This is such a brilliant and mature real-world breakdown of some of the things that most of us take for granted. You explain the technical exploit in the context of the, "relatable person". This is rare and I can't wait to see the next one.
@jesperjensen2933 жыл бұрын
It looks really neat, I love the video. it's easy to see how word is a weak software when it comes to this. how would you deploy a keylogger? I think the tricky part is to mail it to someone without getting detected by the mail-systems antivirus ? it looks like it's a constant battle for making the malware FUD and the anti virus to detect it. I still think a keylogger and sniffing are some of the most powerfull tools around. but from I know of it's very hard to deploy a keylogger, even by this word trick, windows will block it straight away and stop it from starting automatically with windows.
@TheCocoaDaddy3 жыл бұрын
Great video! I have a question: have their been many or any systems, connected to the Internet, that could *not* be compromised or exploited? I would be interested in hearing some experiences of failed hacking attempts and learn more about how the various techniques were effectively thwarted. Thanks for posting!
@kn0xxpopul1293 жыл бұрын
Great work as always
@treehouseconstituents64022 жыл бұрын
release those magnificent locks
@Name-zo2ts3 жыл бұрын
Nice pls do more of this
@vava-lw9ds3 жыл бұрын
finally non blinker and head shaker meet
@sotecluxan42213 жыл бұрын
Saved everything.
@1999theskullcrack3 жыл бұрын
I liked and learnt :)
@zuberkariye22993 жыл бұрын
I always missed the stream!
@lp89693 жыл бұрын
Why do software companies prioritize convenience over security?
@patrickmylifemyrules2 жыл бұрын
Because it's convenient.
@Micky-dr7th3 жыл бұрын
well explained
@RicondaRacing3 жыл бұрын
So this is what it's like inside the matrix
@jimtafsigma66393 жыл бұрын
really cool ,i enjoyed it
@patrickdee73653 жыл бұрын
Cody i wished you would go more in depth on this, maybe a different time? As in this is all quite basic and the stuff you discuss is exactly what I would want to see, especially defense-evasion.
@ptyaru3 жыл бұрын
I am just starting with networking can you suggest me a good WiFi network adapter for beginners?
@kalima55083 жыл бұрын
how about a class on how to bypass IDS
@royalraghucreations56993 жыл бұрын
Please 🙏 can you say about how can I access a phone/ get info of that phone using only mobile number 😭😭😭 please can you please say
@Rightly_Divided3 жыл бұрын
Seeing this work on a local network is cool and all, but why does no one ever show how this works across a WAN and not just a LAN
@maharshi28562 жыл бұрын
Hi sir can you please how to mobile hacking in start to end please explain I'm your new subscriber sir
@b.93993 жыл бұрын
Kevin I know that's a poke at me bro.l'd like some help.
@WallaceRoseVincent3 жыл бұрын
Would an instance of linux and wine prevented the successful attack?
@sebastien73823 жыл бұрын
French subtitle pls :(
@pashtoonlinezdakra95952 жыл бұрын
Hello sir How to jam cell phone signal on kali And, How to hack fb account Sir I wait your reply