Example of how the exploit is uploaded: the website is asking you for uploading a .png file and run it in the background, at the end you send the revshell.php, the website server run it while ur
2024-05-15 05:18:58
0
benitodavidrojasv :
muy bien explicado, no se les olvide abrir su propio puerto jaja
2024-05-03 17:54:45
96
Одежда JDH 💠 :
А потом 2.2.2.2 выгружает вирус на 1.1.1.1
2024-05-12 09:30:29
26
Lauty_.2023 :
entonces me está diciendo que tengo que abrir mi propio puerto con virus backdoor
2024-05-03 21:54:12
22
The omnipotent :
my fyp please stay like this
2024-06-18 21:32:22
8
Thirsty_Kraken :
what the video doesn't tell you is that the "exploit" is most commonly getting the user to click a link or open a pathway to do the attack.
2024-05-21 17:50:52
6
watchUI :
sudo rm rf / 💀💀💀
2024-05-08 04:13:51
4
joffry_& :
shell rdp Linux..
2024-05-05 20:17:03
4
Windows 95 ⚛️(ТГ-@windows_v95) :
жиза
2024-05-08 09:53:55
3
mitmitsalwaysdns :
If you want to know how to effectively to identify unknown software exploits that bypass firewalls, you need to understand how computers run software, such as the role of call gates and page tables.
2024-07-10 07:20:08
1
0x4B7570657274 ⛧ :
удалить систему? Пфф, скучно
2024-06-21 19:56:29
1
user :
splint
2024-06-13 10:02:48
1
realhinome :
1.1.1.1 is cloudflare. Cloudflare won’t attack you!
2024-05-10 14:34:00
1
Thapanik Chanoodhom :
😏😏😏
2024-07-29 08:57:57
0
Gjelsten :
Can f secure block that shi# ??
2024-07-26 17:13:57
0
SCORPION :
not work if you use nod32 anti virus or anti malware byte
2024-07-25 03:15:15
0
Cyber days101010 :
Yeah in our case metasploit or as we call the RAT msfvenom
2024-07-24 13:02:47
0
Jairo Suntaxi C. :
👍🤣
2024-07-23 00:23:45
0
To see more videos from user @nextkoolhacks, please go to the Tikwm
homepage.