Thank you man, that's exactly what I needed. Very clearly explained and well demoed. Thumbs-up.
@msclips69424 жыл бұрын
Dude please continue what you're doing, please make a video on how to start with exploit writing. Had enough of buffer overflow
@vishalsharmahacks4 жыл бұрын
Best Explanation i have got on youtube. keeo it up..
@hexzer20724 жыл бұрын
You do great work... I'm loving your tutorials... Keep it up 😇😇
@michaelebi59814 жыл бұрын
Nice video🔥!You deserve more subs!
@locaboy336 Жыл бұрын
Thanks for the detail explanation
@alexandermoev93954 жыл бұрын
great video dude super educational
@ksurya40734 жыл бұрын
Great tutorial...keep posting these...also please make some tutorial on finding bufferoverflow in gui apps aswell
@CatchDi4 жыл бұрын
Lifesaver - great tutorial.
@ernestomoreno43043 жыл бұрын
One question, what version of the cloud me and windows you're using for this example? Thank you!
@inspirationeveryday11754 жыл бұрын
your very EXCELLENT
@quantum46914 жыл бұрын
What you do at 15:14? Is the red shellcode the bufferstart,or what is it and how you generate it.
@Hackrypt4 жыл бұрын
it's a hex format of 688dd4ed in reverse. see from 14:01
@abhradeepbanerjee12862 жыл бұрын
I get a connection refused msg... not sure whats wrong. :/
@ivena4 жыл бұрын
Hi, can I know based on what you choose this port? Is there rule?
@rafaelmendez38133 жыл бұрын
Damn! I can almost done all the exercise, but at the end, can´t connect to 4455. The last exploit excecutes (the one with the sheellcode) but does nothing! I cant reach the reverse shell
@ernestomoreno43043 жыл бұрын
I run all the script and get till the end but instead of getting access to the application, the application closes, whys this could be happening?
@aungkyawphyo40694 жыл бұрын
Nice Channel 🎉
@0xp4ul4 жыл бұрын
🔥🔥🔥🔥please make lot video sir
@djnikx14 жыл бұрын
Top!! Cheers!
@faisalmansoor73344 жыл бұрын
What version of Cloud Me are you using?
@Hackrypt4 жыл бұрын
1.7.1
@ngeeannboiii85543 жыл бұрын
Hi sir. I run the exploit.py but nothing happened. i followed the steps and have correct cloudme 1.7.1. waht happened.
@ngeeannboiii85543 жыл бұрын
ok nvm sir. for those out there, dont forget to press the play button in ur immunity debugger if nothing comes out. just realised theres a breakpoint automatically set.
@chebalid75244 жыл бұрын
Hey... Suppose we are attacking a remote windows server we dont have access to. Anyway you can remotely tell if the stack has been over written .. And if the EIP has been over written successfully.
@Hackrypt4 жыл бұрын
One way is by crashing the application but the exploit are developed in a sandbox environment for specific version of application, then used against the target.
@saheelfaldesai2214 жыл бұрын
How did you come to know which port is being used by the application?