Ephraisto - i really like the greek accent - thanx for the video from Palermo, Sicily
@d-ledgityt2 ай бұрын
wow!! i was overwhelmed by that technical stuff awesome video
@Clips4392 ай бұрын
Amazing video Good explanation!
@phpeteur2 ай бұрын
great work. thanks. Long live your channel
@ElectroBytes-SS2 ай бұрын
wooooow bro good explain
@newbie28012 ай бұрын
Mantap❤
@ShlyokiDimitrovАй бұрын
i bought your course and have problem with one of the thinks i tryed to find support but its says that i can open a thicket in your forum
@Rejan8132 ай бұрын
Cool
@serialkiller87832 ай бұрын
when are you coming back with similar tut but with mitigations turned on in windows and using sth like ROP chains to bypass DEP and ASLR. that would be more fun ! looking forward to!
@Anirbansinha242 ай бұрын
Tell me one thing, both the attacker and victim machines were in LAN or a different network as a vm setup?
@chessmambo2 ай бұрын
Leave it to Zaid to come up with some amazing content and instructors
@Dc_money2 ай бұрын
Dimitris 😍😍
@SyedKhalandar8055Ай бұрын
Hi bro I want your help in learning ethical hacking, I'm learning it from your course but I have completed only 3 classes in that you have showed that how to use virtualbox for the uses of multiple os but I have installed virtualbox application and after that I have downloaded kali os from your official site but I can't install it in the virtualbox application, so that's why I want your help
@SyedKhalandar8055Ай бұрын
Please reply me because I want to learn ethical hacking
@reloadya11 күн бұрын
Put file into virtual disk drive and boot
@QuickNuggetsTm0Ай бұрын
Can u teach us reverse engineering copy program and change name, photo like creating new program?
@Anirbansinha242 ай бұрын
For a real life scenario - how do I know what services are installed in a victim machine if he's outside lf LAN (in MAN or WAN).?
@L.E.G.E.N.D00001Ай бұрын
Hi I need ur help please 🙏
@JagatrmJagat27 күн бұрын
I'm your subscriber I'm from India I'm not understand English language I understand hindi language
@serialkiller87832 ай бұрын
sth doesnt click, target is to control EIP, we identify payload size that is able to cause the crash, we then identify EIP offset from the payload, till here makes sense. you used mona to search for jmp instructions assembly that doesnt have termination chars, it found 9, why did you use the 1st one? also q2, if the payload size was normal(no crash), the program would have used function epiloge instructions from strcmp to resume to execution after successful copying?? what was mona exact purpose after knowing the offset?
@Saqibtyppist-q1f2 ай бұрын
I am interested in hacking you can teach me
@MemoriesInsideMe2 ай бұрын
what does that suppose to mean? can you not write like an idiot
@MemoriesInsideMeАй бұрын
What is he doing in the video? Dancing?
@mrwolfWW2 ай бұрын
I want to be a great hat
@comosaycomosah2 ай бұрын
A fedora or boulder or cowboy?
@Blackibangalore2 ай бұрын
Yo subscribe them
@BOMBICKA1Ай бұрын
FREE ISRAEL
@JagatrmJagat27 күн бұрын
I'm your subscriber I'm from India I'm not understand English language I understand hindi language
@Legalhelp08 сағат бұрын
Learn english first
@JagatrmJagat27 күн бұрын
I'm your subscriber I'm from India I'm not understand English language I understand hindi language