After scanning, you need to brute force the posts that most likely contain passwords from that site.
@darrienjenkinsdj8 күн бұрын
So lets say im testing one of my laptops, “student 1” would be “root” for me right? Im confused on why once you get into the system you have to crack hashes please reply back asap 😂 i subbed too
@darrienjenkinsdj8 күн бұрын
U got s sub my boi
@KooLaidStudios25 күн бұрын
so I need to use openvas to get the password?
@JamalIs-h5xАй бұрын
You could have just typed use 0 u didn't have to copy and paste
@YohansKesteАй бұрын
hello can you help me about hack and about Kali linux please ?
@Charchar4372 ай бұрын
what if php doesnt pop up after running metaploit??
@Hermesfurie2 ай бұрын
Nice tutorial but i have a question if you can see this If i use an actual running website ip address that has 80 opened would it work?🤔
@JamalIs-h5xАй бұрын
Probably
@brunosantos38523 ай бұрын
Base64 is not and i guess never ever was the standard encryption mode or method to mask a shadow file with Hashes, seems like you've added purposely those strings coded using Base64 for an easy job! No problem for educational purpose, but if you wanna simulate a more realistic environment that's not the right way!
@khankk97233 ай бұрын
Good one
@Mieayamhidrogen3 ай бұрын
After i wrote "smbclient //ip address target/tmp" there's no more options like you in the video and then i keep forward and when i type "cd rootfs" the status is "STATUS_OBJECT_NAME_NOT_FOUND" did i do wrong?
@DjehutimasAsarRa3 ай бұрын
Gold
@GeorSing4 ай бұрын
My name terorisme hacker cyber Indonesian virus Trojan server nginux and spam internet Department Pertahananan Republik Indonesian system digerd Inc Indonesian
@angleritamlegam5 ай бұрын
bagaimana jika terhalang firewall unutk phpinfo?
@thatniqqakevin6445 ай бұрын
Hey bro hope you're doing well I'm having some trouble with an assignment and I was hoping you could help me out is there anyway we can get in contact please let me know
@thatniqqakevin6445 ай бұрын
Hey bro I'm having some trouble with and assignment is there anyway you could reach out to me and give me some help please
@JeremyAbreuReyes5 ай бұрын
UMGC pentest class?
@serenitysscape6 ай бұрын
Awesome 😊
@WeAreLegion6 ай бұрын
Man we need more videos. Where you at? Upload some new videos lol.
@olafaps58208 ай бұрын
saved my life with this video thanks boss!!!!!
@shamelessone19878 ай бұрын
needed this example. class lecture just skimmed over the vulnerability. Thanks man
@Roufin123338 ай бұрын
2:56 how do you know the password of the target? is there any default password or something please reply😀
@multitaskprueba18 ай бұрын
Fantastic! You are a genius! Thank you for your video!
@brandonlienhart1229 ай бұрын
Pro tip don’t copy and paste the payload you could ran “use 0” which is nice when browsing multiple options on your aux search
@Glock7254 ай бұрын
word
@Hunter-x3b9 ай бұрын
Hi please hack ip that you never know before
@helloworld934910 ай бұрын
good job
@ntrq10 ай бұрын
nice bro
@darkzone589310 ай бұрын
What kind of kali is this please
@swag231510 ай бұрын
if you are refering to the desktop environment it looks like Gnome
@vexed318510 ай бұрын
This was not just "an http port 80". but great tutorial, keep it going❤
@slotdemogacors10 ай бұрын
mine is msf6 and cant got error
@jeliazkozlatev394010 ай бұрын
The video name is kind of misleading. I would name it -> Metasploit: Exploit PHP CGI arg injection and dictionary password cracking via John the Ripper.
@paulrheinert10 ай бұрын
You can type 'use {index}' for using the exploit
@clariseastimbom62338 ай бұрын
i tried that but i kept getting a failed to loas module kind of message. would you know why
@paulrheinert8 ай бұрын
Maybe metasploit isn't up to date. What Linux distribution do you use and how did you install metasploit? If you are on Debian or Ubuntu, msfupdate should work
@awm_500810 ай бұрын
how th is this video not down
@sunrose891310 ай бұрын
more
@BossModeGod10 ай бұрын
No clue whats going on here. How can i make sure im bot being exploited by this ?
@swag231510 ай бұрын
if you keep everything updated this won't work, what he is doing in the video rarely works in any real life scenario and relies on exploits that are several years old
@BossModeGod10 ай бұрын
@@swag2315 good news i hope
@shahjahan899710 ай бұрын
What is the purpose of this for ???
@Dmove310 ай бұрын
Promote world peace
@JeremyAbreuReyes5 ай бұрын
its for a class.
@nejarmparmolle516110 ай бұрын
2 mount ago 💀
@mr.researcher152510 ай бұрын
Sir, how did u install this kali unsable version , help me
@orca216210 ай бұрын
Nice !
@tommymairo896410 ай бұрын
It's kinda amazing that msf is still actively updating its payload database, rather than phased out as an archived project.
@assassinabhishek757910 ай бұрын
sir why aint you're using the latest kali?
@stupafi363310 ай бұрын
Preference I guess
@assassinabhishek757910 ай бұрын
@@stupafi3633 maen. for the sake of kernel
@mangohush594610 ай бұрын
I appreciate you. Thank you.
@mwlulud299510 ай бұрын
Bro php is < 8 version and your ubuntu is 5.10 haha veryyyyyyyyyyy old exploit
@lenovorafiq10 ай бұрын
Which version of Kali Linux are you using?
@Hooah420610 ай бұрын
Looks like gnome desktop interface and the basic version of Kali but all including the live and vm version all are the same
@tyronebas778210 ай бұрын
I have been going through your videos.Thank you for the information.Please do more
@steph-se2yw10 ай бұрын
Not many employees can do that at their work
@ZarakKhan-h3j10 ай бұрын
script kiddie
@bozhdiarjordanov63533 ай бұрын
where can i learn real shit
@manwitduhplan3 ай бұрын
Brother in Christ as salty as this may make you msf is a tool like any other and it's not as straight forward as you think script kiddies are much worse when it comes to ripping code and don't tend to have a understanding or grasp what there doing this is low level yes