Watch me hack a Wordpress website..

แชร์
ฝัง
  • เผยแพร่เมื่อ 21 ธ.ค. 2024

ความคิดเห็น • 325

  • @Pafkatax
    @Pafkatax 4 หลายเดือนก่อน +54

    Bro is legit hacking a wordpress website. i rarely see someone actually hacking and not giving a 3 minute example with a vulnerable made website in 10 mins :D Good stuff

    • @Puls3ification
      @Puls3ification หลายเดือนก่อน

      its tryhackme website... sorry to disappoint you

  • @wndr0
    @wndr0 6 หลายเดือนก่อน +184

    Guys I’m 89% sure he can center a div

    • @koniply
      @koniply 4 หลายเดือนก่อน +7

      glazing, I'd say about 60% give or take

    • @I_hu85ghjo
      @I_hu85ghjo 4 หลายเดือนก่อน

      @@koniply 3, wont get lower

    • @145karpiu
      @145karpiu 4 หลายเดือนก่อน

      I'm 100% sure nobody can center a div without Googling it...

    • @DeepThinker193
      @DeepThinker193 3 หลายเดือนก่อน +2

      My Div

    • @nooblolxd3919
      @nooblolxd3919 2 หลายเดือนก่อน

      ​@@DeepThinker193not the right way

  • @yousefal-hadhrami7853
    @yousefal-hadhrami7853 6 หลายเดือนก่อน +214

    Pro tip,
    Keep the old password hash so that you change it back when you are done

    • @peterkim9696
      @peterkim9696 6 หลายเดือนก่อน +5

      😎💀

    • @Codebyakshay
      @Codebyakshay 6 หลายเดือนก่อน +20

      thanks black collar stuff

    • @null-undefined-none
      @null-undefined-none 4 หลายเดือนก่อน +7

      well I think that depends on motive. If you want to cover your tracks, sure that makes sense. But if you did this as bounty hunting then better leave it changed so you can claim the bounty :)

    • @zakariaabali4750
      @zakariaabali4750 2 หลายเดือนก่อน

      Is there a way to uncover a hash password?

    • @juangallego9433
      @juangallego9433 2 หลายเดือนก่อน +1

      great collar and knife man

  • @monkaSisLife
    @monkaSisLife 6 หลายเดือนก่อน +250

    Once you got into the db you couldve literally just changed the account to an admin, or just change the admins password. no need for hashcat at that point

    • @TechRaj156
      @TechRaj156  6 หลายเดือนก่อน +120

      True. But I was also trying to escalate privileges on the machine and not just get admin on the blog. But I agree the hashcat part was unnecessary.

    • @L0zzer
      @L0zzer 6 หลายเดือนก่อน

      ​@@TechRaj156
      Perfect

    • @benargee
      @benargee 6 หลายเดือนก่อน

      ​@@TechRaj156depends on the objective. Many times people use the same email and password on other sites so if you crack the leaked hashes, the same credentials could be attempting on the other sites.

    • @vaibhavsingh8122
      @vaibhavsingh8122 6 หลายเดือนก่อน

      ​@@TechRaj156 ltrace however is not installed by default on all distros

    • @emresanden
      @emresanden 6 หลายเดือนก่อน +9

      Was just about to comment the same thing 😛😂

  • @gibrains
    @gibrains 6 หลายเดือนก่อน +188

    Lesson learned: Just use static html ! =))

    • @ネメシス-h1z
      @ネメシス-h1z 5 หลายเดือนก่อน +7

      static is the best anyways for blogs and basic websites.

    • @PIRATA_TV
      @PIRATA_TV 5 หลายเดือนก่อน +1

      If you don't know, when your website has SSL certificate (non self sign) and your host has the worst firewall sql injections are blocked and you can't do nothing.🙃

    • @CoreyThompson73
      @CoreyThompson73 5 หลายเดือนก่อน +3

      Actually 70%+ of Wordpress sites could move to something like Hugo and have the same webpage functionality.

    • @malzkaffee3581
      @malzkaffee3581 5 หลายเดือนก่อน +1

      other the tool "simply static"

    • @bootsycoll
      @bootsycoll 5 หลายเดือนก่อน

      What a lot of “devs” tend to overlook is the main selling point of Wordpress is it’s a cms and easily updated/managed by non-technical clients, one of the reasons why it’s still so popular,…sure, static sites are faster and more secure but how does a non-techie update them? They’re definitely not going to be uploading markdown files to a server for example, another option would be to go headless but then you have to configure a headless cms to manage it…more development time…or u could just install Wordpress and it’s pretty much good to go out of the box

  • @1brokkolibaum
    @1brokkolibaum 6 หลายเดือนก่อน +16

    I havent thought I will watch the full video.. But suddenly you finished your task 🫥😂👌
    Great explanation in general, enough to keep up following the process logically. Surely I personally would have asked more about certain tools and useage, but for this case 10/10.

  • @RandomFishtankClips
    @RandomFishtankClips 6 หลายเดือนก่อน +59

    As someone who has limited knowledge on web hosting I've used Wordpress a lot in the past. The idea that it's this simple to get a list of all usernames and hack into the website is quite interesting. I really appreciate you uploading this. Subbed.

    • @Tararais_god
      @Tararais_god 5 หลายเดือนก่อน +5

      always keep your stuff up to date

    • @elfmatw
      @elfmatw 5 หลายเดือนก่อน +3

      Luckily, it's not always this "easy" and more often than not, you or webhosts will protect most of this information and prohibit unauthorized access to the subdirectories containing this information. On the other hand, there's a LOT of unprotected sites, servers and services out there kinda just up for grabs for more simple attacks like this.
      Video is great and shows how "easy" it is if you don't do bare minimal security and protection and hopefully it will open the eyes of some. Especially in this time where more and more severe vulnerabilities are discovered.

    • @mossdem
      @mossdem 4 หลายเดือนก่อน

      One thing to also note, you can check previous CVE's using some google dorking to refine your results. CVEDetails is a pretty good place to look also.

    • @hafizgugu
      @hafizgugu 2 หลายเดือนก่อน

      @@elfmatw you explained it exactly how it is

  • @shi-nee7966
    @shi-nee7966 6 หลายเดือนก่อน +20

    lol this was very fun to watch! Always loved your fresh content!

  • @phyoewaipaing6670
    @phyoewaipaing6670 4 หลายเดือนก่อน +3

    Appreciated.
    Hacking WP is possible as long as it goes with the default installation. The typical setup is to restrict those sensitive URLs to dedicated IP like using your own VPN. Also need to update all plugins and themes on a regular basis and use security plugins like fail-to-ban, and you’re all set. For the password tips, it’s better to set 48+ characters with complexity and reCAPTCHA is supported for the login as an additional protection.
    Love to see next video with updated WP version as well🎉

    • @ballfoot2460
      @ballfoot2460 3 หลายเดือนก่อน

      I am using 2 factor authentification, do you think it's ok too ?

    • @phyoewaipaing6670
      @phyoewaipaing6670 3 หลายเดือนก่อน

      @@ballfoot2460 yeah and make sure all plugins and themes are updated and remove unused ones.

  • @abhinavkrishna3164
    @abhinavkrishna3164 6 หลายเดือนก่อน +59

    "billy" joel and karen "wheeler" - hmm "strange things" happening

  • @bob-p7x6j
    @bob-p7x6j 6 หลายเดือนก่อน +15

    I may sound like a simpleton and compared to you I am but since you say you are trying to help people protect themselves, as a Wordpress user, what would be your most valuable tips to give, this video is too advanced for most people, but if you could give a list of say, the 10 or 20 most valuable techniques to protect yourself from most common attacks, or something like that...If you have time and feel like it... Subscribed, very informative, thanks!

    • @ghostofakina8747
      @ghostofakina8747 5 หลายเดือนก่อน +8

      Sure here's 3 big ones:
      - Keep your WordPress, themes and plugins up to date
      - Don't use the default username and have a strong password
      - Don't use pirates/nulled or crappy plugins

    • @stefanjohansson2373
      @stefanjohansson2373 5 หลายเดือนก่อน +2

      There’s a lot of free security plugins like WP Security that blocks some of the different attack steps. A strong password and everything updated is most important, but if you also change everything that’s default like the login link and so on you don’t look like the low hanging fruit I guess. 😂

  • @anolbe
    @anolbe 5 หลายเดือนก่อน +1

    This is one of the reasons i always make my own hash and salting algorithms; and also a reason that i prefer making the software i'm using myself, despite how much work is needed.

  • @noobgam6331
    @noobgam6331 4 หลายเดือนก่อน +11

    This will never happen with any real website.

    • @Developer_BR
      @Developer_BR 2 หลายเดือนก่อน

      why not?

  • @TheNamesJT
    @TheNamesJT 5 หลายเดือนก่อน +7

    This is why you need a plugin like wordfence and perma ban ips that request more then 5 failed login attempts

  • @yassine-sa
    @yassine-sa 6 หลายเดือนก่อน +33

    There is just no way you could find a suid binary that gives you a shell if you set an env variable to 1, it feels like those movies where someone hides the keys of his house in a really obvious spot. But still the video is greatt for educational purposes, it was fun watching it and knowing about the tools that let you do this kindof stuff

    • @seephor
      @seephor 5 หลายเดือนก่อน +5

      Obviously. This is a setup hack challenge so you know there's some vector you need to find.

  • @annahri
    @annahri 5 หลายเดือนก่อน +20

    I don't think there's something like that in the wild. That `checker` thing is so unlikely. But great video nevertheless.

  • @louislouislouislouisssss
    @louislouislouislouisssss 5 หลายเดือนก่อน +5

    BTW, the password value in Wordpress DB is just an MD5 hash. You can create the hash right in terminal.

    • @Zircuitz
      @Zircuitz 5 หลายเดือนก่อน

      There's no fucking way... MD5? Srsly? Do they want the passwords cracked?

    • @Adam2fg
      @Adam2fg 3 หลายเดือนก่อน

      @@ZircuitzYep. They're begging to be cracked😂😂

  • @AREWASOUND
    @AREWASOUND 5 หลายเดือนก่อน +21

    I watched the full video just to know how to protect my wordpress site, Thanks

    • @dearestdi
      @dearestdi 3 หลายเดือนก่อน +1

      how is it? i am trying to protect too

    • @imarvindpanwar
      @imarvindpanwar 3 หลายเดือนก่อน

      @@dearestdi just use security plugins to block backdoor entry

  • @gamishreyansh9940
    @gamishreyansh9940 6 หลายเดือนก่อน +24

    dear at 20:06 you have database access you can just create new admin user in database

    • @1brokkolibaum
      @1brokkolibaum 6 หลายเดือนก่อน +10

      But the goal could also have been to stay hidden for further investigation, so a new user would rise way more suspicion. 🤷‍♂😁

    • @vaibhavsingh8122
      @vaibhavsingh8122 6 หลายเดือนก่อน

      Moreover the password recovered from wordpress site can also be used in emails or at other places, including the sudo user in the bash

    • @digitzero3613
      @digitzero3613 6 หลายเดือนก่อน +1

      He got access to "wordpressuser" database account. It most probably doesn't have administrator access so can't really change admin password and can't create a new account either.

    • @vaibhavsingh8122
      @vaibhavsingh8122 6 หลายเดือนก่อน

      @@digitzero3613 no, he can change the WordPress admin account password, no restriction can be put in a MySQL user to prevent changing the data of a specific row of a table, MySQL user can only be restricted from updating the entire database.
      Beside the user mentioned in wp-config is the one that creates all the table in the place, that's the only db user WordPress know and that's the only user WordPress will use to update the password when the admin user chooses to change the password from WordPress's dashboard

    • @SwarajSahu
      @SwarajSahu 3 หลายเดือนก่อน +1

      @@1brokkolibaum No, if they have plugin like wordfence, any shell upload will trigger an email. so anyway this hack is possible with noob setup wordpress.

  • @AamirHMalik
    @AamirHMalik 4 หลายเดือนก่อน

    How easy and satisfying it looks but when you deep dive in it's heeelllll a lot more than thatttt! It's like pain in the az!

  • @StevenNorth
    @StevenNorth 5 หลายเดือนก่อน

    Great video! Thanks for the detailed explanation.

  • @ahmadganteng7435
    @ahmadganteng7435 5 หลายเดือนก่อน +1

    Even getting access to read DB is a big vulnerability.
    I hope my hosting provider has something to prevent this app.
    This is horrifying..

  • @DELvEK
    @DELvEK 6 หลายเดือนก่อน +2

    Not a real hacking in real time btw ! @Tech Raj.
    This was pre-setup for the video

  • @fkwebdev
    @fkwebdev 5 หลายเดือนก่อน +1

    Moral of the story is that: don't use software based websites, just use coded websites because we developer code very hard to apply bunch of security layers....

  • @rdi7371
    @rdi7371 5 หลายเดือนก่อน +2

    This was very interesting, and your explanation was also very instructive. I understood the steps you took to overcome each difficulty you encountered. Thank you, because now I know what to study before becoming a cybersecurity analyst.

  • @stefanjohansson2373
    @stefanjohansson2373 5 หลายเดือนก่อน +4

    Newbie question:
    How much of this is possible in general on the latest WP version and with WP security or any other similar security plugin?
    Security plugins can block user enumeration, IP number after wrong username/password. They also change default settings like the login URL. Of course no backup of important files are stored on the server. Also add the fact that a lot of hosting companies block sites in shared hosting if they don’t keep their sites updated.
    Combining a security plugin with everything updated and using a long and strong password (not with English words in it!) maybe is the best way to avoid being the low hanging fruit for all script kiddies? 🤔

    • @brodierobson4490
      @brodierobson4490 4 หลายเดือนก่อน

      the reality is, you will need to find / create an exploit yourself.

  • @kmwebverse2
    @kmwebverse2 4 หลายเดือนก่อน +2

    You just need a free security plugin like Solid Security and hacker will not even be able to see your usernames

  • @TechnicalHeavenSM
    @TechnicalHeavenSM 6 หลายเดือนก่อน +2

    Simply amazing... got to know many things about the insights of how some things work!

  • @hatnis
    @hatnis 6 หลายเดือนก่อน +8

    what stopped you from just changing the hash once u had database access?

    • @qwerty-p5m1f
      @qwerty-p5m1f 6 หลายเดือนก่อน +2

      Lack of experience.

    • @philipehusani
      @philipehusani 6 หลายเดือนก่อน

      @@qwerty-p5m1f 😂😂😂😂

  • @imnbsp
    @imnbsp 5 หลายเดือนก่อน +8

    I lost faith in you completely at 18:00
    You don't need to guess the password if you already have database access. You can just set the admin password to whatever you want, or even better, you can just create a php file like a.php that gets the first admin user and creates a logged in session for you, without even having to update the admin password at all. It's super easy just by using the WordPress methods on the docs.

  • @isaachiroman
    @isaachiroman 6 หลายเดือนก่อน +6

    If you already have access to the server, you should install the WP CLI, then create a new admin user or change the password of any user (of course I don't want to leave any traces so I'll make a new user, then get what I need and delete all traces).

    • @vaibhavsingh8122
      @vaibhavsingh8122 6 หลายเดือนก่อน +1

      He can also update the wp-login.php file to log the password in plain text file and after logging either an email can be sent using wp_mail or an api endpoint of his own server can be called with the logged credentials, so whenever someone logs in again with the same user he gets a notification.

  • @cfli-v8d
    @cfli-v8d หลายเดือนก่อน

    It's so easy for you to raise power. I can't use any orders when I'm raising power😂😂

  • @d3layd
    @d3layd 6 หลายเดือนก่อน +3

    Once you got access to the db, why didn't you just change the password?
    All you need to do is clear the hash, type in the new password and hash it and boom you've got access to any user. I do this all the time whenever I loose a password for a site.

    • @digitzero3613
      @digitzero3613 6 หลายเดือนก่อน

      He got access to "wordpressuser" database account. It most probably doesn't have administrator access so can't really change admin password and can't create a new account either.

    • @SwarajSahu
      @SwarajSahu 3 หลายเดือนก่อน

      @@digitzero3613 No , in wordpress, db_config user has all permissions. so yes he can change the pass.

  • @mostafaharb81
    @mostafaharb81 6 หลายเดือนก่อน +4

    Well if you got access the the second user, then when you got access to the wp_user table, you could have updated the first user encrypted password with the second user encrypted password and then access the admin user with the second user password...

    • @TechRaj156
      @TechRaj156  6 หลายเดือนก่อน +1

      That would be a smart move! But I was also trying to root the whole machine and not just get admin rights on the blog.

    • @mostafaharb81
      @mostafaharb81 6 หลายเดือนก่อน +2

      @TechRaj156 yeah I do understand for sure, but wordpress password encryption is based on the codes available in the config.php file which you accessed at the begining, so the password you generated at the website would not work in newer versions unless you create password on same keys in config or the easier path is to switch passwords or switch role to admin for the user account.. but still, you have done qn awesome work 👌

    • @digitzero3613
      @digitzero3613 6 หลายเดือนก่อน

      He got access to "wordpressuser" database account. It most probably doesn't have administrator access so can't really change admin password and can't create a new account either.

  • @andrinenz463
    @andrinenz463 6 หลายเดือนก่อน +2

    Do you have to be a root user to change values in a db? Just curious because then the other steps are not necessary

    • @ioccodeioccode6138
      @ioccodeioccode6138 5 หลายเดือนก่อน

      You're right. He could have get WordPress administration access by changing the password hash the first time he got access to the database.

  • @UsmaniaSoft
    @UsmaniaSoft 2 หลายเดือนก่อน +1

    whose text editor is use for this
    any one guide please

  • @osherezra131
    @osherezra131 5 หลายเดือนก่อน

    Great lesson bro thank you. nice process keep it up with this kind of videos

  • @MizManFryingP
    @MizManFryingP 5 หลายเดือนก่อน +2

    Wouldn't most of these attack surfaces be shut down with simple too many requests protection?

    • @HansFriedrich532
      @HansFriedrich532 5 หลายเดือนก่อน

      Yes it would, bruteforcing an account is unlikely on most Wordpress websites, as the passwords for new accounts are automatically generated and it discourages users from creating unsafe passwords

  • @dileepnktv
    @dileepnktv 2 หลายเดือนก่อน

    Nice video. Thanks for sharing your knowledge.

  • @alexlove2012
    @alexlove2012 6 หลายเดือนก่อน +6

    If you have admin access to database, you can just change the hashed password no?

  • @ib4112
    @ib4112 5 วันที่ผ่านมา

    can you make video for testing vulnerabilities for Reaact based website and websites hosted on Vercel etc.. as not much is there about the vulnerabilities of these tech stack?

  • @justk-h5h
    @justk-h5h 4 หลายเดือนก่อน

    What is the name of the software you write the code for? I haven't been able to find it

  • @digitzero3613
    @digitzero3613 6 หลายเดือนก่อน +14

    Everything else was realistic except the Linux privilege escalation part. Like what's the probability of finding something like this checker binary file which sets the uid to 0.

    • @Developer_BR
      @Developer_BR 2 หลายเดือนก่อน

      I guess 98% of youtube tutorial about how to make money using this or that tool (like kali hacking) have a catch. If you discover and post in comment, it probably will be deleted by owner (in order to sell his course).

    • @vedaanshvijaywargiya3596
      @vedaanshvijaywargiya3596 หลายเดือนก่อน

      @@Developer_BR bro... its a tryhackme challenge ofc its gonna have SOME unrealistic part to it 💀

  • @hoholebaguette7298
    @hoholebaguette7298 6 หลายเดือนก่อน +3

    why didnt you use sudo -l when you were trying to root?

  • @EnthusiastWorld-k1u
    @EnthusiastWorld-k1u 4 หลายเดือนก่อน

    i have a question, i see full video, how can i save my word-press website , could you possible suggest any free plugin ?

  • @gamingmetxadrian3710
    @gamingmetxadrian3710 6 หลายเดือนก่อน

    You earned a new sub, I'm a reverse engineer and have little knowledge to pentesting. You make it really interesting and clear!

  • @faizanshakil2775
    @faizanshakil2775 4 หลายเดือนก่อน

    I am wondering what would have you done if the the kwheel's password was not crackable ?

  • @Rajeshevhu
    @Rajeshevhu 6 หลายเดือนก่อน +23

    Try in latest version of WordPress.

    • @qwaszx2
      @qwaszx2 6 หลายเดือนก่อน +5

      The latest version of WP breaks all themes so nobody updates. :P

    • @Rajeshevhu
      @Rajeshevhu 6 หลายเดือนก่อน

      @@qwaszx2 i updated latest version of my wordpress 6.4 or something. My site is working fine

    • @webrevolution.
      @webrevolution. 6 หลายเดือนก่อน

      @@qwaszx2 No decent website worth hacking for bug bounties uses wordpress anyways. CMSs like wordpress are generally only used for personal blogs of no name individuals or companies.

    • @nick-leffler
      @nick-leffler 6 หลายเดือนก่อน

      ​@@qwaszx2Lol that's why you use a good theme.

    • @tomxygen5963
      @tomxygen5963 6 หลายเดือนก่อน +8

      @@qwaszx2what are you even talking about? there’s absolutely no issue with themes in the latest version of wordpress

  • @gideonwickord1074
    @gideonwickord1074 2 หลายเดือนก่อน

    this was impressive but how did u know which algorithm you need to use? I mean its way easy to check this whith a small google search but what is if not. I miss the part where it was checked in the video :)

  • @zeddybear1379
    @zeddybear1379 6 หลายเดือนก่อน

    It still shocks me that wordpress has features to protect you against brute force and telling you if you have the correct username but incorrect password, but you have to manually configure and turn them on, and most of the people who use wordpress use it because its simple to use to make a website and you dont need any coding knowledge so they dont know about these extremely important features... it should be default

  • @yjawhar
    @yjawhar 5 หลายเดือนก่อน

    Nice video. But, since you already gained access to the database, it's as good as being an admin on the website since you can modify everything but it's gonna be more difficult!

  • @thilakreddy1904
    @thilakreddy1904 6 หลายเดือนก่อน +1

    Are u using a window manager or is it a kali theme

  • @HikaruAkitsuki
    @HikaruAkitsuki หลายเดือนก่อน

    That's is why a CMS should not be the Frontend of it self.

  • @youneszar5431
    @youneszar5431 4 หลายเดือนก่อน

    when I run the attack on my site it says that it receive unown response code 405

  • @vast_agency
    @vast_agency 2 หลายเดือนก่อน

    This is great.
    How can I get a step by step tutorial and tools used. I'll like to try this on some of my WordPress accounts

  • @memorysmelody4589
    @memorysmelody4589 6 หลายเดือนก่อน +1

    wpscan gives various vulnerabilities available in different plugins of the websites but can't find poc of them. Please guide

    • @jxkz7
      @jxkz7 3 หลายเดือนก่อน

      Did you find any resources for these issues. I am also facing the same problem

  • @spiritcaress
    @spiritcaress 5 หลายเดือนก่อน

    Hi, please where can I get fuzz word lists?

  • @anshhmehta
    @anshhmehta 6 หลายเดือนก่อน

    Can you guide what's the procedure to manually enumerate to find the user id? coz this method did not work

    • @ibrahimdevx
      @ibrahimdevx 6 หลายเดือนก่อน

      google it 👏

  • @sevenrichiewhite
    @sevenrichiewhite 5 หลายเดือนก่อน +1

    This video actually shows how easy it is to get hacked when using a Wordpress website. And Wordpress is getting hacked and exploited every day in many different forms. Which is good and also bad. So you're save from all that by just not using Wordpress or any other CMS of that kind.
    Static websites and Flat File CMS without admin interface or actual user are my choice anyways. Now i can show my clients actually why.

  • @ShriSumitJi
    @ShriSumitJi 6 หลายเดือนก่อน +5

    do you provide private classes

  • @Robin-ce6jd
    @Robin-ce6jd 5 หลายเดือนก่อน

    Very good and detailed tutorial, thank you very much!
    However, I don't see the reason why you absolutely have to be root on the server.
    As soon as you have access to the database, you can change the password or even create a new user :)

  • @Sobbayi
    @Sobbayi 5 หลายเดือนก่อน

    Another option is to add a function into functions.php file to create a new user in the DB with admin privileges leaving the original admin untouched

    • @Kaotix_music
      @Kaotix_music 5 หลายเดือนก่อน

      this seems much easier to do. How do you access my websites functions.php thou thought logging into my server?

  • @christopherjonesramos3655
    @christopherjonesramos3655 6 หลายเดือนก่อน +1

    Can it work if the wp site is tunneled to Cloudflare?

    • @firedeveloper
      @firedeveloper 6 หลายเดือนก่อน

      Short answer yes.
      Long answer depends on your configuration, there are many ways that can be blocked by cloudflare rules. For example you may block a url to be accessible from your static IP only.
      And keep in mind that cloudflare is not a firewall.

    • @SECYBERSAFE
      @SECYBERSAFE 6 หลายเดือนก่อน

      ​@@firedeveloper cloudflare is a waf.. So it is a firewall... Web application firewall

  • @pantera204
    @pantera204 19 วันที่ผ่านมา

    For Windows?

  • @michalkorneluk2186
    @michalkorneluk2186 5 หลายเดือนก่อน

    "ignore those warnings, i'm going to fix them later" them metasploit warnings are never getting fixed are they? XD

  • @Heisenberg696
    @Heisenberg696 6 หลายเดือนก่อน

    This kind of videos we need keep making this kind of videos

  • @inamurrehman2783
    @inamurrehman2783 4 หลายเดือนก่อน +1

    restrict/disabled the all API's endpoint

  • @arisawali5073
    @arisawali5073 6 หลายเดือนก่อน +1

    what if there is no xmlrpc?

    • @firedeveloper
      @firedeveloper 6 หลายเดือนก่อน

      Bad luck. You need to find an other vector.

  • @captain9756
    @captain9756 3 หลายเดือนก่อน

    Wow this is so easy let's hack all WordPress websites

  • @PulGoyGoy
    @PulGoyGoy 2 หลายเดือนก่อน

    Thank you for video. I will follow your videos

  • @emanueleborghini3186
    @emanueleborghini3186 6 หลายเดือนก่อน +1

    Peak scriptkiddie content

  • @novianindy887
    @novianindy887 6 หลายเดือนก่อน +1

    does wp-login only accept 7 times password guessing tries?
    I tried it and I can get unlimited tries.

    • @STFUandFY
      @STFUandFY 6 หลายเดือนก่อน

      Depends on plugins, WAF

  • @portusdelphini
    @portusdelphini 2 หลายเดือนก่อน

    Imagine password is out of dictionary. What's next? Failed attempt?

  • @tpevers1048
    @tpevers1048 6 หลายเดือนก่อน +2

    You do not quit youtube

  • @amajangbah9265
    @amajangbah9265 6 หลายเดือนก่อน

    Tips:
    Always use webflow

  • @Elia33337
    @Elia33337 5 หลายเดือนก่อน

    I'm new at hacking, but couldn't you use sudo to get root?

  • @n1m390
    @n1m390 6 หลายเดือนก่อน

    I'm a WordPress developer, seeing all this makes me 😢

    • @samuelhalder8472
      @samuelhalder8472 6 หลายเดือนก่อน

      Lol

    • @Yarkanlaki
      @Yarkanlaki 6 หลายเดือนก่อน

      its common password attack they would never crack random passwords

  • @ZazenWebDesignAlbany
    @ZazenWebDesignAlbany 6 วันที่ผ่านมา

    Why would you put this on the internet?

  • @MRJMXHD
    @MRJMXHD 6 หลายเดือนก่อน

    Good job, but any wordpress dev worth their salt would have blocked user and directory enumeration.

  • @s0kulite
    @s0kulite 6 หลายเดือนก่อน

    no devs are gonna leave those sort of bins for your the sake of your privilege escalation, but sure, nice video before that.

  • @BabyHeart-m5c
    @BabyHeart-m5c หลายเดือนก่อน

    Tutorial how to set up terminal that you're using

    • @lpkapil
      @lpkapil 3 วันที่ผ่านมา

      Its kali linux, open source. You can use in vm lab.

  • @thedude6867
    @thedude6867 หลายเดือนก่อน

    How to protect from this?

  • @yuvrajarora8840
    @yuvrajarora8840 6 หลายเดือนก่อน

    What’s that JSON viewer?

  • @abbastough9474
    @abbastough9474 หลายเดือนก่อน

    I'm afraid of hiring you for security services 😨😨😨😨

  • @editorbundle
    @editorbundle 5 หลายเดือนก่อน

    Bro do u have any complete hacking course😒

  • @ansleegomes3946
    @ansleegomes3946 2 หลายเดือนก่อน

    I only know the url of my website. Now I want to get the password. Can you please assist?

  • @anowarulhassan5117
    @anowarulhassan5117 6 หลายเดือนก่อน

    When you have database access, just add a new user to db as user type admin and you can get the admin access.😅

  • @mysinN89
    @mysinN89 5 หลายเดือนก่อน

    Please tell me the checker binary has been put there by yourself ;-) lol

  • @signdrumnbass
    @signdrumnbass 3 หลายเดือนก่อน

    How you knew that you need exactly wp-json/wp/v2/users endpoint to enumerate all the possible users? Like where do i find that information? 4:43

  • @chandanchauhan752025
    @chandanchauhan752025 4 หลายเดือนก่อน

    19:00 php ass 😂😂😂😂

  • @unclesam007
    @unclesam007 2 หลายเดือนก่อน

    try doing this with a security plugin installed and active

  • @gabydewilde
    @gabydewilde 6 หลายเดือนก่อน

    It so willingly reveals everything

  • @fun12222
    @fun12222 5 หลายเดือนก่อน

    Amazed by your skills thank you

  • @honestfrieza
    @honestfrieza 6 หลายเดือนก่อน

    Getting This Error
    {
    "code": "rest_user_cannot_view",
    "message": "Sorry, you are not allowed to list users.",
    "data": {
    "status": 401
    }
    }
    is there any othere way to list users ?

  • @rameensuresh
    @rameensuresh 5 หลายเดือนก่อน

    Please show us how to null a plugin. Example tablesome plugin

  • @_indgamer_
    @_indgamer_ 4 หลายเดือนก่อน

    Fun fact: buy SSL

  • @thepickicool97
    @thepickicool97 4 หลายเดือนก่อน

    wow, I will never use wordpress again lol

  • @diegoslinger1254
    @diegoslinger1254 13 วันที่ผ่านมา

    What is this checker binary? Looks like magic that there is file where you change a variable to 1 and lift your rights to root. And you spotted the right file from the 1st attempt..))

  • @Unknown_4771
    @Unknown_4771 6 หลายเดือนก่อน

    Nice but can you get cpanel also?

  • @SECYBERSAFE
    @SECYBERSAFE 6 หลายเดือนก่อน

    But if another creator does this. There's a possibility youtube takes the video down.
    Good video though