Тёмный
vulnmachines
vulnmachines
vulnmachines
Подписаться
Vulnmachines is an online cybersecurity training platform with real-time vulnerabilities labs that allows individuals improve their practical skills with real-world enterprise scenarios.
Certified Mobile Pentester (CMPen) - iOS
1:16
4 месяца назад
Jetbrains TeamCity Remote Code Execution
2:36
5 месяцев назад
Metabase remote code execution
3:05
10 месяцев назад
GeoServer OGC Filter SQL Injection
2:25
11 месяцев назад
ImageMagick Arbitrary File Read vulnerability
4:25
11 месяцев назад
Badge Hacking Challenge
0:34
Год назад
Комментарии
@alexandresantosal
@alexandresantosal 15 дней назад
Show
@carlosenriquediazcancino5416
@carlosenriquediazcancino5416 2 месяца назад
Si me cambia a manager pero no me deja loguearme login as no me aparece como manager solo como estudiante
@odiraaigwe8354
@odiraaigwe8354 2 месяца назад
another rubbish on the internet
@user-il8yq4po1o
@user-il8yq4po1o 4 месяца назад
Thank you
@eduardoponce3228
@eduardoponce3228 5 месяцев назад
Where do you download JNDIExploit 1.4 from?
@whoami-ty1kp
@whoami-ty1kp 7 месяцев назад
Bro music name?
@corygunz4778
@corygunz4778 9 месяцев назад
need username and password please
@Tekionemission
@Tekionemission 10 месяцев назад
Nice, I've not used burp like this before. Great to see Burp in action via directory traversal vulnerabilities. Thanks for sharing.
@massco99hacker
@massco99hacker Год назад
nice video
@8080VB
@8080VB Год назад
Machine name?
@sujatapradhan4330
@sujatapradhan4330 Год назад
It's not open in my laptop
@les7endek389
@les7endek389 Год назад
Me too did found the problem ?
@Benki.Tayaran
@Benki.Tayaran Год назад
Yeah this Work only on teacher or admin account not a student
@waquifplayz1030
@waquifplayz1030 Год назад
Patched?
@user-wr6dl7en4f
@user-wr6dl7en4f Год назад
Please my friend, what is the name of the program that you use to shoot the video
@vulnmachines
@vulnmachines Год назад
Vulnmachines
@-Madhuri-yq4ks
@-Madhuri-yq4ks Год назад
Can u send that code
@tulioerna6922
@tulioerna6922 Год назад
Already have experience but this is solid practice. Loving your site.
@alixerkmir2097
@alixerkmir2097 Год назад
Not working on site!!!
@sw4pn3h0x8
@sw4pn3h0x8 Год назад
Hi how to get the path log file?
@mxmpomr5739
@mxmpomr5739 Год назад
nice tks
@sunn007
@sunn007 Год назад
When I use burp in latest mozilla & switch on intercept , the website doesn't load . What could be the issue ?
@dentheaddelux1038
@dentheaddelux1038 Год назад
Hello. Quick questions, does this work on 1.860v, and two, can you please paste the body of the payload you have there (user=blabla...password...). Thanks
@vulnmachines
@vulnmachines Год назад
Please check description.
@abudi45
@abudi45 Год назад
Bad video 👎🤮
@mithak573
@mithak573 Год назад
good video, you provide training??
@huraraisrar4263
@huraraisrar4263 Год назад
also can u share the poc.xml file
@vulnmachines
@vulnmachines Год назад
Payload already mentioned in description
@huraraisrar4263
@huraraisrar4263 Год назад
bro where is the exploit 2 payload can u plz comment it
@abdulx01
@abdulx01 Год назад
Bro.. If I have list of urls and how can I test those all.
@crackcodes
@crackcodes Год назад
@frenzyguyz
@frenzyguyz Год назад
Manually isko kaise exploit krenge
@vulnmachines
@vulnmachines Год назад
"doAs" parameter is vulnerable so use payload in vulnerable parameter.
@AhrimanSefid
@AhrimanSefid Год назад
Please make video RCE
@vulnmachines
@vulnmachines Год назад
already created. ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-aEaIyVhXPNg.html
@vivekkashyap7293
@vivekkashyap7293 Год назад
Please make video consistently 😌
@abdulbasitolanrewajurotimi3304
did i need to install kali linux before exploitation
@Ox7H3_L1ON
@Ox7H3_L1ON 2 месяца назад
can use wsl2
@hasharmujahid1288
@hasharmujahid1288 2 года назад
NICE WORK
@AhrimanSefid
@AhrimanSefid 2 года назад
thanks. plz add dorks.
@The_One_0_0
@The_One_0_0 2 года назад
Dead
@saranshsarafmr23r06
@saranshsarafmr23r06 2 года назад
No doubt it's awesome, but what if the application rejects the url param... If that happens so the application can protect itself ! Right?
@vulnmachines
@vulnmachines 2 года назад
Yess
@yashvardhan7360
@yashvardhan7360 2 года назад
CVE 2022-22980 PoC is not available on your github
@vulnmachines
@vulnmachines 2 года назад
github.com/Vulnmachines/Spring_cve-2022-22980
@yashvardhan7360
@yashvardhan7360 2 года назад
@@vulnmachines can you also share the vulnerable instance link
@AhrimanSefid
@AhrimanSefid 2 года назад
excellent wow . can add share code.
@cybersecurity3523
@cybersecurity3523 2 года назад
Good job bro
@vulnmachines
@vulnmachines 2 года назад
Thank you so much 😀
@avexis3526
@avexis3526 2 года назад
excellent
@vulnmachines
@vulnmachines 2 года назад
Thank you! Cheers!
@bad_byte5794
@bad_byte5794 2 года назад
Keep going bro! Very useful
@adammulya8999
@adammulya8999 2 года назад
Can we grab ip Laravel sir for this method?
@AhrimanSefid
@AhrimanSefid 2 года назад
hi can share exploit
@vulnmachines
@vulnmachines 2 года назад
Write up link is in description
@AhrimanSefid
@AhrimanSefid 2 года назад
@@vulnmachines not see exploit.py
@vulnmachines
@vulnmachines 2 года назад
@@AhrimanSefid github.com/nth347/CVE-2021-3129_exploit
@pentester-ethicalhacker
@pentester-ethicalhacker 2 года назад
¡Awesome, bro!
@youshouldsee8240
@youshouldsee8240 2 года назад
First
@passaronegro349
@passaronegro349 2 года назад
,,🇧🇷🇧🇷
@bravo-6900
@bravo-6900 2 года назад
Instead of playing rave edm give us some details.
@vulnmachines
@vulnmachines 2 года назад
Please check description
@saranshsarafmr23r06
@saranshsarafmr23r06 2 года назад
That was freaking interesting, but I have few questions: 1st where can I get your jndi tool, 2nd how exactly will we know if the target was vulnerable of not I mean is there a way to get shell access?
@vulnmachines
@vulnmachines 2 года назад
Please check description
@saranshsarafmr23r06
@saranshsarafmr23r06 2 года назад
@@vulnmachines Sure thanks for the reply, can you share your linkedin (personal) I would like to connect with you
@vulnmachines
@vulnmachines 2 года назад
@@saranshsarafmr23r06 www.linkedin.com/in/punitdarji/
@bernasevinc5259
@bernasevinc5259 2 года назад
google dorks ? please
@vulnmachines
@vulnmachines 2 года назад
Haha
@saranshsarafmr23r06
@saranshsarafmr23r06 2 года назад
in the url the authenticationendpoint is dummy or it is being created by the exploit? and the vulnmachines.jsp is a shell file which is being uploaded ?
@vulnmachines
@vulnmachines 2 года назад
Authenticationendpoint is f"../../../../repository/deployment/server/webapps/authenticationendpoint webapps endpoint and vulnmachines.jsp is shell which is uploaded using exploit file.
@saranshsarafmr23r06
@saranshsarafmr23r06 2 года назад
@@vulnmachines Thanks for your reply, I got that and I hunted it and got 2 successfully, Thanks
@ashwaqshaik3483
@ashwaqshaik3483 2 года назад
Please share the .log file