It's kinda amazing that msf is still actively updating its payload database, rather than phased out as an archived project.
@vexed318510 ай бұрын
This was not just "an http port 80". but great tutorial, keep it going❤
@TudarHimis10 ай бұрын
This is the real thing i was looking for. Great tutorial
@shamelessone19878 ай бұрын
needed this example. class lecture just skimmed over the vulnerability. Thanks man
@strongisland4081 Жыл бұрын
Very good tutorial. Excellent presentation. Can't wait to see future tutorials.
@Hussein-nz4is Жыл бұрын
Great job man, Thanks for the lesson
@olafaps58208 ай бұрын
saved my life with this video thanks boss!!!!!
@multitaskprueba18 ай бұрын
Fantastic! You are a genius! Thank you for your video!
@unknownboi908411 ай бұрын
Nice video man. Keep up the work.
@Anupambiswas-r1m3 күн бұрын
After scanning, you need to brute force the posts that most likely contain passwords from that site.
@steph-se2yw10 ай бұрын
Not many employees can do that at their work
@Muzzcraftandhandmade Жыл бұрын
Informative video upload more videos like this ❤
@Charchar4372 ай бұрын
what if php doesnt pop up after running metaploit??
@snessdalhou Жыл бұрын
No payload configured, defaulting to php/meterpreter/reverse_tcp I get this when I try to select the php_cgi arg injection, any help?
@CreativityRealized11 ай бұрын
I've been trying to figure out your issue....but try entering the "lhost" with the host IP address before running the running the injection and see if the error is fixed. Depending on your situation, you may need to even set a payload. Good luck!
@oni-tj8df8 ай бұрын
said the same thing for me but i typed "use 0" and it worked
@SleepyGameFacts12 күн бұрын
@@CreativityRealizedIt's a payload error. Using this on an external IP address requires port forwarding in order to launch the reverse shell. Your example was an internal IP on your network
@brandonlienhart1229 ай бұрын
Pro tip don’t copy and paste the payload you could ran “use 0” which is nice when browsing multiple options on your aux search
@Glock7254 ай бұрын
word
@ojochegbe_ Жыл бұрын
Great job brother ❤
@JeremyAbreuReyes5 ай бұрын
UMGC pentest class?
@TheMsGayle Жыл бұрын
Thanks for sharing!!
@YohansKesteАй бұрын
hello can you help me about hack and about Kali linux please ?
@Hermesfurie2 ай бұрын
Nice tutorial but i have a question if you can see this If i use an actual running website ip address that has 80 opened would it work?🤔
@JamalIs-h5xАй бұрын
Probably
@mangohush594610 ай бұрын
I appreciate you. Thank you.
@angleritamlegam5 ай бұрын
bagaimana jika terhalang firewall unutk phpinfo?
@slotdemogacors10 ай бұрын
mine is msf6 and cant got error
@nanabrightatsiatorme134810 ай бұрын
Great 👍 👌 ....more stuff
@paulrheinert10 ай бұрын
You can type 'use {index}' for using the exploit
@clariseastimbom62338 ай бұрын
i tried that but i kept getting a failed to loas module kind of message. would you know why
@paulrheinert8 ай бұрын
Maybe metasploit isn't up to date. What Linux distribution do you use and how did you install metasploit? If you are on Debian or Ubuntu, msfupdate should work
@serenitysscape6 ай бұрын
Awesome 😊
@OfficialSethro10 ай бұрын
Good content
@darkzone589310 ай бұрын
What kind of kali is this please
@swag231510 ай бұрын
if you are refering to the desktop environment it looks like Gnome
@theFabz10 ай бұрын
Great job
@lenovorafiq10 ай бұрын
Which version of Kali Linux are you using?
@Hooah420610 ай бұрын
Looks like gnome desktop interface and the basic version of Kali but all including the live and vm version all are the same
@thatniqqakevin6445 ай бұрын
Hey bro I'm having some trouble with and assignment is there anyway you could reach out to me and give me some help please
@awm_500810 ай бұрын
how th is this video not down
@helloworld93499 ай бұрын
good job
@khankk97233 ай бұрын
Good one
@orca216210 ай бұрын
Nice !
@RaGhav363 Жыл бұрын
Bruh make few vedios on SMTP ftp ssh vnc smb and at last MySQL and postgres
@CreativityRealized Жыл бұрын
Thanks, I needed some new ideas for videos.
@ntrq10 ай бұрын
nice bro
@_z3r0day Жыл бұрын
very nice
@lennymoore244310 ай бұрын
you saved my fucking life broski.
@wnnbh Жыл бұрын
We want more. xD
@shahjahan899710 ай бұрын
What is the purpose of this for ???
@Dmove310 ай бұрын
Promote world peace
@JeremyAbreuReyes5 ай бұрын
its for a class.
@DjehutimasAsarRa3 ай бұрын
Gold
@JamalIs-h5xАй бұрын
You could have just typed use 0 u didn't have to copy and paste
@Dingus_Grease Жыл бұрын
Wicked
@BossModeGod10 ай бұрын
No clue whats going on here. How can i make sure im bot being exploited by this ?
@swag231510 ай бұрын
if you keep everything updated this won't work, what he is doing in the video rarely works in any real life scenario and relies on exploits that are several years old
@BossModeGod10 ай бұрын
@@swag2315 good news i hope
@K1Secure Жыл бұрын
upload more vdos bro
@CreativityRealized Жыл бұрын
Working on it!
@brunosantos38523 ай бұрын
Base64 is not and i guess never ever was the standard encryption mode or method to mask a shadow file with Hashes, seems like you've added purposely those strings coded using Base64 for an easy job! No problem for educational purpose, but if you wanna simulate a more realistic environment that's not the right way!
@sunrose891310 ай бұрын
more
@mwlulud299510 ай бұрын
Bro php is < 8 version and your ubuntu is 5.10 haha veryyyyyyyyyyy old exploit
@Hunter-x3b9 ай бұрын
Hi please hack ip that you never know before
@ZarakKhan-h3j10 ай бұрын
script kiddie
@bozhdiarjordanov63533 ай бұрын
where can i learn real shit
@manwitduhplan3 ай бұрын
Brother in Christ as salty as this may make you msf is a tool like any other and it's not as straight forward as you think script kiddies are much worse when it comes to ripping code and don't tend to have a understanding or grasp what there doing this is low level yes
@manwitduhplan3 ай бұрын
But it can always be worse
@nejarmparmolle516110 ай бұрын
2 mount ago 💀
@GeorSing4 ай бұрын
My name terorisme hacker cyber Indonesian virus Trojan server nginux and spam internet Department Pertahananan Republik Indonesian system digerd Inc Indonesian