boardlight is a retired machine, so you're good based under their stuff. Ill take a whack at the machine then come to this video if I get stuck
@JohnDoeSecКүн бұрын
I had to reupload cuz I got hit with a copyright strike lol It's all good now though
@Free.Education7862 күн бұрын
How to find all hidden endpoints and parameters to test SQLI XSS LFI RFI RCE. Thanks
@JohnDoeSec2 күн бұрын
Hello, So Nuclei can actually find these exploits in a website If thats what ur referencing to, or ur sharing a video idea haha
@spdnova90122 күн бұрын
what desktop enviorement is this
@JohnDoeSec2 күн бұрын
Im not exactly sure, but If im not wrong, it's the full version of BlackArch Linux BlackArch Slim looks just like normal linux
@jpg1s1773 күн бұрын
Keep going man! Nice video
@JohnDoeSec3 күн бұрын
Thank You!
@yudiokta58813 күн бұрын
Bisa minta tolong kak 🥹🙏 saya habis kena penipuan w
@yudiokta58814 күн бұрын
Bisakah anda mnolong kami kak kami habis kena penipuan 🙏🥹
@AhhshshseuKhirfan4 күн бұрын
woah thanks~!
@JohnDoeSec4 күн бұрын
No problem!
@PancakrV8 күн бұрын
Watched this cause I didn't see -u as an option, guess it was just hiding lol
@JohnDoeSec8 күн бұрын
haha
@JohnDoeSec8 күн бұрын
Sometimes --help is more detailed than -h
@jpg1s1778 күн бұрын
Nice video!
@JohnDoeSec8 күн бұрын
Thank You!
@poocyx11 күн бұрын
great explanation
@JohnDoeSec10 күн бұрын
Thank You!
@FrankCastleThePunisher66611 күн бұрын
I had Kali 2014 in started to learn it, but for some reason drifted away from it. I have upgraded to 2024 and this video was extremely clear and concise. No waffle or jargon. I shall certainly be checking out your full course. Thank you!
@JohnDoeSec11 күн бұрын
Thank You so much And good luck! If you would like to see specific content, let me know!
@FrankCastleThePunisher66611 күн бұрын
@@JohnDoeSec i shall let you know once i’ve taken time to go through the course!
@hotbotato328215 күн бұрын
more vid of this ,keep up👋
@JohnDoeSec14 күн бұрын
Let me know what you would like to see
@xand.r16 күн бұрын
thankyou for this
@JohnDoeSec15 күн бұрын
@Flantn.1919 күн бұрын
Hey Can we connect via Discord?
@JohnDoeSec18 күн бұрын
Drop me a message on Twitter @JohnTech2023
@moonlightsoldier844321 күн бұрын
Yeah hand picked tools will always win out i will say some of the best hackers iv known have used black arch not really for me though i used to swesr by parrot os but switch to kali and just import my own tools into it plus i lile its app armor
@exohive560828 күн бұрын
Path traversal to RCE or just straight RCE via webshell? How do you test?
@JohnDoeSec28 күн бұрын
That was a straight RCE through webshell. You can test file-upload vulnerabilities through just uploading files and seeing what you can upload and can't upload.
@IOSARBXАй бұрын
GR1FF1N, You're the best! I just had to subscribe!
@JohnDoeSecАй бұрын
Thank You! <3
@dr_wolf4180Ай бұрын
thnx bro ^^
@JohnDoeSecАй бұрын
@Soccera0Ай бұрын
What's the point of running su as root?
@JohnDoeSecАй бұрын
I was copying commands so most likely I made a mistake, forgive me :P it makes no difference tbh
@WagaTousoАй бұрын
I did find some interesting things. But none that were sensitive
@JohnDoeSecАй бұрын
@@WagaTouso keep looking! You will find something!
@usra2023Ай бұрын
Thanks bro
@JohnDoeSecАй бұрын
@skeeterstudies8109Ай бұрын
My target still doesn't allow php file upload. How do I upload php file as png or jpg
@JohnDoeSecАй бұрын
So what you can try to do is -Bypass HTTP Client Side Verification with Burpsuite -Run through Blacklist/Whitelist -Double extensions And much more, I can recommend checking out OWASP for more Info
bypassing windows smartscreen what method did you use? i normally try using a dll injector.
@BlueDippyАй бұрын
Corny as hell, just get arch and install packages you need…
@TrialSky-b6pАй бұрын
GR1ff1N I have a question to ask I'm noob btw and love your video a lot but when I create a payload with it and transfer it to my smartphone it didn't install and in older android version it install but it says it made for older version... I try many thing but didn't actually solve the problem can you please tell me what's the cause of the problem and solution please ❤
@JohnDoeSecАй бұрын
What you should check is, if the payload is compatible with the version of your phone. I don’t really specialise in Mobile Testing so thats the first thing that I came up with :/
@EugeneLight-nc5shАй бұрын
i downloaded the guest addition image but some of the commands are not displaying like yours
@JohnDoeSecАй бұрын
Did you follow the steps I took? Unless something changed Im 99% confident it still works
@AirgplaysАй бұрын
Just use nmap
@MaplePie-g3f2 ай бұрын
I'm getting the error: unable to locate package linux-headers-6.6.15-amd64
@JohnDoeSec2 ай бұрын
Did you insert the Guest Additions Image?
@beshtawi10372 ай бұрын
Haha is it possible to extract someones ip from facebook messenger?
@JohnDoeSec2 ай бұрын
The easiest way is to send them a link that tracks IP.
@_1.a12 ай бұрын
here is a fun video idea for you explain basic networking in minevraft terms
@JohnDoeSec2 ай бұрын
Thats actually a great idea XD thanks!
@_1.a12 ай бұрын
@@JohnDoeSec welcome
@nimbleduck2 ай бұрын
im doing a software engineering program right now in college. Do you think I could get a cyber security or hacking related job if I learn the skills? I am insanely interested in hacking but everytime I try to start I always feel like i am doing something wrong or I am at the wrong place to learn.
@JohnDoeSec2 ай бұрын
You learn by failing :P Signup to TryHackMe for free, do some levels and see if you like it. If you do, then I can suggest switching to cybersecurity.
@beni83132 ай бұрын
this vid will blow up in some days (also what do you use hacking for?)
@JohnDoeSec2 ай бұрын
Thanks! And what do you mean I use hacking for?
@beni83132 ай бұрын
@@JohnDoeSec like what do you hack or why are i intrested in it
@JohnDoeSec2 ай бұрын
@@beni8313 I was actually always interested in hacking and something I would like to do.
@beni83132 ай бұрын
@@JohnDoeSec do you have discord i have some questions if you could give i would appreciate it
@JohnDoeSec2 ай бұрын
You can contact me on Twitter as that's my main point of contact. @JohnTech2023
@theapplejuicecarton2 ай бұрын
should a person have basic computer knowledge for example the knowledge/content covered in the COMPTIA A+ like what is a NIC what is RAM etc etc
@CyberSan70542 ай бұрын
if you don't know what something is or how it works, how can you hack it!?
@douglasmontiel93132 ай бұрын
This channel is soooo underrated. Diamond in the rough.
@JohnDoeSec2 ай бұрын
Thank You so much
@root-j3v2 ай бұрын
to me when i execute the command sh ./Vbox... it does say the same things as you, but when i try to drag and drop from host to vm, or copy and paste from host to vm, or the other way it doesnt let me do it, it shows me an error " check guest additions " and i do have enabled the options: drag and drop, shared clipboard both bidirectional
@JohnDoeSec2 ай бұрын
Did you insert the VBox Guest Additions Image?
@diegomartinez33052 ай бұрын
❤
@basedalexej22672 ай бұрын
Viewed only few videos but love your channel and i hope i will have time to watch more.
@JohnDoeSec2 ай бұрын
@SlaxerMan2 ай бұрын
Yoo bro
@JohnDoeSec2 ай бұрын
Whats up?
@asparawi2 ай бұрын
Hey mate, I followed your tutorial but I'm running into two issues with rcvboxadd quicksetup all: first, I can't find rcvboxadd in /sbin as expected-grep couldn't locate it there. Any idea why? Also, just so you know, I'm using VirtualBox 7.02 and installed the Pre-built Virtual Machines for Kali Linux.
@JohnDoeSec2 ай бұрын
Did you install the VM Guest Additions? (Insert Guest Additions Image) sorry for my late response, some of the comments don't pop up straight away :P
@EugeneLight-nc5shАй бұрын
i follow through with the process and had same issue as he did despite installing the guest addition image @@JohnDoeSec
@riccardofarina29932 ай бұрын
where can I learn those things
@JohnDoeSec2 ай бұрын
That's a very basic exploitation using a Metasploit Framework. if you want to exploit with Metasploit, you just need to find a vulnerable version/server. To learn exploitation manually, it's a different story, you need skills and knowledge.
@rahuldixit39512 ай бұрын
Bro, you are a genius!!! Thanks a lot man
@JohnDoeSec2 ай бұрын
No problem!
@mrgutsy51732 ай бұрын
part 2
@JohnDoeSec2 ай бұрын
part 2 as in?
@Bombexploid342 ай бұрын
i did some google dorking but when i find site exposed with password or username i don't do anything like download the files off the expose site as it not ethical
@megadave66852 ай бұрын
try "inurl: target admin"
@TanzilKurniawan2 ай бұрын
good explanation thank you
@JohnDoeSec2 ай бұрын
@icqueservices2 ай бұрын
90% of your video is stock footage, please change this