Junhua Wong
Junhua Wong
  • 738
  • 102 303

Відео

Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | SP IKE
Переглядів 864 години тому
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: SP: ike (v1.0.1) Link: www.vulnhub.com/entry/sp-ike-v101,275/ My Twitter:@ junhua_cyber Tips: 1. A good online reverse shell generator: www.revshells.com/
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Leopold | Metasploit
Переглядів 1167 годин тому
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: SP: leopold (v1.2) Link: www.vulnhub.com/entry/sp-leopold-v12,277/ My Twitter:@ junhua_cyber Tips: 1. Spoof NBNS with Metasploit. 2. This machine involves client-side attack, which is very different other machines.
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | SolidState | Metasploit
Переглядів 679 годин тому
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: SolidState:1 Link: www.vulnhub.com/entry/solidstate-1,261/ My Twitter:@ junhua_cyber Tips: 1. POP3 commands: cs.bilkent.edu.tr/~terzi/cs421/homeworks/Fall2011_PA1v5.pdf 2. Escape from Restricted Shell: 0xffsec.com/handbook/shells/restricted-shells/
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | W34kn3ss
Переглядів 8212 годин тому
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: W34kn3ss: 1 Link: www.vulnhub.com/entry/w34kn3ss-1,270/ My Twitter:@ junhua_cyber Tips: 1. Possibly you will have problem with de-compiling pyc file, which can be solved very easily. 2. uncompyle6 translates Python bytecode back into equivalent Python source code pypi.org/project/uncompyle6/ 3. Online service for de-compiling pyc f...
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Raven 2
Переглядів 4914 годин тому
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: Raven: 2 Link: www.vulnhub.com/entry/raven-2,269/ My Twitter:@ junhua_cyber Tips: Use UDF of MySQL to elevate privilege: Relational database systems provide that flexibility and the mechanism to allow users to create their custom functions and run them natively the same way as the built-ins; they are called User Defined Functions (...
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Raven 1
Переглядів 10016 годин тому
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: Raven: 1 Link: www.vulnhub.com/entry/raven-1,256/ My Twitter:@ junhua_cyber
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Rootthis | Shell Script
Переглядів 15219 годин тому
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: Web Developer: 1 Link: www.vulnhub.com/entry/web-developer-1,288/ My Twitter:@ junhua_cyber Tips: 1. If you use sucrack to crack password of root, possibly you will get error. labs.portcullis.co.uk/tools/sucrack/ 2. Shell script is better choice in this case. 3. socat usage:(very good resource) medium.com/@ria.banerjee005/a-guide-t...
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Web Developer 1
Переглядів 10121 годину тому
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: Web Developer: 1 Link: www.vulnhub.com/entry/web-developer-1,288/ My Twitter:@ junhua_cyber Tips: 1. We need to combine different techniques to enumerate directories rather than just one. 2. Complete recap about uploading web-shell to WordPress.
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Kuya
Переглядів 39День тому
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: Kuya: 1 Link: www.vulnhub.com/entry/kuya-1,283/ My Twitter:@ junhua_cyber
Python for Security | Code Effective Port Scanner With Python
Переглядів 31День тому
Use threading module to make an effective port scanner. Use semaphore to control maximum number of concurrent threads.
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Jigsaw
Переглядів 69День тому
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: jigsaw: 1 Link: www.vulnhub.com/entry/jigsaw-1,310/ My Twitter:@ junhua_cyber
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | HackInOS | Python
Переглядів 66День тому
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: HackInOS: 1 Link: www.vulnhub.com/entry/hackinos-1,295/ My Twitter:@ junhua_cyber Tips: 1. Manipulate MIME type by adding magic header: en.wikipedia.org/wiki/List_of_file_signatures 2. Use Python to brute force file. (Requests and hashlib module) I thinks Python is more powerful than shell scripting. Very weird thing was that I sho...
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Ted | Python
Переглядів 4814 днів тому
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: Ted: 1 Link: www.vulnhub.com/entry/ted-1,327/ My Twitter:@ junhua_cyber Tips: 1. Uses hashlib and request modules of Python to crack login page. 2. Where is php session stored: File-based Storage: The session data is stored in files, usually in a directory like /tmp on Unix-like systems, or a specified directory on Windows. File Na...
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Clamp 1
Переглядів 6514 днів тому
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: CLAMP: 1.0.1 Link:www.vulnhub.com/entry/clamp-101,320/ My Twitter:@ junhua_cyber
Python for Security | Code Our Own Ping-sweeper With Python
Переглядів 7414 днів тому
Python for Security | Code Our Own Ping-sweeper With Python
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Matrix 3
Переглядів 6714 днів тому
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Matrix 3
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Matrix 2
Переглядів 8714 днів тому
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Matrix 2
CCNA | Cisco Packet Tracer | How To Add Ports To A Router
Переглядів 8814 днів тому
CCNA | Cisco Packet Tracer | How To Add Ports To A Router
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Matrix 1
Переглядів 9214 днів тому
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Matrix 1
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | DomDom 1
Переглядів 5414 днів тому
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | DomDom 1
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Pumpkin Garden
Переглядів 6221 день тому
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Pumpkin Garden
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | PumpkinRaising | Python
Переглядів 5021 день тому
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | PumpkinRaising | Python
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | unknowndevice64 1
Переглядів 7421 день тому
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | unknowndevice64 1
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | HMS
Переглядів 7521 день тому
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | HMS
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | CTF KFIOFan 2
Переглядів 7221 день тому
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | CTF KFIOFan 2
Cyber Security | Pentesting | Vulnhub | Walkthrough | CTF KFIOFan 1
Переглядів 8821 день тому
Cyber Security | Pentesting | Vulnhub | Walkthrough | CTF KFIOFan 1
Cyber Security | Pentesting | Vulnhub | Walkthrough | Silky-CTF 0x02 | Buffer Overflow
Переглядів 3728 днів тому
Cyber Security | Pentesting | Vulnhub | Walkthrough | Silky-CTF 0x02 | Buffer Overflow
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Silky-CTF 0x01
Переглядів 13328 днів тому
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Silky-CTF 0x01
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | WestWild
Переглядів 6628 днів тому
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | WestWild

КОМЕНТАРІ