sir meri fb id hack ho gyi h pls help me to get it back
Hye bro i found a funfact that blackhats are more powerful than whitehat so government should hire them anyhow!! If agree then support
You 15 y/o or what?
@@crazzyflynn2433 He hacked his neighbors WiFi password...
Be the smart fella than fart smella , black hat hackers are criminals they use their skills to exploit the poor and innocent and ask ransom money in cryptocurrencies white hat hackers are the ones who pentest the system time to time to fix the issues like this, log4j is the severe vulnerability in the decade who found this vulnerability ? white hat hackers and pentesters found this vulnerability and reported it, So thanks them for so they found this before any major cyber attack and all over the world developers are fixing it
@@andhakutilsaap Not every blackhat attacks innocent. Log4J vuln was first unofficially reported in 2013...then again in 2016,nobody cared that time.
@@crazzyflynn2433 LOL be real man
ye sql injection ke jaise similar hai
Facebook hide number kasy dakha jaye please bro comment me 🙏🙏🙏🙏🙏🙏🙏🙏🙏
well explained
Hello Brother
Muje cyber security me bahut interest hai or me ek ethical hacker banaa chatha hu but mene 12th arts se ki hai to kiya me cyber security me career bana saktha hu
Plz reply
I'm also Big fan of you❤️
love you🤎
👍👍👍
thanks bhaiya :)
Good
Aap apna address bata skte ho kya ak help chahiye thi very very important for me
What is your age sir?
Please reply ❤️
Thanks
Please share your product support email id.I am not able to reset my password.
The password reset email is not receiving.I have checked the spam folder as well.
The error shows "The invalid username or email".
Please help me to resolve this issue.
Sir please upload gameplay of " hacker simulator " game 🙏
2020 and 2021 is all about 0Days and RCE , Linkedin almost got flood by this😂
Nice
jndi Exploit link
bhai bhaut mistakes hai tumhari video me
14:06 LDAP (Lightweight Directory Access Protocol ) ek application protocol hai na ki database
or jin logo ko smz nhi aaya ye sab kya bol rha hai ye
to ye dekh lo
RMI : Remote Method Invocation
JNDI: Java Naming and Directory Interface API
RCE: Remote Code Execution
log4net bhi vulnerable tha
sir i am a child from bangladesh my fb id had been hacked from 7-8 month which was very important for me can you pls help me to get back my fb id that id was important for me because that fb id was linked with free fire game
Bro muje html sikha do yaar
Reverse shell
Hard time due to pandemic ✊
My team spent 4 nights to patch it in our projects
Bro please help me please 😭😭😭🙏🙏🙏
Hlo
Please vai 😭🙏
Please 🙏 reply me 🙏
Hii sir
Etalic Hacking corse sir 1200 me insagarm par de ray he sir kiya la lu sir ..