Another 12 minutes of pure talent. Please continue with the Priv esc series Conda
@c0nd43 жыл бұрын
Will do! Thank you for the kind words!
@ca79863 жыл бұрын
Yeah please consider making more on Windows priv esc
@c0nd43 жыл бұрын
More should be coming soon 😁
@ca79863 жыл бұрын
@@c0nd4 ❤️👌🌟
@TalsonHacks3 жыл бұрын
Let's make this a series! A really awesome and clear way of explanation. Thank you for posting!
@c0nd43 жыл бұрын
Thank you! Glad you liked it!
@sajidshamir3 жыл бұрын
i love the way you explain things, loud and clear, will be thankful if you consider pass the hash, pass the ticket, over pass the hash, some kerborous attack, psexec, and llmnr, nbtdns on windows and few more attack..
@c0nd43 жыл бұрын
Thank you! I do plan on covering those on the domain that we set up before. Stay tuned!
@vaibhavbhavsar85502 жыл бұрын
Bro you are a really good teacher i like the way you teach Love from india
@c0nd42 жыл бұрын
Thank you very much!
@montala33802 жыл бұрын
Hi Conda, How to create a vuln service as in your demo?
@tt-fx6nt2 жыл бұрын
0:48 wmic service get name, startname, pathname 4:45 msfvenom -p windows/adduser USER=backdoor_admin PASS=PleaseSub! -f exe > service.exe Hi Brandon, great video as always. However the font is very small, probably you can zoom it in to make it easy to be read. Thanks and keep up the good work.
@c0nd42 жыл бұрын
Thanks for the feedback! I've tried to adjust this in newer videos to make it easier to see.
@jaybailey2163 жыл бұрын
Wow I never knew msfvenom had an adduser option although I probably should have 😂! That's awesome! Great video!
@c0nd43 жыл бұрын
Thanks! I didn't know about that option for a while either, but it's a game changer for sure.
@jaybailey2163 жыл бұрын
@@c0nd4 yeah it is! That would've helped on my first attempt!
@razaabbas56682 жыл бұрын
Hey are you planning to do the review on OSEP? I want to know how an OSCP person can get OSEP
@scout17s173 жыл бұрын
Really nice Video thank you 👍🏽
@c0nd43 жыл бұрын
No problem 😁
@sajidshamir3 жыл бұрын
Great work.. ya need to see some more..
@c0nd43 жыл бұрын
Thank you! I do plan on making more soon
@ajaykumark1073 жыл бұрын
Please make more videos
@davidfishwick55736 ай бұрын
I can't think of a single service that allows a standard user the permission modify the executable file.
@c0nd46 ай бұрын
I've seen this many times in real life engagements and bug bounty programs. You'd be surprised.