Great explanation of your thought process and tools used 🤖
@tsuryu6 ай бұрын
thank you for the walkthrough!
@tech-with-joe2 ай бұрын
Nice, loved it good explanation!
@jm19816 ай бұрын
Awesome work as always my friend.
@_CryptoCat6 ай бұрын
Thanks mate! 👊
@adasadasoc11346 ай бұрын
thanks for note Palestine and respect it, big love Crypto❤
@_CryptoCat6 ай бұрын
💜💜💜
@aaasambik34345 ай бұрын
Cryptocat, could you pls shoot walkthrough web challenges from downunder 2024 ctf
@_CryptoCat5 ай бұрын
Didn't play this weekend, sorry! 💜
@HopliteSecurity5 ай бұрын
Amazing work! 👏👏
@_CryptoCat5 ай бұрын
Thank you! 👊
@samaawake6 ай бұрын
The video is awesome! I've learn a lot of ideas and skills. By the way, Could you please introduce the script qtunnel that you used to connect the local web service to the public network? I would like to have a useful tool like that.
@_CryptoCat6 ай бұрын
Thanks! So `qtunnel` is just a bash alias which calls tunnelto (tunnelto.dev) with my specified subdomain and port, while the `webup` command is `python3 -m http.server 80` I use tunnelto because it allows me to reuse the same address, but it has a yearly fee. Previously I just used a free alternative like ngrok (you can run `ngrok http 80` to achieve the same) or requestbin
@samaawake6 ай бұрын
@@_CryptoCat Thanks for your help. I learned how to use ngrok for Intranet Penetration and achieved the same results as shown in the video. Your patient explanations were very helpful for me as a CTF beginner, thank u again!!!❤❤❤
@_CryptoCat6 ай бұрын
Awesome! No problem 💜
@WtfAnupam6 ай бұрын
Cool, learned something new :))
@Lazy0ben4 ай бұрын
great job
@_CryptoCat4 ай бұрын
Thank you! 💜
@sqlihunter4 ай бұрын
Crypto Cat, could you please create a series on Hacking Hub CTF? It's based on real-world bug bounty scenarios . ;)
@_CryptoCat4 ай бұрын
Been meaning to do this for sure! Some great labs on there.
@ssetdragon6 ай бұрын
Awesome
@ABDOE_MARKETING6 ай бұрын
akasec 1337 morroco do a great job , free palestine