How Hackers Compromise Other Users
Вставка
- Опубліковано 23 лис 2023
- jh.live/snyk || Try Snyk for free and find vulnerabilities in your code and applications! ➡ jh.live/snyk
More Fetch the Flag writeups: jh.live/ftf-writeups
Free Cybersecurity Education and Ethical Hacking
🔥UA-cam ALGORITHM ➡ Like, Comment, & Subscribe!
🙏SUPPORT THE CHANNEL ➡ jh.live/patreon
🤝 SPONSOR THE CHANNEL ➡ jh.live/sponsor
🌎FOLLOW ME EVERYWHERE ➡ jh.live/discord ↔ jh.live/twitter ↔ jh.live/linkedin ↔ jh.live/instagram ↔ jh.live/tiktok
💥 SEND ME MALWARE ➡ jh.live/malware
John, not just the content of your channel are great but too your way of teach
Great vid as always, John and congrats on a MILLY! You da man!!
Hey John can you make some solution videos for the Huntress CTF?
really loved the competition, would love to see some of it's solutions!
Nice lesson, thanks John.
It must have been patched on Debian 12 because this exploit doesn't work on my system.
Most things John post's are patched exploit hacks. If John finds exploits he usually reports it to the proper organization before making a video of it. Other than that he finds already patched exploits to make a video on.
WOW. Thank you
Great video John! I don't think I'll ever do hands-on technical videos anymore... I will never do them as good as you 😅
Big props to the editor! Ps: consider removing all the commas and periods on the captions!
Is no one using the CC feature from UA-cam? Personally I think it's very annoying if you can't turn them off (when they're embedded in the video)
It helps with retention, specially in the beginning of a video@@AhegaHOE And I don't think everyone uses the autogenerated captions
@DavidAlvesWeb yeah I understand but remember that they don't have to be autogenerated, as a creator you can easily upload your own.
John, how do you mitigate these type of risks?
Always the best.
Beautiful.
thank u so much
thank you
Enjoyed the video. I was trying try hack me and was in the priviledge escalation module for linux and then i was trying to make a poc about setuid when i was learning linux and was trying to see if i can make a bash script that i can run with uid 0 just like passwd command but i failed on that as i was trying to access a file made by root user which my simple can not read, write or execute but with the bash script it just shows out that output as it runs with uid zero. i failed as i was using bash commands and i think i shloud be using a c++ code to make the executable for my requirement to happen. Would really appreciate it you can maybe do some fun stuff like that.
Is this different from business logic vulnerability ? if so, how ?
Someone correct me but this looks similar to Microsoft's/Windows verison called "Sysinternals"?
Nice nice!
Off topic here John, but how can you explore the dark web, without 'images' that are definitely illegal getting cached on your PC?
I recently saw an older video of yours showing how to use a dark web search engine, but you had to blur images on the video because of 'under 18' content being sold, or shown, and that was just on a search engine (banner ads), without going to that particular site.
This, in my country would be highly illegal, and I don't want any of that content on my PC.
Is there a way you could do a guide or show how you could look at the dark web, or Tor sites, without having these images etc sent to your PC, or is that just part of going on the dark web? Is there a way to use a browser that you can stop it displaying any images for instance? Or does the Tor browser have any reliable addons such as adblock?
I am studying computer science and would like to broaden my knowledge, but not if there is a chance I will see that stuff, or worse still end up on a register.
*as a side note, if you do any further videos on the dark web etc, you might want to inform people that just receiving these images to your screen (even in a banner ad) can in some countries be illegal and get you severe penalties.
If u cannot figure this out as a compsci student I recommend transferring to Communications or somethinf hahaha
@@maalikserebryakov very constructive.
nice
There is so many ways to hack someone.
cool!!!
Cool🎉
Ayyy lets learn muahaha!
It's not called "tac" it's dash or a minus.
Tac (or tack) is military slang for a dash.
So why don't they patch find exploits?
I think because they are side effects of things that are generally useful and there are ways to lock things down so that these exploits are not possible.
Exploits either purposeful or mistake. Most times theyre reported before patched
To many words
First :D
Brother, you are a very good person. I like you very much Enter the realm of Islam. And become Muslims. There is nothing wrong with reading books on Islam. Watching will change your life. Preach to yourself and your friends. Explain this to yourself and your friends. You will find the teachings of Islam very interesting. By accepting Islam, you will find peace of mind. You have to think about what I said while sitting alone. Your life will change.
I left Islam when i was 12
How do you still believe this Cope 💀
Lol😂
Brother, you are a very good person. I like you very much Enter the realm of Arch Linux. And become Arch user. There is nothing wrong with reading Arch Wiki. Watching will change your life. Preach to yourself and your friends. Explain this to yourself and your friends. You will find the teachings of Arch very interesting. By accepting Arch, you will find pacman -Syu. You have to think about what I said while sitting alone. Your life will change.
@@FistoBlitzkriegAmen.
@@maalikserebryakovtuff guess you wasn’t guided
it's called etc, not etcetera.... please don't learn noobs the wrong terminology!
@@omgboy4939 the etc directory is actually pronounced et-see. while it does mean etcetera, the jargon would be etc. just like we don't call the cat program concatenate, even though it is actually concatenate.
Document from Bell Labs, /etc is referred to as the etcetera directory,[4] as this directory historically held everything that did not belong elsewhere
[4] J. DeFelicc (17 March 1972). "E.0". Preliminary Release of UNIX Implementation Document (PDF). p. 8. IMO.1-1.