Web Exploitation - Full Course (9+ Hours)

  Рет қаралды 77,269

hexdump

6 ай бұрын

Upload of the full Web Exploitation course.
All the material developed for the course is available in the OSCP repository, link down below.
----
TIMESTAMPS
######### Web 00 - Introduction
00:00:00 Web Exploitation Course
######### Web 01 - Introduction to Web Exploitation
00:03:17 Introduction
00:05:37 Clients and Servers
00:07:37 The HTTP Protocol
00:11:47 HTML
00:17:00 CSS
00:18:57 JavaScript and the DOM
00:23:00 Web Applications
00:29:07 Overview so far
00:30:47 HTTP is stateless
00:32:57 On Malicious HTTP requests
00:35:39 Introduction to BurpSuite
00:40:03 Using BurpSuite
00:48:02 A first vulnerability
00:52:42 Conclusion
######### Web 02 - Getting Used to BurpSuite
00:54:32 Introduction
00:55:52 Initial Setup
01:07:57 Installing PortSwigger CA certificate
01:12:12 Starting the web application
01:13:02 Configuring the scope
01:19:22 Proxy interception
01:23:27 Repeater
01:28:12 Decoder
01:30:32 Comparer
01:31:32 Analyzing cookie structure
01:36:32 Intruder
01:40:28 Sequencer
01:41:32 Dashboard
01:43:22 Extensions
01:45:32 Conclusion
######### Web 03 - SQL Injection
01:47:03 Introduction
01:50:18 Databases and Structured Query Language (SQL)
02:03:43 Simple queries
02:09:33 Interpreters
02:14:18 Injections
02:17:45 Example 1 - PHP Snippet
02:25:33 Example 2 - DVWA easy
02:37:13 Example 3 - DVWA medium
02:40:47 Example 4 - SecureBank
######### Web 04 - Directory Traversal
02:48:08 Introduction
02:49:53 Tomcat Setup
02:57:48 Static Web Application
03:02:08 Dynamic Web Application with JSP
03:03:48 Fuzzing with wfuzz to discover parameter
03:07:48 Analyzing the disclosed stacktrace
03:10:53 A simple Directory Traversal
03:16:03 A more complex Directory Traversal
03:20:58 Directory Traversal in SecureBank
03:26:58 Conclusion
######### Web 05 - File Inclusion
03:28:03 Introduction
03:29:55 Example 1 - LFI with JSP
03:46:13 Example 2 - LFI with php
03:57:53 Example 3 - RFI with php
04:03:03 Example 4 - DVWA challenges
04:12:53 Example 5 - Leak source code with php filters
######### Web 06 - File Upload Vulnerabilities
04:17:49 Introduction
04:19:29 Explanation of lab
04:24:11 POST request to upload a file
04:29:29 Reading php code
04:37:49 Solving level 1
04:43:41 Solving level 2
04:47:14 Solving level 3
04:56:31 PortSwigger Academy lab 1
05:00:56 PortSwigger Academy lab 2
05:02:33 PortSwigger Academy lab 3
05:08:27 Conclusion
######### Web 07 - Command Injections
05:09:31 Introduction
05:10:46 Some Intuition on Command Injections
05:16:36 DVWA level low
05:32:06 DVWA level medium
05:38:46 DVWA level high
05:40:34 DVWA level impossible
05:45:26 Port Swigger Lab 1
05:49:26 Port Swigger Lab 2
05:53:26 Port Swigger Lab 3
05:59:06 Conclusion
######### Web 08 - Cross Site Scripting
06:00:07 Introduction
06:03:07 Client-side attacks
06:06:42 Stored XSS - Intuition
06:18:07 Stored XSS - Leaking session cookie
06:25:47 Reflected XSS - Intuition
06:30:27 Reflected XSS - Leaking session cookie
06:33:37 DOM XSS
06:41:32 Review so far
06:43:12 Conclusion
######### Web 09 - Enumeration of Files and Directories
06:45:54 Introduction
06:48:54 Docker lab setup
06:50:34 Intuition on Web Enumeration
06:58:59 Using gobuster
######### Web 10 - Enumeration of Virtual Hosts
07:21:11 Introduction
07:24:44 Intuition on virtual hosts
07:46:41 Virtual Hosts and Domain Names
######### Web 11 - Enumeration of Parameters
07:51:16 Introduction
07:56:51 Wfuzz
08:21:46 IDOR
######### Web 12 - Brute Force Attacks
08:28:26 Introduction
08:30:50 Brute Forcing Scenarios
######### Web 11 - DNS Zone Transfer Attacks
09:01:26 Difference between VHOST and DNS
09:07:51 DNS zone transfer in practice
----
REFERENCES
- OSCP repository: github.com/LeonardoE95/OSCP
----
CONTACTS
- Blog: blog.leonardotamiano.xyz/
- Github: github.com/LeonardoE95?tab=repositories
- Support my Work: www.paypal.com/donate/?hosted_button_id=T49GUPRXALYTQ

Пікірлер: 121
@amortalbeing
@amortalbeing Ай бұрын
TIMESTAMPS ######### Web 00 - Introduction 00:00:00 Web Exploitation Course ######### Web 01 - Introduction to Web Exploitation 00:03:17 Introduction 00:05:37 Clients and Servers 00:07:37 The HTTP Protocol 00:11:47 HTML 00:17:00 CSS 00:18:57 JavaScript and the DOM 00:23:00 Web Applications 00:29:07 Overview so far 00:30:47 HTTP is stateless 00:32:57 On Malicious HTTP requests 00:35:39 Introduction to BurpSuite 00:40:03 Using BurpSuite 00:48:02 A first vulnerability 00:52:42 Conclusion ######### Web 02 - Getting Used to BurpSuite 00:54:32 Introduction 00:55:52 Initial Setup 01:07:57 Installing PortSwigger CA certificate 01:12:12 Starting the web application 01:13:02 Configuring the scope 01:19:22 Proxy interception 01:23:27 Repeater 01:28:12 Decoder 01:30:32 Comparer 01:31:32 Analyzing cookie structure 01:36:32 Intruder 01:40:28 Sequencer 01:41:32 Dashboard 01:43:22 Extensions 01:45:32 Conclusion ######### Web 03 - SQL Injection 01:47:03 Introduction 01:50:18 Databases and Structured Query Language (SQL) 02:03:43 Simple queries 02:09:33 Interpreters 02:14:18 Injections 02:17:45 Example 1 - PHP Snippet 02:25:33 Example 2 - DVWA easy 02:37:13 Example 3 - DVWA medium 02:40:47 Example 4 - SecureBank ######### Web 04 - Directory Traversal 02:48:08 Introduction 02:49:53 Tomcat Setup 02:57:48 Static Web Application 03:02:08 Dynamic Web Application with JSP 03:03:48 Fuzzing with wfuzz to discover parameter 03:07:48 Analyzing the disclosed stacktrace 03:10:53 A simple Directory Traversal 03:16:03 A more complex Directory Traversal 03:20:58 Directory Traversal in SecureBank 03:26:58 Conclusion ######### Web 05 - File Inclusion 03:28:03 Introduction 03:29:55 Example 1 - LFI with JSP 03:46:13 Example 2 - LFI with php 03:57:53 Example 3 - RFI with php 04:03:03 Example 4 - DVWA challenges 04:12:53 Example 5 - Leak source code with php filters ######### Web 06 - File Upload Vulnerabilities 04:17:49 Introduction 04:19:29 Explanation of lab 04:24:11 POST request to upload a file 04:29:29 Reading php code 04:37:49 Solving level 1 04:43:41 Solving level 2 04:47:14 Solving level 3 04:56:31 PortSwigger Academy lab 1 05:00:56 PortSwigger Academy lab 2 05:02:33 PortSwigger Academy lab 3 05:08:27 Conclusion ######### Web 07 - Command Injections 05:09:31 Introduction 05:10:46 Some Intuition on Command Injections 05:16:36 DVWA level low 05:32:06 DVWA level medium 05:38:46 DVWA level high 05:40:34 DVWA level impossible 05:45:26 Port Swigger Lab 1 05:49:26 Port Swigger Lab 2 05:53:26 Port Swigger Lab 3 05:59:06 Conclusion ######### Web 08 - Cross Site Scripting 06:00:07 Introduction 06:03:07 Client-side attacks 06:06:42 Stored XSS - Intuition 06:18:07 Stored XSS - Leaking session cookie 06:25:47 Reflected XSS - Intuition 06:30:27 Reflected XSS - Leaking session cookie 06:33:37 DOM XSS 06:41:32 Review so far 06:43:12 Conclusion ######### Web 09 - Enumeration of Files and Directories 06:45:54 Introduction 06:48:54 Docker lab setup 06:50:34 Intuition on Web Enumeration 06:58:59 Using gobuster 07:02:49 Scenario 1 - Directory Enumeration 07:05:41 Scenario 2 - Files Enumeration 07:09:54 Review so far 07:12:37 Scenario 3 - Custom 404 page 07:18:39 Conclusion ######### Web 10 - Enumeration of Virtual Hosts 07:21:11 Introduction 07:21:56 Docker lab setup 07:24:44 Intuition on virtual hosts 07:30:11 Host header in HTTP requests 07:34:11 Enumeration of virtual hosts 07:38:04 Using gobuster 07:40:21 How to access virtual hosts 07:46:41 Differences between Virtual Hosts and Domain Names 07:49:11 Conclusion ######### Web 11 - Enumeration of Parameters 07:51:16 Introduction 07:53:06 Docker lab 07:56:51 Wfuzz scenario 1 - discovery of parameter name 08:12:26 Wfuzz scenario 2 - discovery of debug parameter 08:15:21 Wfuzz scenario 3 - discovery of parameter value 08:21:46 Insecure Direct Object Reference (IDOR) 08:24:16 Wfuzz scenario 4 - sending requests to burpsuite 08:26:31 Wfuzz scenario 4 - discovery of POST data 08:28:00 Conclusion ######### Web 12 - Brute Force Attacks 08:28:26 Introduction 08:30:50 Scenario 1 - Brute Forcing SSH 08:43:42 Scenario 2 - Brute Forcing FTP 08:48:01 Scenario 3 - Brute Forcing HTTP Basic Auth 08:50:56 Scenario 4 - Brute Forcing DVWA login 08:57:26 Conclusion ######### Web 11 - DNS Zone Transfer Attacks 08:58:16 Introduction 09:01:26 Difference between VHOST and DNS 09:06:11 What is a DNS zone transfer? 09:07:51 DNS zone transfer in practice 09:12:31 Final Overview 09:14:16 Conclusion copied from description for ease of use!
@hexdump1337
@hexdump1337 Ай бұрын
Thank you so much, in the following days I will take the time to fix the timestamps so that they can be used directly within the player. Appreciate this!
@chamodmalshan4708
@chamodmalshan4708 6 ай бұрын
Never stop doing these videos because i learn so much from you. Thank you
@hexdump1337
@hexdump1337 6 ай бұрын
Oh no worries, this is just the start!
@musprodev
@musprodev Ай бұрын
Fr
@HarshYadav-jv7nr
@HarshYadav-jv7nr Ай бұрын
@@hexdump1337 great bro! killer video on youtube !
@dgt.diaries
@dgt.diaries Ай бұрын
Sir, im only 35minutes in and you officially are my first mentor... the way you explain things so simply to beginners is MAGICAL ... although i already knew some things before but you reintroduced them to me in a new amazing way.... please never stop teaching us ur ways we need people like you !!
@hexdump1337
@hexdump1337 Ай бұрын
Thank you, this means a lot to me! I will do my best to help you.
@Mary-le5db
@Mary-le5db Ай бұрын
This is what I NEED, a real pentest on a test website. NOT those long 2hours live then they're just doing recon.
@hexdump1337
@hexdump1337 Ай бұрын
Thank u for letting me know! In the future will try to bring even more full WAPTs (that is web pentests) on vulnerable apps 👍🏻
@Kanny-b9v
@Kanny-b9v Ай бұрын
You Also need the 33hours cyber sec courses too my friend they are good for more stability in cyber. Yeah this one is short and sweet
@Mary-le5db
@Mary-le5db Ай бұрын
@@Kanny-b9v where to watch?
@hakeem1340
@hakeem1340 29 күн бұрын
The world is better place with people like you, thank you for sharing this informative course
@hexdump1337
@hexdump1337 28 күн бұрын
That's precious to hear!
@SaidElnaffar
@SaidElnaffar 5 ай бұрын
Quality video -- This will be my summer study plan!
@mongstyt9946
@mongstyt9946 5 ай бұрын
The hero we needed
@omoregiestephen2949
@omoregiestephen2949 5 ай бұрын
A thousand and one likes man. I love the pace if your teaching. I'm a complete newbie, but your coverage of the concepts, has drawn me to study with this course. +1 Sub
@hexdump1337
@hexdump1337 5 ай бұрын
thank you so much!
@shaca1856
@shaca1856 Ай бұрын
I haven't watched it but I subscribed and liked this vid. Hoping to watch this on my free time. Thank you for this stuff 😊
@hexdump1337
@hexdump1337 Ай бұрын
Thanks for the trust, I’m sure it’s gonna be useful, in case let me know your feedback!
@romass1955
@romass1955 6 ай бұрын
It's a gold mine! Amazing content as always.
@dummydummy-o7g
@dummydummy-o7g Ай бұрын
GODDDD THANKYOU I WILL WATCH IT ALLL !
@drelaylo
@drelaylo Ай бұрын
just getting started with this course. i will let keep you updated
@drelaylo
@drelaylo Ай бұрын
what text editor do you use to take notes??
@hexdump1337
@hexdump1337 Ай бұрын
Emacs
@nico3006
@nico3006 19 күн бұрын
bro 9 hours this is a goldmine
@hexdump1337
@hexdump1337 18 күн бұрын
I tried to fill all these hours with meaningful content, I hope you get something out of it!
@rana_g
@rana_g Ай бұрын
loved it .. learned a lot ... thank you !
@plashless3406
@plashless3406 2 ай бұрын
Woh woh woh, wait a sec, this is so awesome. Thank you soo soo much.
@golgappa3430
@golgappa3430 Ай бұрын
Terrific , amazing, hats off to your efforts 💢❤💥💫
@JohnAlli-tn3vy
@JohnAlli-tn3vy 6 ай бұрын
I always enjoy your content. They all amazing. I wish you could make a video on how to create a custom wordlist for directory and file brute-forcing.
@hexdump1337
@hexdump1337 5 ай бұрын
I will take not of the idea and maybe make something in the future! Thanks for the suggestion.
@MrWeb4live
@MrWeb4live Ай бұрын
I love the video so much. Thanks a lot for sharing
@StudiofrogPl
@StudiofrogPl 5 ай бұрын
Rly nice content, you are very good teacher, very clear and concise explanations. I learn a lot. Thank You for your work.
@elguero933
@elguero933 5 ай бұрын
Very good presentation my man! You are a superb teacher
@EthioFkir
@EthioFkir 5 ай бұрын
why this video have only 21K views.....very awesome lecture bro pls keep doing
@hexdump1337
@hexdump1337 5 ай бұрын
Thanks! Hopefully more people will be able to learn from it!
@accessgroup06
@accessgroup06 3 ай бұрын
Great stuff mate. Cheers for some nice videos!
@carlosrofts5230
@carlosrofts5230 2 ай бұрын
This is great man, thanks a lot. You have a new follow now 💚
@hexdump1337
@hexdump1337 2 ай бұрын
thanks ♥️
@maalalahanin0876
@maalalahanin0876 6 күн бұрын
Great video man
@matcap2010
@matcap2010 5 ай бұрын
Lavoro erculeo. Congratulazioni e saluti dal Brasile!
@x7dl8p
@x7dl8p 6 ай бұрын
nice video, learned docker thanks to you !, suggest best free cyber security certification.
@carlalexander3343
@carlalexander3343 5 ай бұрын
Amazing stuff, many thanks, keep going, best regards
@giftebenezer2040
@giftebenezer2040 23 күн бұрын
@hexdump do you have videos on webshells, convering samurai & mutillidae among other tools used for webshell detection, mitigation and prevention?
@hexdump1337
@hexdump1337 23 күн бұрын
not yet, however I will take your suggestions for future material, thank you very much for askin!
@giftebenezer2040
@giftebenezer2040 23 күн бұрын
@@hexdump1337 Much appreciated for your swift response. Would you refer me to someone who can help me prepare for a technical test in webshells?
@derletztetiger6860
@derletztetiger6860 5 ай бұрын
Sick content brah! Keep it coming
@tylerfarrell8748
@tylerfarrell8748 5 ай бұрын
Great video! Keep up the good work. Subscribed.
@hexdump1337
@hexdump1337 5 ай бұрын
Thanks!
@thariachanz9298
@thariachanz9298 5 ай бұрын
Simply amazing ❤
@dub161
@dub161 2 ай бұрын
Thanks this was really helpful.
@ashajyothimallya8202
@ashajyothimallya8202 Ай бұрын
great work..Thank you
@Jayseeram03
@Jayseeram03 Ай бұрын
Bro this is gold 🥇🥇🥇🥇🥇🥇🥇🥇🥇
@Some-z2p
@Some-z2p 27 күн бұрын
what are the pre-requites for this video? I don't have knowledge in networking
@hexdump1337
@hexdump1337 27 күн бұрын
For following this series it is required to have a basic understanding of network protocols. In the future content like that is planned, as of right now however I’m focusing on the windows privilege escalation series
@matthewlawry5785
@matthewlawry5785 2 ай бұрын
Hey Leo, awesome video!! What is your terminal setup? Is this like a terminal emulator extension of Emacs or something?
@hexdump1337
@hexdump1337 2 ай бұрын
Yes, it is called vterm, it is a library which is integrated within an emacs lisp package! Thanks for the feedback
@EsTeh_Manis2
@EsTeh_Manis2 4 ай бұрын
thanks for education sir🙏
@Mr.Legend_9
@Mr.Legend_9 4 ай бұрын
Love your video
@ajaxmaxxer
@ajaxmaxxer 5 ай бұрын
Amazign content Pr Leonardo ! Thank you so much for what you do :)
@djawadboutemine7522
@djawadboutemine7522 Ай бұрын
i can't find the repo of the securebank to clone and run localy , any help ?
@hexdump1337
@hexdump1337 Ай бұрын
Should be this one, there is a docker deployment github.com/ssrdio/SecureBank
@djawadboutemine7522
@djawadboutemine7522 Ай бұрын
The Goat​@@hexdump1337
@ayaswanthsaisimhareddy2791
@ayaswanthsaisimhareddy2791 Ай бұрын
I can't able see localhost in http history in burpsuite
@hexdump1337
@hexdump1337 Ай бұрын
its probably a configuration of your browser. Typically they dont proxy traffic from localhost. You can either disable it with the appropriate command line (I show this at the beginning of the web exploitation series where I talk about burpsuite), or you can configure a custom entry in your /etc/hosts that points to 127.0.0.1, like say “example 127.0.0.1”, so that when you go to example it will actually proxy the traffic
@nonenone2760
@nonenone2760 5 ай бұрын
Great great great 🔥🔥😍
@sang4005
@sang4005 Ай бұрын
Cool one
@sabuein
@sabuein 2 ай бұрын
Thank you.
@ferasalfarsi897
@ferasalfarsi897 6 ай бұрын
Thank you for the video I have a question, please Are these topics cover some certifications content? Like what you did with OSCP?!
@hexdump1337
@hexdump1337 6 ай бұрын
sort of yeah, if u study well all these concepts, then you are ready for OSCP in terms of the web part. I specifically considered OSCP requirements while making this series. And for the rest, well, this plays as a very strong foundation, so if you study all the modules well, then you can learn the stuff that is not here much much easier because of a strong background.
@JohnAlli-tn3vy
@JohnAlli-tn3vy 6 ай бұрын
Its just amazing
@beddiafmohammed6011
@beddiafmohammed6011 5 ай бұрын
what os are you using, and how you move between workspace ❤ love your videos 😊
@hexdump1337
@hexdump1337 5 ай бұрын
Using Arch as Linux distro, with Emacs running as main editor and tiling window manager with exwm. This means that most windows you see are from Emacs.
@MRROBOT-fc5ny
@MRROBOT-fc5ny Ай бұрын
3:29:57 Hi I am not able to find the php dir in your repo 3:30:27 Also couldn't find app dir
@hexdump1337
@hexdump1337 Ай бұрын
Update repository, thanks for telling me!
@praweewongsa
@praweewongsa Ай бұрын
thumpsup! 😃
@AdolfRizzler41
@AdolfRizzler41 5 ай бұрын
Perfect video for advance dev
@jackal_sniperr
@jackal_sniperr Ай бұрын
sir is this course for complete beginners? is this an web exploitation same as web penetration testing ?
@hexdump1337
@hexdump1337 Ай бұрын
I would say it requires minimal knowledge of the web and the http protocol, but in terms of penetration testing concepts yea, complete beginners can follow
@jackal_sniperr
@jackal_sniperr Ай бұрын
@@hexdump1337 thankyou so much ❤
@ahmed_bembo
@ahmed_bembo 3 ай бұрын
Hi hexdump I really want to setup my tomcat like yours but I can't and files are different coz you are using tomcat version 8 and it's version 10 can you make video of how to setup version 10
@hexdump1337
@hexdump1337 3 ай бұрын
Did you try "wget dlcdn.apache.org/tomcat/tomcat-10/v10.1.26/bin/apache-tomcat-10.1.26.tar.gz" ? The directory structure seems similar to me.
@microcodes6887
@microcodes6887 4 ай бұрын
started today
@yasincomps2056
@yasincomps2056 2 ай бұрын
I need my certification please
@twistedtruth.
@twistedtruth. Ай бұрын
Let's see how it goes i've just started the video
@hexdump1337
@hexdump1337 Ай бұрын
lemme know!
@JohnAlli-tn3vy
@JohnAlli-tn3vy 6 ай бұрын
I wish you could do one on how to create custom wordlist
@hackinguniversitydefenseat7800
@hackinguniversitydefenseat7800 Ай бұрын
Just write your desire password in word documents that is your world list
@alpeshrprajapati5159
@alpeshrprajapati5159 5 ай бұрын
What app using to show this notes in terminal please answer
@hexdump1337
@hexdump1337 5 ай бұрын
Emacs! I made a video about it already
@mashoodaliali6552
@mashoodaliali6552 6 ай бұрын
keep it up
@x7dl8p
@x7dl8p 6 ай бұрын
well I am here just for your accent !
@hexdump1337
@hexdump1337 6 ай бұрын
Can you tell I am italian? 😂
@x7dl8p
@x7dl8p 5 ай бұрын
@@hexdump1337 🤣😂 yes, well I am Indian, and we are known for our bad accent, so I will learn some other accent and that would be the Italian accent, American accent is bull shit.
@umniways
@umniways 5 ай бұрын
@@hexdump1337 yeah, it's obvious
@trungpham-gx2yg
@trungpham-gx2yg 5 ай бұрын
@@hexdump1337 dont know why i feel the 2 accent kind of similar 😂
@praneysingh1817
@praneysingh1817 5 ай бұрын
when will u upload the notes on ur github?
@hexdump1337
@hexdump1337 5 ай бұрын
The material is all online, you can find it at the following repo github.com/LeonardoE95/yt-en For each lecture theres a link to the material. I need to copy it over into the OSCP repository. But technically its already online, just on the yt-en repo. Btw, you have to check the materials of the individual videos of the series (those with Web Exploitation in the playlist, the full video right now has no material).
@praneysingh1817
@praneysingh1817 5 ай бұрын
@@hexdump1337 thnx
@GilligansTravels
@GilligansTravels 6 ай бұрын
cheers!
@КвадратныйГоблин
@КвадратныйГоблин Ай бұрын
Is this beginner-friendly?
@hexdump1337
@hexdump1337 Ай бұрын
some basic knowledge of networking is required, but other than that I try to build intuition over all the various idea that go into web exploitation. I’m particularly interested in beginners feedback, so if you find something too complex just write in the comments and I will take a note, so maybe in the future I can explain things better Good luck!
@КвадратныйГоблин
@КвадратныйГоблин Ай бұрын
@@hexdump1337 I'm good at intermediate CTF and network exploitation but I didn't go deep into the web application pentesting and trying to learn at least essentials and then practice.
@UgandanMeance
@UgandanMeance 5 ай бұрын
Man i love your accent am trying to concentrate but the accent i love it 🤣🤣🤣🤣🤣🤣🤣🤣
@hexdump1337
@hexdump1337 5 ай бұрын
Hope its not too distracting 👍🏻
@ДмитрийКузнецов-я4д
@ДмитрийКузнецов-я4д 5 ай бұрын
​@hexdump1337 as a non-native speaker your accent is perfect for me , you spell very clearly and with good pace , I understand every word that you are saying and enjoy this at the same time, thank you and keep going
@martinlastname8548
@martinlastname8548 6 ай бұрын
Gold
@Isidoosododockxkxkididid
@Isidoosododockxkxkididid 5 ай бұрын
Parli inglese da dio! Ce l hai anche in ita il corso?
@hexdump1337
@hexdump1337 5 ай бұрын
Here you can find it in italian: kzbin.info/www/bejne/fYCwg2iYiJiWaNk
@SphereofTime
@SphereofTime 5 ай бұрын
2:05:18
@arupde6320
@arupde6320 5 ай бұрын
be regular
@spdnova9012
@spdnova9012 Ай бұрын
porcoddio se si sente l’accento 😂
@spdnova9012
@spdnova9012 Ай бұрын
Ovviamente qualità assurda grande bro 🇮🇹🇮🇹🇮🇹🇮🇹
@hexdump1337
@hexdump1337 Ай бұрын
cant hide where you come from 🤣
@viresh222
@viresh222 4 ай бұрын
Sir i am not abel to understand your voice please talk slowly
@hexdump1337
@hexdump1337 4 ай бұрын
Where specifically, can you give me a timestamp?
@mcstza
@mcstza 4 ай бұрын
bro decrease the playback speed...
@BhargavSushant
@BhargavSushant 2 ай бұрын
Bhai pranayam Kara kar Isse slow bolega to janta so jaegi
2 MAGIC SECRETS @denismagicshow @roman_magic
00:32
MasomkaMagic
Рет қаралды 37 МЛН
Perfect Pitch Challenge? Easy! 🎤😎| Free Fire Official
00:13
Garena Free Fire Global
Рет қаралды 92 МЛН
Это самый популярный гаджет в мире
0:20
Глюк на моем iPhone 16 Pro Max
0:26
ТЕХНОБЛОГ ГУБАРЕВ СЕРГЕЙ
Рет қаралды 1,3 МЛН
IPhone vs sony ericsson #iphone #sonyericsson
0:12
Tech Crazy Man
Рет қаралды 4,1 МЛН
ТОП 5 САМЫХ КРОШЕЧНЫХ ГАДЖЕТОВ В МИРЕ? А ты знал, что такое вообще бывает?
0:57
Wishmaster — кибербуллинг и технологический абьюз
Рет қаралды 683 М.
Making iPhone16 pink📱
0:34
Juno Craft 주노 크래프트
Рет қаралды 25 МЛН