How did you find the IP address you use for attack ?
@null_1065Ай бұрын
Very interesting to see the use of namebuster, ZAP, shellz, and villain C2. Thanks for share!
@ohmsohmsohms2 ай бұрын
Nice vid :D
@0xAkash_Sarkar5 ай бұрын
Could you make a video for NS takeover?
@revdamage94305 ай бұрын
The certificate enum part is missing was it esc8 ?
@_4ndr34z5 ай бұрын
Correct. esc8😊
@null_10655 ай бұрын
I hope you are able to make more windcorp boxes sir, this video is very informative
@SolitaryElite5 ай бұрын
why is bro so quiet 😭
@_4ndr34z5 ай бұрын
There’re should be audio on this one?
@SolitaryElite5 ай бұрын
@@_4ndr34z yes :))
@SolitaryElite5 ай бұрын
pretty nice to see ur still working on this thing
@JNET_Reloaded Жыл бұрын
nice ty
@Delexjarkol Жыл бұрын
Hi, first of all nice video. But I have question, in wich part of the document do u insert the \\IPResponder oexist? Best regards!!
@_4ndr34z Жыл бұрын
Thanks. I create a header with an image object. You can see it in my POC: GitHub.com/4ndr34z/ntlmthief
@petarsimovic5628 Жыл бұрын
It is on German, is there some tutorial you followed for this ?
@PenAce Жыл бұрын
An excellent tool, great work 👌🏼
@null_1065 Жыл бұрын
macos nc doesn't notify on incoming connections, that's interesting
@brandonfontaine2852 жыл бұрын
Hi, could you explain more what is being done?
@samfisher84262 жыл бұрын
thx ,informative video ,even tho i just found this information 5 min before watching the video ,would be glad if i saw it earlier ,would safe my time hahaha
@0dayCTF2 жыл бұрын
Amazing work! #BDESquad
@0dayCTF3 жыл бұрын
I'd love to show Microsoft how dangerous this actually is!