- 738
- 102 303
Junhua Wong
United States
Приєднався 9 сер 2013
Cyber security, pentesting, Python for security
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | digitalworld DEVELOPMENT
Pentesting Lab Exercises Series - Vulnhub
Virtual Machine Name: digitalworld.local: DEVELOPMENT
Link: www.vulnhub.com/entry/digitalworldlocal-development,280/
My Twitter:@ junhua_cyber
Tips:
1. This machine involves escaping different type of restricted shell.
Virtual Machine Name: digitalworld.local: DEVELOPMENT
Link: www.vulnhub.com/entry/digitalworldlocal-development,280/
My Twitter:@ junhua_cyber
Tips:
1. This machine involves escaping different type of restricted shell.
Переглядів: 43
Відео
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | SP IKE
Переглядів 864 години тому
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: SP: ike (v1.0.1) Link: www.vulnhub.com/entry/sp-ike-v101,275/ My Twitter:@ junhua_cyber Tips: 1. A good online reverse shell generator: www.revshells.com/
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Leopold | Metasploit
Переглядів 1167 годин тому
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: SP: leopold (v1.2) Link: www.vulnhub.com/entry/sp-leopold-v12,277/ My Twitter:@ junhua_cyber Tips: 1. Spoof NBNS with Metasploit. 2. This machine involves client-side attack, which is very different other machines.
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | SolidState | Metasploit
Переглядів 679 годин тому
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: SolidState:1 Link: www.vulnhub.com/entry/solidstate-1,261/ My Twitter:@ junhua_cyber Tips: 1. POP3 commands: cs.bilkent.edu.tr/~terzi/cs421/homeworks/Fall2011_PA1v5.pdf 2. Escape from Restricted Shell: 0xffsec.com/handbook/shells/restricted-shells/
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | W34kn3ss
Переглядів 8212 годин тому
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: W34kn3ss: 1 Link: www.vulnhub.com/entry/w34kn3ss-1,270/ My Twitter:@ junhua_cyber Tips: 1. Possibly you will have problem with de-compiling pyc file, which can be solved very easily. 2. uncompyle6 translates Python bytecode back into equivalent Python source code pypi.org/project/uncompyle6/ 3. Online service for de-compiling pyc f...
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Raven 2
Переглядів 4914 годин тому
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: Raven: 2 Link: www.vulnhub.com/entry/raven-2,269/ My Twitter:@ junhua_cyber Tips: Use UDF of MySQL to elevate privilege: Relational database systems provide that flexibility and the mechanism to allow users to create their custom functions and run them natively the same way as the built-ins; they are called User Defined Functions (...
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Raven 1
Переглядів 10016 годин тому
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: Raven: 1 Link: www.vulnhub.com/entry/raven-1,256/ My Twitter:@ junhua_cyber
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Rootthis | Shell Script
Переглядів 15219 годин тому
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: Web Developer: 1 Link: www.vulnhub.com/entry/web-developer-1,288/ My Twitter:@ junhua_cyber Tips: 1. If you use sucrack to crack password of root, possibly you will get error. labs.portcullis.co.uk/tools/sucrack/ 2. Shell script is better choice in this case. 3. socat usage:(very good resource) medium.com/@ria.banerjee005/a-guide-t...
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Web Developer 1
Переглядів 10121 годину тому
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: Web Developer: 1 Link: www.vulnhub.com/entry/web-developer-1,288/ My Twitter:@ junhua_cyber Tips: 1. We need to combine different techniques to enumerate directories rather than just one. 2. Complete recap about uploading web-shell to WordPress.
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Kuya
Переглядів 39День тому
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: Kuya: 1 Link: www.vulnhub.com/entry/kuya-1,283/ My Twitter:@ junhua_cyber
Python for Security | Code Effective Port Scanner With Python
Переглядів 31День тому
Use threading module to make an effective port scanner. Use semaphore to control maximum number of concurrent threads.
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Jigsaw
Переглядів 69День тому
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: jigsaw: 1 Link: www.vulnhub.com/entry/jigsaw-1,310/ My Twitter:@ junhua_cyber
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | HackInOS | Python
Переглядів 66День тому
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: HackInOS: 1 Link: www.vulnhub.com/entry/hackinos-1,295/ My Twitter:@ junhua_cyber Tips: 1. Manipulate MIME type by adding magic header: en.wikipedia.org/wiki/List_of_file_signatures 2. Use Python to brute force file. (Requests and hashlib module) I thinks Python is more powerful than shell scripting. Very weird thing was that I sho...
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Ted | Python
Переглядів 4814 днів тому
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: Ted: 1 Link: www.vulnhub.com/entry/ted-1,327/ My Twitter:@ junhua_cyber Tips: 1. Uses hashlib and request modules of Python to crack login page. 2. Where is php session stored: File-based Storage: The session data is stored in files, usually in a directory like /tmp on Unix-like systems, or a specified directory on Windows. File Na...
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Clamp 1
Переглядів 6514 днів тому
Pentesting Lab Exercises Series - Vulnhub Virtual Machine Name: CLAMP: 1.0.1 Link:www.vulnhub.com/entry/clamp-101,320/ My Twitter:@ junhua_cyber
Python for Security | Code Our Own Ping-sweeper With Python
Переглядів 7414 днів тому
Python for Security | Code Our Own Ping-sweeper With Python
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Matrix 3
Переглядів 6714 днів тому
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Matrix 3
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Matrix 2
Переглядів 8714 днів тому
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Matrix 2
CCNA | Cisco Packet Tracer | How To Add Ports To A Router
Переглядів 8814 днів тому
CCNA | Cisco Packet Tracer | How To Add Ports To A Router
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Matrix 1
Переглядів 9214 днів тому
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Matrix 1
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | DomDom 1
Переглядів 5414 днів тому
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | DomDom 1
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Pumpkin Garden
Переглядів 6221 день тому
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Pumpkin Garden
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | PumpkinRaising | Python
Переглядів 5021 день тому
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | PumpkinRaising | Python
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | unknowndevice64 1
Переглядів 7421 день тому
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | unknowndevice64 1
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | HMS
Переглядів 7521 день тому
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | HMS
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | CTF KFIOFan 2
Переглядів 7221 день тому
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | CTF KFIOFan 2
Cyber Security | Pentesting | Vulnhub | Walkthrough | CTF KFIOFan 1
Переглядів 8821 день тому
Cyber Security | Pentesting | Vulnhub | Walkthrough | CTF KFIOFan 1
Cyber Security | Pentesting | Vulnhub | Walkthrough | Silky-CTF 0x02 | Buffer Overflow
Переглядів 3728 днів тому
Cyber Security | Pentesting | Vulnhub | Walkthrough | Silky-CTF 0x02 | Buffer Overflow
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Silky-CTF 0x01
Переглядів 13328 днів тому
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | Silky-CTF 0x01
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | WestWild
Переглядів 6628 днів тому
Cyber Security | Ethical Hacking | Pentesting | Vulnhub | Walkthrough | WestWild
❤
Thanks
Nice 👍🏻
Appreciate the support!
I am here.😁😁😁
Thanks
👍
Thanks, dear friend.
I am here.😁😁😁
Thanks, dear friend.
Thanks for your support all the time.
very good Tutorial , THX man 😀✌
Glad you liked it!
@@junhuawong1419 youre welcome 🙂
Pls man in next video just speak loudly 🙏
noted.
top
Thanks
👍
Thanks
看你的id像华人 我按照你方法使用msf去非法字符登录 但是我使用&cmd=id时 bp返回的是只有日志 就是说原本它还会返回html那些代码 但使用了&cmd只有日志文件内容 怎么解决😔
说明shell code没有成功写入日志文件,检查一下shell code本身有无问题。
I am here.😁😁😁
Thanks a lot.
👍
Thanks
I am here.😁😁😁
Thanks a lot.
Sensei
Thanks
I am here.😁😁😁💗💗💗
Thanks
👍
Thanks
Sensei I have a question, when you go to /the_real_secret_dir/ you think that image is some kind of encryption but how do you find out what kind of encryption it is and then go and check out the decryption site, I have tried to send that image to ai so that he can tell me what kind of encryption language it is but he doesn't know that either
fantastic!!
Appreciate the feedback!
I am here.😁😁😁💗💗💗
Great guy
Thank you for your video
Thank for your support all the time.
I am here.😁😁😁💗💗💗
Thanks
Thank you for your video
Glad you found it helpful!
The teacher's explanations have very clear logic and are very rewarding!
Thanks for the feedback, I appreciate it!
Great one. Let’s go❤❤❤
Thanks , I will.
👍
Thank you.
I am here.😁😁😁💗💗💗
Thanks
Hello @Davidlu1003. I can see you are also passionate. Do u wanna connect?
nice!
Thanks!
need help i have a question on the video Did you download the machine separate and let it run while your Kali linux machine running same time
You mean download the image of the machine from Vulnhub while your Kali is running at the same time? I don't think this will be a problem.
@@junhuawong1419 yes i did that but it is asking for username and password and i don't no it help me if you no Sir thank you
@@computer1steam317 Very weird thing. Could send screenshots to my email: junhua.wong.2013@gmail.com
Brilliant as always ❤❤❤❤.
Thanks for your support.
👍
Thanks
ERROR 2026 (HY000): TLS/SSL error: Validation of SSL server certificate failed
Could you change to use different browser?
Where did the "nmap_full_scan" file come from?
I understand, thanks, it's great.
To save the time of video, I usually did scan before recording the video . We can use option of "-oN" to save output into the file.
I am here.😁😁😁
Great, thanks
I am here.😁😁😁
Thanks
Nice
Thanks
Thank you for your continued video.
You're welcome.
topppppppppppppppppppp continueeee
Thanks, I will.
nice explanation
Glad you liked it!
I am here.😁😁😁
Thanks
Thank you for your video
You are welcome
Thank you
You're welcome
❤❤❤. Fantastic video.
Glad you enjoyed it
Thank you!
You're welcome!
It’s just called cyber ctf I guess my lecturer made the machine.. I tried all I know but still couldn’t solve it
Sometimes ctf is very difficult. We could put it to a side for a while and maybe it can be done later. such as the machine I did today (jigsaw).
@@junhuawong1419thank you so much I watched all your videos and it is well explained thank you
Thank you junhua you really helped me with your videos I am a cybersecurity student. I was given an assignment on ctf sad I still couldn’t solve it.
Is it Clamp?
@@junhuawong1419 it’s just called cyber ctf
@@junhuawong1419I posted the Nmap result, I did dirb, I did gobuster, I did Nikto but still without any results
I am here.😁😁😁
Your supports are always driving me . Thanks.
💪😎
Thanks
I am here.😁😁😁
Great.
Thank you for your video
Thanks for watching!
I will do this practice today.😁😁😁
Great.
@@junhuawong1419 Your videos are great!!! Thx, master.😁😁😁