Buffer Overflows Made Easy - Part 8: Generating Shellcode and Gaining Shells

แชร์
ฝัง
  • เผยแพร่เมื่อ 15 ม.ค. 2025

ความคิดเห็น • 190

  • @TCMSecurityAcademy
    @TCMSecurityAcademy  3 ปีที่แล้ว +5

    I hope you enjoyed this video! If so, please consider dropping a like and subscribing.

  • @younesmohssen8158
    @younesmohssen8158 4 ปีที่แล้ว +28

    DUUUUUDE WTF THIS WAS SOOO AWESOME! EVEN THE PWK PDF COULDNT EXPLAIN IT AS CLEARLY AS YOU DID! REALLY GLAD YOU DID THIS FOR FREE. YOU DEFINITELY DESERVE EVERYTHING MAN!

  • @skhan9562
    @skhan9562 5 ปีที่แล้ว +43

    DUDE YOU ARE AMAZING!!! been trying to learn buffer overflow for months.... with your videos i learned it in under 24 hours. WOW! please dont stop posting new shit..... i will share the hell outta ur vids!

    • @TCMSecurityAcademy
      @TCMSecurityAcademy  5 ปีที่แล้ว +3

      Thanks for all the nice comments :)

    • @hazelgaor1696
      @hazelgaor1696 4 ปีที่แล้ว +1

      @@TCMSecurityAcademy really amazing video and easy to understand :)

  • @RiffsAndChugsTV
    @RiffsAndChugsTV 5 ปีที่แล้ว +15

    This was such a good course to work through. Thanks a ton, I am writing my OSCP in 3 weeks, and this just filled in so many gaps. thanks.

    • @TCMSecurityAcademy
      @TCMSecurityAcademy  5 ปีที่แล้ว +3

      Thank you. Best of luck on your exam!

    • @forrestbivens9669
      @forrestbivens9669 4 ปีที่แล้ว +2

      Yooo fellow metal head/guitarist. How'd you do on the OSCP?? I'm taking it this year. Also nice vids bro. Heath's been awesome for learning.

  • @sanjaybabusanjay
    @sanjaybabusanjay 4 ปีที่แล้ว +1

    THIS IS THE BEST BOF EXPLAINED ON TH-cam

  • @Ammarx
    @Ammarx 6 ปีที่แล้ว +4

    The best, easiest, amazing course in Buffer Overflow
    Thanks a lot.
    I gained a lot form this course and I hope that you continue with same momentum and clarity

    • @TCMSecurityAcademy
      @TCMSecurityAcademy  6 ปีที่แล้ว +1

      Thank you for the great feedback and motivation!

  • @hxmo656
    @hxmo656 5 ปีที่แล้ว +3

    Loved the entire series man! Went from having zero clue on buffer overflows to knowing this entire series inside out now, cheers Heath :)

  • @Fz3r0_OPs
    @Fz3r0_OPs 2 ปีที่แล้ว

    What a ride dude!!!! Now i got it!!! Thank you very much this course is incredible hahaha, you are the man, I owe you some beers

  • @cookies4eva22
    @cookies4eva22 3 ปีที่แล้ว

    Easily one of the best if not the best content creators in general, and in the cyber security genre specifically. Thanks for all the value you provide, we really appreciate it ❤️

  • @atif_iqbal
    @atif_iqbal 5 ปีที่แล้ว +1

    Dude you are awesome. I always skipped the buffer overflow part in any tutorial. But you made video so much simple that i watched the whole series in one go at mid-night. Simply Amazing.....

  • @91dwest
    @91dwest 5 ปีที่แล้ว +2

    Watching this series has made the whole buffer overflow concept just click now. Definitely subscribed, and looking forward to more material in the future!

  • @gpppp910
    @gpppp910 5 ปีที่แล้ว +3

    Prepping for OSCP. Binary exploitation has always intimidated me (and still). Followed this mini-course, then tried brainpan and got it in about an hour. You explained it very well (compliment from one teacher to another). I especially liked the fact you didn't over complicate the subject with too many (in-depth) technicalities. Save that for later. Great introduction into the subject. What worked well for me was to copy the python script to a new file at every step before making changes. This way you can clearly and instantly see what each step is responsible for. Made it easier for me to reproduce.

  • @freakinrican1098
    @freakinrican1098 2 ปีที่แล้ว

    Wow, just wow. I know I'm late to the game in commenting on the "Buffer Overflows" series but let me tell you...your explanation of it all is simply amazing! I just started dabbling in the whole virtual box world as a noob and I really appreciate they way you break things down. Subbed and hoping to further this little hobby of mine.

  • @jamesfowler1117
    @jamesfowler1117 5 ปีที่แล้ว +2

    wow man great video and very helpful. I cant believe you dont have more views/subs. It was easy for me to understand most of it as i have a basic understanding of assembly & how memory works, I also like how you split the videos into parts so i can go back and understand what i need rather than having to skip through a long video. Nice work from the UK

    • @TCMSecurityAcademy
      @TCMSecurityAcademy  5 ปีที่แล้ว

      Thanks for the kind words! I'm glad you enjoyed the videos

  • @sergeisumarokov
    @sergeisumarokov 4 ปีที่แล้ว +3

    Thank you very much, you helped me to put together all picture about buffer overflow, now some puzzles from book "Hacking: The Art of Exploitation" fits on place!

  • @superfunguy380
    @superfunguy380 5 ปีที่แล้ว +1

    Seriously your video made me understand the concept and ways to exploit buffer overflow in so easy way. Thanks you for the awesome videos. Spread the love!!!.

  • @morounodebode
    @morounodebode 6 ปีที่แล้ว +1

    This is epic...I have never seen Buffer Overflow work through made this easy before...weldon!!! Appreciate you good work...

    • @TCMSecurityAcademy
      @TCMSecurityAcademy  6 ปีที่แล้ว

      I'm so glad you got everything resolved and enjoyed the course!

  • @arbazfarooqi5050
    @arbazfarooqi5050 4 ปีที่แล้ว +2

    You are in real sense a mentor !

  • @ujjwalpratapsingh6962
    @ujjwalpratapsingh6962 4 ปีที่แล้ว

    I can't explain my happiness. I am a beginner in the field of hacking and understanding this cool concept was my dream and you made it come TRUE with your videos. Thanks a lot.

  • @casambo
    @casambo 4 ปีที่แล้ว +1

    Fantastic video brother. Very good supplement to the OSCP. Easy to digest, concise and to the point. Thanks again!

  • @hxglemur9466
    @hxglemur9466 3 ปีที่แล้ว +2

    Wow! I was about to break my PC when reading over buffer overflow for the eCPPT it all clicks now!!! Thank you so much. BTW your privilege escalation udemy videos taught me alot.... soon the cyber mentor certificate will be the golden standard, move out of the way eCPPT and OSCP

  • @MRrZero
    @MRrZero 5 ปีที่แล้ว +1

    Thank you for this awesome series of videos. It's better than what some people are charging for online.

  • @megacoldfiya9101
    @megacoldfiya9101 4 ปีที่แล้ว

    Thank you so much for putting this course together. I was have issue understanding the concept. After this course, I can really say that i get it. Thank you!

  • @TRAVESIAA
    @TRAVESIAA 6 ปีที่แล้ว

    Thank you for the class/videos, the videos were the BEST I've seen about buffer overflow. I been trying to learn buffer overflow for sometimes now, but everything I read just add confusion. Your videos were great, clear and simple. I now understand buffer overflow. THANK you. Great work.

    • @TCMSecurityAcademy
      @TCMSecurityAcademy  6 ปีที่แล้ว

      Thank you so much! I'm glad that I was able to help you understand it clearly! Your kind words mean a lot :)

    • @n0sce
      @n0sce 5 ปีที่แล้ว

      Congratulations, Sir. Your channel is going to be massive, I can guarantee. Subscribed and Notified. :-) THANKs for this series and please, keep on doing more videos on OSCP! Lots of success!

    • @johnbutler1816
      @johnbutler1816 5 ปีที่แล้ว

      Agreed. Unreal video course thank you! Keep it up. Followed on Twitter, subscribed.

  • @hipzap
    @hipzap 3 ปีที่แล้ว

    Thanks man, people like u makes this world better🥳

  • @japanesecinema6736
    @japanesecinema6736 4 ปีที่แล้ว

    Thanks. I am looking to start an entry IT job and it was fun following through this lesson. I also have been going through your 15 hour course on pentesting. Thanks.

  • @jeremiahjohnson4500
    @jeremiahjohnson4500 4 ปีที่แล้ว

    Thank you very much. I appreciate the way you broke everything down in plain language.

  • @kurrupt6831
    @kurrupt6831 4 ปีที่แล้ว

    This series is awesome . Made BOF understandable. Thanks Heath

  • @shahrukhiqbal24
    @shahrukhiqbal24 5 ปีที่แล้ว +1

    Sir, simply you are awesome!!! i have been following your channel, specially the pentesting for noobs, completed this series, it was really awesome!!
    many of my friends also follow your content, i introduced you to them, and we just love the way that you teach complicated stuff in such a simplistic manner..
    thank you again ❤❤

    • @TCMSecurityAcademy
      @TCMSecurityAcademy  5 ปีที่แล้ว +1

      Thank you! I'm so glad that you're enjoying the content and spreading the channel!

    • @shahrukhiqbal24
      @shahrukhiqbal24 5 ปีที่แล้ว

      You are most welcome sir 😊❤️

  • @the_soft4832
    @the_soft4832 4 ปีที่แล้ว

    I AM FROM SRI LANKA AND THESE YS I AM RESEARCHING ABOUT EXPLOITS,BUFFEROVERFLAW ETC..../YOU VIDEO I REALY INTERESTING....I T MADE ME SENSE ABOUT THIS TOPIC....KEEP UP YOUR WORK BROTHER....DO SOME MORE VIDEOS.....I LOVE YOU

  • @leqxor
    @leqxor 3 ปีที่แล้ว

    You have made an excellent course and helped a lot of people...

  • @jaka6451
    @jaka6451 5 ปีที่แล้ว +1

    @The Cyber Mentor Thank you so much for creating this tutorial. You have explained this topic in very
    accessible way. Once again, thank you :)

  • @ghostinthefibers3085
    @ghostinthefibers3085 4 ปีที่แล้ว +4

    Late to the party but I made some notes for this series with some additional stuff from other videos and resources. For those confused [like me] about how the JUMP ESP interaction works and the inclusion of NOP-sleds in the payload I attempt to explain this as I understand it from my research. Notes here: github.com/ghostinthefibers/SecSheets/blob/master/Binary%20Exploitation/Overflows/Buffer%20Overflows/Buffer%20Overflows.md

  • @h4gg497
    @h4gg497 5 ปีที่แล้ว +4

    Good series but what's really missing in my opinion is an explanation of why the JMP ESP in EIP results in the program jumping to the shellcode that we appended to our string. You also didn't really explain in detail why the NOP sled was needed. Some graphical display of the stack during this exploitation process would really help visualize what's actually happening.

    • @IrfanAli-vp5mh
      @IrfanAli-vp5mh 4 ปีที่แล้ว

      Nop sled is just to increment to next instructions. But i also don't know about jmp esp did you get your answer

  • @NareshLamGade
    @NareshLamGade 4 ปีที่แล้ว +1

    Thanks for the video man. I was not getting the reverse shell but in the end, it was just '\' missing on the shellcode. Finally got the shell and thank you for the amazing explanation.

  • @JohnSmith-my5hb
    @JohnSmith-my5hb 5 ปีที่แล้ว +1

    This is pure gold! Thanks for the huge help!

  • @lookback6314
    @lookback6314 4 ปีที่แล้ว

    Appreciate all of your lessons 👍

  • @heyAyaan7
    @heyAyaan7 5 ปีที่แล้ว +1

    Thanks for the course, it was very helpful. Hope you continue creating content on more advanced topics.

  • @LinkWave290
    @LinkWave290 5 ปีที่แล้ว +2

    Great series, I enjoyed everything.

  • @akshaysharma-ji2xw
    @akshaysharma-ji2xw 3 ปีที่แล้ว

    Thank you very much cyber mentor sir you cleared my doubts of buffer overflow like no one else did

  • @pentestical
    @pentestical 5 ปีที่แล้ว +2

    YES, finally got a root shell! Thanks for that. Amazing tutorial!
    If someone has also trouble to get a root shell and your program just crashes like in the first step: Check the IP address and the firewall! The firewall must be turned off and on top of that, you have to use the IP address of the Kali machine, not of the windows machine. Seems very obvious lol :-)

    • @kiranvijay1952
      @kiranvijay1952 4 ปีที่แล้ว +1

      I am facing the issue - In my case, I have disabled the firewall, the LHOST IP belongs to kali. Each time I run, the vulnserver.exe gets crashed and I dont get a shell :(. I tried with both Win7 and Win10 OS

    • @pentestical
      @pentestical 4 ปีที่แล้ว

      @@kiranvijay1952 If vulnserver.exe crashes, it means you can hit the windows machine. To get a root shell you need the correct piece of code. Re-write your python script and be careful to type it correctly as mentioned in the video. I would bet it's something simple like a wrong special character

    • @joshk8554
      @joshk8554 4 ปีที่แล้ว +1

      Thank you! This helped me. I am still a beginner and whilst it was so obvious, I was using the IP of windows machine :p

    • @pentestical
      @pentestical 4 ปีที่แล้ว

      @@joshk8554 you are welcome, we all have to go through the mistakes smh

  • @playniuniu
    @playniuniu 4 ปีที่แล้ว +2

    What a great tutorial! Thanks so much for this work. Excellent !!!!

  • @YashPatel-wo9cq
    @YashPatel-wo9cq 3 ปีที่แล้ว

    Best-One So Far!! Thanks

  • @rockj8344
    @rockj8344 4 ปีที่แล้ว

    its awesome. ..All videos are great ... I watched all videos privilege escalation as well... Its superb...thank you so much

  • @n111254789
    @n111254789 5 ปีที่แล้ว +1

    I've shared it quite a bit and subbed. I will definitely chip in on the patreon as well. I was wondering if you planned on doing a buffer overflow course on something with memory protection that would be amazing because the information that is out there just isn't very relevant a lot of times. You are God tier at explaining the process although I already knew everything up until this point it has helped a ton of my friends. So I definitely wanted to ask.

    • @TCMSecurityAcademy
      @TCMSecurityAcademy  5 ปีที่แล้ว +1

      At some point yes. Every time I poll Twitter/TH-cam, I provide it as an option, but something else always gets picked.

  • @abhijitpa1
    @abhijitpa1 ปีที่แล้ว

    Thank You for the series!!

  • @DavidBrunsdon
    @DavidBrunsdon 3 ปีที่แล้ว

    fantastic course - thank you!

  • @hazelgaor1696
    @hazelgaor1696 4 ปีที่แล้ว

    Amazing Video! It's really easy to understand and valuable! Thank you so much Heat Adams!

  • @khireddinebelkhiri725
    @khireddinebelkhiri725 4 ปีที่แล้ว

    thanks thanks, i started with no idea, now i really felt I've make a progress.

  • @kelvinfunk3791
    @kelvinfunk3791 3 ปีที่แล้ว

    You’re the best thanks for the detailed info and the time you spent.
    I subed.😇

  • @danfromsouthjersey
    @danfromsouthjersey 3 ปีที่แล้ว

    THANK YOU SO MUCH. I finally understand. FINALLY.

  • @asdzxc1506
    @asdzxc1506 4 ปีที่แล้ว

    Excelente tus videos son los mejores cuando se trata de comprender el desbordamiento de buffer

  • @solaadekoya2385
    @solaadekoya2385 4 ปีที่แล้ว +1

    This is awesome! I recently purchased my elearnsecurity PTP exam package, trust me I really struggled to understand how buffer overflow works compared to yours which is clear and concise. With the victim machine, how do I get access to and also, am I to install immunity debugger on it, please a bit of explanation will help. Thanks. Please, point me to your Paetron page.

  • @maxlim6264
    @maxlim6264 5 ปีที่แล้ว +1

    Simple and clear but need practice ... give u a big like !

  • @idbmdran
    @idbmdran 2 ปีที่แล้ว

    Thank you so much for your lesson.

  • @vjournal3567
    @vjournal3567 4 ปีที่แล้ว

    Thanks for this tutorial! Amazing work, I'm now subscribed!

  • @jacklee1612
    @jacklee1612 2 ปีที่แล้ว

    TCM, thank you very much. Cheers

  • @davidlu1003
    @davidlu1003 2 หลายเดือนก่อน

    Thx. This video is very great.😁😁😁

  • @Saw-o3h
    @Saw-o3h 4 ปีที่แล้ว

    your videos are really great. thanks

  • @茶尔莓
    @茶尔莓 5 ปีที่แล้ว +1

    very easy to understand, thank you so much !

  • @Shubhamchoudharyhacker
    @Shubhamchoudharyhacker 5 ปีที่แล้ว +1

    u were simply amazing bro thanku so much for making this video series

  • @CaptivatingNatureViews
    @CaptivatingNatureViews 5 ปีที่แล้ว +1

    Excellent Tutorial

  • @Supertester-ww1qy
    @Supertester-ww1qy 7 หลายเดือนก่อน +1

    Thank you so much :)

  • @anonymousanonymous6406
    @anonymousanonymous6406 4 ปีที่แล้ว

    This is really helpful . Thanks a lot

  • @PiduguSundeep
    @PiduguSundeep 3 ปีที่แล้ว

    Wow, thank you very much these eight parts made me feel confident as I had a really hard time understanding the buffer flow and actually implementing a simple one, As a beginner can you provide me some additional resources on the same to understand bufferoverflows in more detail.

  • @mcdesilva74
    @mcdesilva74 4 ปีที่แล้ว

    Thank you for the great tutorial

  • @abdulghanialkhateeb775
    @abdulghanialkhateeb775 5 ปีที่แล้ว +3

    What if the vulnserver is crashed and stop working? I cannot receive the shell. What should I do to fix that?

  • @heyserge
    @heyserge 4 ปีที่แล้ว

    Love the tutorial!!! Thanks

  • @-bubby9633
    @-bubby9633 3 ปีที่แล้ว +1

    Just a note for anyone who isn't getting the reverse shell. If you're on VirtualBox and using NAT allocation you need to forward your listening port. Just go to Settings > Network > Advanced > PortForwarding and put 4444 in the Host and Guest port :)

    • @fatimapereira612
      @fatimapereira612 3 ปีที่แล้ว

      Hey! i am still stuck and not getting root. The python script runs completely, i can see that vulnserver receives a connection from kali in the terminal but i dont get a root. I enabled port forwarding too but it did not work. Is there any other solution you have for this? Thanks

    • @susnoname
      @susnoname 3 ปีที่แล้ว +1

      I change it and nothing :/ AV/ FW disabled everywhere. All predvious steps were correct as I get the same values, responses as in Cyber mentor's video.

  • @davidlu1003
    @davidlu1003 หลายเดือนก่อน

    You are awesome,bro.😁😁😁

  • @johnpangilinan6831
    @johnpangilinan6831 4 ปีที่แล้ว

    AMAZING! I'm currently on my OCSP training I'm in the Buffer overflows module and I cant understand hahaha. But in your module its just easy like I open my pc!

  • @daronwolff
    @daronwolff 4 ปีที่แล้ว

    Awesome awesome!
    Thanks and thanks!!! You rock man!

  • @hariharan1996
    @hariharan1996 3 ปีที่แล้ว

    Thankyou Very much TCM !!!!!!!

  • @hariharan1996
    @hariharan1996 4 ปีที่แล้ว

    Loved it Thankyou TCM !!!!!!

  • @daronwolff
    @daronwolff 5 ปีที่แล้ว +2

    Awesome, clap clap clap. Amazing job.

  • @vaibhavsrivastava3288
    @vaibhavsrivastava3288 4 ปีที่แล้ว +2

    My vulnserver keep getting crashed. Not able to get reverse shell. I checked again and again... the code is same. please help.

  • @lakshyadutt5206
    @lakshyadutt5206 4 ปีที่แล้ว +1

    Hey man, do you have more videos on exploit dev or like a patreon or something. Would like to see more from you

    • @TalsonHacks
      @TalsonHacks 4 ปีที่แล้ว

      check out his TCM Security website courses

  • @ifeanyionyia-odike7305
    @ifeanyionyia-odike7305 4 ปีที่แล้ว

    Extremely helpful.

  • @dianpratama2003
    @dianpratama2003 4 ปีที่แล้ว

    thank you.. god bless you..

  • @cookiencreamchoco
    @cookiencreamchoco 3 ปีที่แล้ว +1

    Hey TCM, I am stuck at this part which should be the easiest but I can't seem to get a shell. The connection closes immediately and my netcat is not getting a shell. Any where I am wrong? I've tried to change to x64 for the msfvenom since my PC is x64 architecture.

    • @fatimapereira612
      @fatimapereira612 3 ปีที่แล้ว +2

      Hey! i am stuck there too. The python script runs completely but i am not getting shell. Did you find a solution to it? I would be more than grateful if you could help me out with this. Thanks.

    • @awesomeblossom89
      @awesomeblossom89 ปีที่แล้ว +1

      I am also facing the same problem. Python script runs, but VulnServer closes, and I don't receive the shell in my netcat.

  • @jakartakid4865
    @jakartakid4865 5 ปีที่แล้ว +2

    I really enjoyed your work! Clear and to the point. I was wondering if you have any good resources for me to learn privilege escalation or if you could create a tutorial on privilege escalation? Thanks and keep up the hard work

    • @TCMSecurityAcademy
      @TCMSecurityAcademy  5 ปีที่แล้ว +1

      Fuzzy security guide for Windows. G0tm1lk guide for Linux.

  • @olivert.7192
    @olivert.7192 5 ปีที่แล้ว +3

    great series thank you. Is everything that you have done in this video applicable to the OSCP? I saw you used some metasploit ruby scripts, is that allowed? I know msfvenom is allowed.
    Thanks for the series.

  • @jimivie
    @jimivie 4 ปีที่แล้ว

    Amazing video series

  • @majed9420
    @majed9420 5 ปีที่แล้ว

    Great videos, you have the ability to deliver the clear information, easy to follow.
    However, I have a question, as I see that I need to control windows machine besides my Kali machine to do buffer overflow? while in real-life pen-test you have no control on the windows machine! which makes the difference.

  • @H13248
    @H13248 3 ปีที่แล้ว

    First of all, this is awesome. Great job. I loved every second of this series.
    Second: maybe I've missed something (and I'll rewatch them all) but... we're trying to BOF a server. In this situation we can use the debugger and see what happens.
    So if they target is using a know server application, we can download it and try offline.
    But... what if a target is using an unknown server application (maybe a custom application) and we can't use the debugger?
    Is there a way to find a valid offset to point the EIP?
    Or we can do BOF only if we can actually use the debugger?
    Thanks.

  • @pwnhun73r
    @pwnhun73r 5 ปีที่แล้ว

    Thank you for the amazing course experience, the explanation is very clear to follow. yesterday i bought your udemy course because i think that is better than others and i liked the topics.
    I have a question, do you have any advice for the OSCP exam?

  • @anas345
    @anas345 5 ปีที่แล้ว

    Thanks for this Video. I have one question Please. where would "\x90" * 32 + overflow be written? in Which place in the Memory? in the top of the Stack?

  • @alamal-alami1731
    @alamal-alami1731 4 ปีที่แล้ว +1

    Hi, everything goes perfect till I run the reverse shell script and the vulnserver crashes. Firewall and realtime protection are off. I do get a reply after listening on netcat that a connection is made and shortly after the vulnserver crashes. any thoughts?. Thanks

    • @alamal-alami1731
      @alamal-alami1731 4 ปีที่แล้ว

      I got it , had one extra space in the script which cause the whole issue. Thanks worked perfectly

  • @kushalrahatkar4568
    @kushalrahatkar4568 4 ปีที่แล้ว

    awesome awesome. nice. thanks

  • @chapter7857
    @chapter7857 4 ปีที่แล้ว

    Great Demo

  • @Shubham_Jugran
    @Shubham_Jugran 5 ปีที่แล้ว +1

    Ok, so we got shell access of the victim now. What attacks can we perform and can we also have a persistence backdoor for this if I'm saying it correctly.

  • @martialartness
    @martialartness 5 ปีที่แล้ว

    So here's a weird one. I manage to get a reverse shell but then the program still crashes like in the initial Fuzzing exercise and so too does my shell... any ideas how I keep the shell alive after hitting the offset?

  • @arbazfarooqi5050
    @arbazfarooqi5050 4 ปีที่แล้ว

    nicely done

  • @BushRat253
    @BushRat253 5 ปีที่แล้ว +1

    So I see how we got the shell but how did we get root? Is that just part of msfvenom?

  • @prezlamen
    @prezlamen 2 ปีที่แล้ว

    Cool videos! Try in future to use bigger fonts,it is hard to watch,change dpi to zoom on ui

  • @1gbot
    @1gbot 2 ปีที่แล้ว

    YOU ARE THE GOAT

  • @manjoos4906
    @manjoos4906 4 ปีที่แล้ว

    thank you for this

  • @unknown-fd1yz
    @unknown-fd1yz 4 ปีที่แล้ว

    Thank you.

  • @sachink5726
    @sachink5726 4 ปีที่แล้ว

    hey!! im not getting a reverse shell in the end.. i got an error in vulnserver as "recv failed with error : 10054"... plz help

  • @dereklewinson3018
    @dereklewinson3018 5 ปีที่แล้ว

    My fave cyber-security teacher! #twothumbsup