Тёмный

Create a Reverse Shell Using a Fake MP4 File [Tutorial] 

Null Byte
Подписаться 933 тыс.
Просмотров 151 тыс.
50% 1

Earn $$. Learn What You Need to Get Certified (90% Off): nulb.app/cwlshop
How to Pop a Shell Using a Video
Full Tutorial: nulb.app/x4k28
Subscribe to Null Byte: goo.gl/J6wEnH
Nick's Twitter: / nickgodshall
Cyber Weapons Lab, Episode 199
In our latest video, we're showing how hackers can take advantage of flaws in common Linux file system managers to modify a video to run malicious code, phoning back to a hacker's server and running commands. Big shout out to Tokyoneon ( / tokyoneon_ , whose article on Null Byte serves as the basis for this cybersecurity tutorial.
To learn more, check out Tokyoneon's article on Null Byte: nulb.app/x4k28
Follow Null Byte on:
Twitter: / nullbyte
Flipboard: flip.it/3.Gf_0
Website: null-byte.com
Weekly newsletter: eepurl.com/dE3Ovb
Vimeo: vimeo.com/channels/nullbyte

Хобби

Опубликовано:

 

17 ноя 2020

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 280   
@Hack2WRLD
@Hack2WRLD 3 года назад
Really very good tutorial. Got to learn something new about "sudo !!". Keep posting such awesome tutorials.
@TheRobMozza
@TheRobMozza 3 года назад
That's quite scary, thank God for frequent security updates! Unfortunately there aren't many zero day exploits (hence the name) being published on RU-vid, but that in itself is even more scary!
@L4marca
@L4marca 3 года назад
This must be from the future, considering that Mint is on v20.
@MsHojat
@MsHojat 3 года назад
Yeah I was confused by that as well.
@RobertGallop
@RobertGallop 3 года назад
Be cool to see this with a windows machine as the target as well. If something this simple works anyways...
@TheRobMozza
@TheRobMozza 3 года назад
Now there's a follow up video idea! Any takers? (If it were applicable, Microsoft will of already patched it)
@lesliesavage9229
@lesliesavage9229 2 года назад
Actually it doesn't work that easy. If you copy a link, which is what this is, to another computer, it will ask you if you want to trust it before running it. All he is doing here is click baiting you and others to his RU-vid video. It looks like he zipped the "fake" file on his virtual computer, because ALL links made in this fashion will ask you if you trust it for the FIRST run on THAT computer. It will NOT just run as he has shown. You copy it to a new computer, if it copies at all, because it is often refuses, and you have to allow it to be copied, and on the new computer it will ask for permission again, when run for the first time. There is something fishy going on here that he isn't telling you. Windoze is easier. Have a batch file run something and load your payload into the directory that runs things when Windoze is booted. I once turned a screen upside down using this method. It took him an hour to fix it.
@revelingg
@revelingg Год назад
@@lesliesavage9229 ay bro can you explain more indepth on this?
@revelingg
@revelingg Год назад
@@lesliesavage9229 can we talk more u seem knowledgeable and i’m trying to learn
@lesliesavage9229
@lesliesavage9229 Год назад
@@revelingg I am talking about two different things, so I am not sure what you are asking. I just set it up again just for you on two Linux operating systems, and it still doesn't work. How many ways can this be explained that it will not work over the net on Linux Mint? He is dead at the link, and he needs one computer to be open to the net, which he never covers. He needs access to the target computer, which he doesn't have to set up netcat, and know which ports are open. It doesn't even work locally, which is all of his demonstration. He isn't showing something, because even links don't work like in this video. The first time you open a link it asks for permission, and his never does, he is lying by omission or using an outdated version of Linux Mint. No other way to put it.
@elvanmorris3708
@elvanmorris3708 3 года назад
Earthlings blink while none earthlings don't blink you know thy self , nice tut bro
@geertwilders457
@geertwilders457 3 года назад
U blinked 3 times under 10seconds. We cant accept you Im sorry dont hack me lol
@EditedSnowHD
@EditedSnowHD 3 года назад
Maat wat doe jij?
@abhiramss404
@abhiramss404 3 года назад
🤣🤣🤣
@rodricbr
@rodricbr 3 года назад
too bad, now he's gonna hack you
@rtht-ii6vy
@rtht-ii6vy 3 года назад
yo buddy
@sirrealistically
@sirrealistically 3 года назад
Even blinked with just one eye a couple of times
@thepianoaddict
@thepianoaddict 3 года назад
Wow, you're a real hacker! On 4:44 you enter the wrong ip address but it still worked!
@sluvvr
@sluvvr 3 года назад
Its the ip of the linux vm
@thepianoaddict
@thepianoaddict 3 года назад
​@@sluvvr That does not make a lot of sense to me. The netcat listener is running outside of the vm, the code that is shown on 4:44 is running inside the vm. So that would mean that the vm is connecting to itself, which it isn't. He also said "change this ip address to .162 as well", but he never set anything else to .162
@abhishekrajput9434
@abhishekrajput9434 3 года назад
@@thepianoaddictHe did it right, he set the IP X.X.X.162 for netcat to connect to the target && he got connected coz the VM is running on bridged mode.
@thepianoaddict
@thepianoaddict 3 года назад
@@abhishekrajput9434 "he set the IP X.X.X.162 for netcat to connect to the target" Yes, so he did it wrong, because the code is run on the target. I makes no sense to let the target connect to itself. "he got connected coz the VM is running on bridged mode." That would explain why it still works even though he didn't do it right.
@L4marca
@L4marca 3 года назад
​@@thepianoaddict That's what a reverse shell does? It connects FROM the target TO the host.
@nirmalatiwari3295
@nirmalatiwari3295 3 года назад
Great tutorial, thanks
@h4ckv157
@h4ckv157 3 года назад
NULL BYTE IS BACK AFTER A LONG TIME....!!!!
@cybercat1531
@cybercat1531 3 года назад
Very select 'attack'. I wouldn't even call it one. This is really basic and basically not working anywhere anymore, especially if you know how religiously linux desktop users update. It's the equivalent of sending a windows shortcut file with a VB script / cmd exec. It doesn't have to even be a video file, you can make it look like a PDF icon, or anything else. The PDF is much more convincing and you can pad the .desktop file with garbage to give it some file size to fool more observant users. Heck you can even make a little basic demo / game, pad your payload to the end of the launch script and send it over as part of a exclusive beta tester deal! Works.
@floatingblaze8405
@floatingblaze8405 3 года назад
I agree, this heavily falls under social engineering. Hell, you could even send someone a straight sh script, if they believe you're tech support.
@NullByteWHT
@NullByteWHT 3 года назад
Why don't you make a video about that
@REDCULT-is-Live
@REDCULT-is-Live 2 года назад
Totally agreed Cyber Cat, when I was watching this video i felt like this guy was talking out of the context, which doesn't even match with the subject of this video, the explanation is not upto the mark, secondly, when you are explaining anything, explain the important points and don't stretch it more by talking some useless things which are not even closer to the actual subject, idea is good though, 👍
@amonrah1788
@amonrah1788 3 года назад
Great video. Thank you so much
@Enigmatt_eu
@Enigmatt_eu 3 года назад
Nano is not for noobs... Just use what suits you best. Nice presentation btw. 🤜
@roman-fo2sk
@roman-fo2sk 2 года назад
nano virgin
@systemd276
@systemd276 Год назад
I like vim and Gedit
@Charlie8913
@Charlie8913 3 года назад
The tutorial mentions that Nemo is vulnerable to this attack, but at least the version on Arch Linux is NOT vulnerable (cause i tested it right now). I always have my file manager in list mode where i see the filesize though, so one would need to add a whole bunch of unnecessary data to the .desktop file to increase the filesize.
@MsHojat
@MsHojat 3 года назад
Even if you didn't display file size in the FM, chances are whatever method was used to get the file in the first place would show it's size as well- probably even multiple times (once in the e-mail before downloading, then again in the download progress). For that matter the speed of the download would also be an indicator as well. However perhaps most importantly, I presume that junk space can be added to the file to make it appear the proper size. So it would not be a reliable method of detection. I think that the main flaw (which is quite minor) is that there will be major lag between running the file and the video playing. I think that the video doesn't stream, so it would download in full before playing, no? He did say "stream" once though so maybe I'm mistaken.
@nixcutus
@nixcutus 3 года назад
I need to do this today.
@juliusrowe9374
@juliusrowe9374 3 года назад
Great tutorial Nick!
@kylo8846
@kylo8846 3 года назад
Thanks for this - looks interesting. Would there be a way to remove the other .mp4 file entirely? Seems a little obvious that there is something wrong if there's two mp4 files both pointing to the same one.
@DHIRAL2908
@DHIRAL2908 3 года назад
Maybe putting a . before it's name might work... As it will become hidden like the .ssh folder...
@MsHojat
@MsHojat 3 года назад
I'm not sure if you watched the video? From what I understand you're asking how to hide a file that doesn't need to be there in the first place. One only needs to send the fake file, not the video file.
@kylo8846
@kylo8846 3 года назад
@@MsHojat No, because the fake_video file just executes its code and then runs the real_video file. the video isn't embedded into the file
@timbrap4693
@timbrap4693 2 года назад
@@kylo8846 no it streams the video online, hence the python server
@andreasp2089
@andreasp2089 3 года назад
remember me old school times style
@EpicGameJunkies
@EpicGameJunkies 3 года назад
I think this is what comes out when you try doing everything in one take
@hmeador03
@hmeador03 3 года назад
He Blinked!
@shashank.s1492
@shashank.s1492 3 года назад
KEEP GOING
@FunnyPantsTV124
@FunnyPantsTV124 3 года назад
does this work for a png file or any other image file type?
@Ryudmilla
@Ryudmilla 3 года назад
good tutorial
@PotaytoDestroyer
@PotaytoDestroyer 3 года назад
You have to be in the same network as the user ... and it only works with a specific Linux ... pretty cool but a little underwhelming tbh 😅 great video though !!
@Meganano
@Meganano 3 года назад
surprised so many others didnt notice🤦‍♂️👍
@prakharmishra3000
@prakharmishra3000 3 года назад
You can do port forwarding to seem like you're in the same network as the target, that's how backdoors work don't they?
@PotaytoDestroyer
@PotaytoDestroyer 3 года назад
@@prakharmishra3000 😂😂 I’ll give you points for effort but it’s not exactly right
@prakharmishra3000
@prakharmishra3000 3 года назад
@@PotaytoDestroyer well I don't know much about networking, can you explain why?
@PotaytoDestroyer
@PotaytoDestroyer 3 года назад
@@prakharmishra3000 rtfm...
@rom8428
@rom8428 3 года назад
Well this is creative.
@sluvvr
@sluvvr 3 года назад
Thanks!
@danielmendes2641
@danielmendes2641 3 года назад
would it be possible to create a keygen from the same type of internet router for default passwords in a way of finding all passwords by mac adress or name? for example i have a router with a default password 10 more people have the same router and i have those passwords as well, can we generate more passwords for those routers ?
@mrmonday2000
@mrmonday2000 2 года назад
you know you dont need file extensions in linux, also any good blue teamer will always run file "filename" to see what type of file this is, they will see it is not a mp4 file and rm that so fast
@tera_hz7125
@tera_hz7125 3 года назад
Crontabs are OP
@amritsahu4521
@amritsahu4521 3 года назад
To play the video file why do we need to host it? As we have sent real video files along with the payload, we can play them. Right?
@sciencekingdom2322
@sciencekingdom2322 3 года назад
This guy can stare the sin out of you
@ovalwingnut
@ovalwingnut 3 года назад
COMPRESSION I usually wince when receiving video files (MP3's etc) in compressed file formats. Seems a humous way of sending files that are generally uncompressable by their nature. Unless the "DO NOT COMPRESS" switch is used during their creation - which is helpful when sending multiple files and or password protection. p.s. And as you know, compressing a file that is already highly compressed can actually increase its size.... blaw blaw I'm done 🤗 GREAT VIDEO as always 👍😎 Thank you 💜💙💛💚
@NickThePyromaniac
@NickThePyromaniac 3 года назад
Good point! Including that was my mistake
@sluvvr
@sluvvr 3 года назад
Oh, yeah
@tinachawla7636
@tinachawla7636 3 года назад
gr8 keep it up !!! hUge Fan
@patdevine3151
@patdevine3151 3 года назад
It's very creative but it has to be on same network?
@johannjohannes7214
@johannjohannes7214 3 года назад
I mean you could use a domain and the server behind it.
@sreyneatdet6346
@sreyneatdet6346 2 года назад
Does it work on 20.3 the latest version All exerts here ?
@adrianmendez8901
@adrianmendez8901 3 года назад
HUUUUUUUU NEWWW VIDEO HUUUUUUU
@milovaldez2320
@milovaldez2320 7 месяцев назад
Is there a way to modify a mp4 file for android reverse shells? Staged right does some thing similar but unmodified it won't work for my practice target Android version(Oreo). Any thoughts?
@naughtysec
@naughtysec 3 года назад
Ths what I wait for
@sayandebakhtar193
@sayandebakhtar193 3 года назад
we accept him because he blinks
@rxdicalforever7847
@rxdicalforever7847 3 года назад
In Step 5 where you put in your own ip address, if i understand properly, the first time u input your ip the victims pc connects to the linux program to download the files. In the part where you put in your ip the second time, can i put in a different ip and port so that it connects to a different pc after downloading the files from your linux computer?
@binaryparrot3352
@binaryparrot3352 3 года назад
Of course, the commands are completely seperate. you can in fact even change everything in there as they are just batch commands
@alexcricles
@alexcricles 3 года назад
It is not mp4 file, right? But desktop file
@HERESPILOT
@HERESPILOT 3 года назад
i had an issue when trying this when i tried to open the video file on another Linux computer i got this following error saying (Additional software is required. parole needs application/x-desktop decoder to play this file. it can be installed automatically.) but when i click install i just get an other error saying that Unable to install missing codes.. do you know what could cause this. any help will be very much appreciated :)
@lesliesavage9229
@lesliesavage9229 2 года назад
Wait till you get to the netcat part and that doesn't work either because you have the firewall up.
@pep2001bg
@pep2001bg 3 года назад
Damn, was gonna say first
@muci.72
@muci.72 3 года назад
new video 🍻🍾🎆
@realhomy
@realhomy 3 года назад
Nick G what up
@NickThePyromaniac
@NickThePyromaniac 3 года назад
Yo
@binaryparrot3352
@binaryparrot3352 3 года назад
I'm a bit confused, when did you change the file extension?
@pi8tol
@pi8tol 3 года назад
yes i am also he save file name .desktop and he got mp4 file 7:05 i think they make fool of us XD :(
@_underscore_9271
@_underscore_9271 3 года назад
I'm pretty sure it was automatically done by the file manager using the metadata when it unzipped the file, which is probably why this exploit only works with specific file managers
@lesliesavage9229
@lesliesavage9229 2 года назад
Desktop files are links in Linux. The first time you run them, which he didn't show you, it gets rid of the .desktop extension, but it comes back when ran on a new computer.
@kamalthapa249
@kamalthapa249 3 года назад
Where is the code I don't see in the article
@svensalton2147
@svensalton2147 3 года назад
Was that your router ip how will that work are you attacking an internal pc
@-_krish_-
@-_krish_- 3 года назад
so whats that laptop doing in jet propulsion ??
@nerajjha2875
@nerajjha2875 3 года назад
On which os do this reverse shell works
@Decrypt0nite
@Decrypt0nite 2 года назад
Linux
@stupidoconiglio
@stupidoconiglio Год назад
can you show me how to do it on a windows?
@graffixcreative
@graffixcreative Год назад
only works on local networks not remotely ?
@SouravKundujaishreeram
@SouravKundujaishreeram 3 года назад
how u get fake_video.mp4 file in when u unzip the file???...because as we can see when zip those file on that time it's .dekstop file and when u unzip that time its mp4 file...how???????????????? is it magic???
@internetparrot9753
@internetparrot9753 2 года назад
"nothing to see here" HMMMMM
@swayzierated6756
@swayzierated6756 2 года назад
Doesn't the script that you create have to bind to the original video though if you want it to be convincing?? How would you get the thumb nail to show up without having to make the victims computer unzip a 2 file download??
@cosmicdust632
@cosmicdust632 2 года назад
try empire, its basically the same thing but has that option to show the thumbnail so its a bit more convincing
@luke7090
@luke7090 3 года назад
Hey. will this spook windows defender?
@realhomy
@realhomy 3 года назад
Yessir Another upload.
@aroberts269
@aroberts269 3 года назад
RIP DarkComet
@kenichichirahama8987
@kenichichirahama8987 Год назад
Is this method allows me to have a control of an android phone ???
@ghoskali2086
@ghoskali2086 3 года назад
can this attack be perfomed on android
@jttech44
@jttech44 3 года назад
no, because it essentially requires that the target machine is pre-compromised. It's not a hack, it's just a file that does something while also playing a video. A cool thing to mess around with, maybe even useful, but not a hack by any means.
@zayanalrashdr3948
@zayanalrashdr3948 3 года назад
I don't think so because you need somesort of storage or more like sapce to accurate that and I don't think Android got that sort of access to memory to execute the code and I don't that kind of access can be found on Android at least on unrooted one
@cryp0g00n4
@cryp0g00n4 2 года назад
Is this how websites with bootlegged streaming videos put those sites up in order to gain access to your machine? He was using Linux here. A hacker would need a specific exploit for each OS to make it ubiquitous so does that mean Hackers just honeypot the videos until a vulnerable machine pops up in the queue. This is probably a data mining problem as Im sure once access is gained the hacker will have a class of subroutines that will search for the juicy bits and provide a summary/report with the most promising leads. What a headache... does a hacker think like this? Im sure there is a different classes of hackers. Some for fun, some casual, the professionals and then the 0.01% geniuses u want to stay away from who could do a lot of damage if they cared to.
@mhhh...9507
@mhhh...9507 3 года назад
can run payload also on windows
@imduong1004
@imduong1004 7 месяцев назад
how can I download linux mint 19.2, i cant search it anywhere :((
@hokuspokus8570
@hokuspokus8570 3 года назад
I don't know linux user who can be cheated by this lame trick
@Wosa_
@Wosa_ 9 месяцев назад
Does this work on windows 10 or 11
@mohommedkaifmemon3156
@mohommedkaifmemon3156 2 года назад
Can we do this for android as target
@raunaquepatra3966
@raunaquepatra3966 3 года назад
but what about the network lag?
@MO-zl6xj
@MO-zl6xj 9 месяцев назад
Can I do this on android as well?
@denniswambua4471
@denniswambua4471 3 года назад
Can it work for .exe file or any other executable program
@MsHojat
@MsHojat 3 года назад
exe files are for Windows. This exploit is only specific distributions of linux.
@radiantomen5753
@radiantomen5753 3 года назад
what os is this?
@mush_mouf
@mush_mouf 3 года назад
nothing happened on the other end. everything tries to go to microsoft store to open
@baskaran.mbaskaran.m5578
@baskaran.mbaskaran.m5578 3 года назад
in bettercap bluetooth ,after typing command ble.recon on ,its telling ([err]no available device) even my bluetooth also turned on what can i do please help me anyone
@hthbynaheem3689
@hthbynaheem3689 3 года назад
Buy a Bluetooth adapter
@baskaran.mbaskaran.m5578
@baskaran.mbaskaran.m5578 3 года назад
@@hthbynaheem3689 like wifi adapter there is separate hardware for bluetooth ie; (adapter)??
@rift9891
@rift9891 3 года назад
What if you are on wan? How to specify the port?
@serbestlmbs7360
@serbestlmbs7360 3 года назад
you nicely ask target to open it
@nominsml9583
@nominsml9583 3 года назад
what OS you used in this vedio ?
@jacobhinchliffe6237
@jacobhinchliffe6237 3 года назад
Kali Linux
@tech_N2999
@tech_N2999 3 года назад
Will it work on Android os?
@kettzy3404
@kettzy3404 2 года назад
Does this work only on my network if so how can i put it to work outside my network?
@lesliesavage9229
@lesliesavage9229 2 года назад
It won't work at all with the firewall up.
@DD_MN
@DD_MN 3 года назад
LOL, you have two different Kali boot drives
@parkinsons7112
@parkinsons7112 3 года назад
ikr he is such hackerman
@user-jv2cw9xi6z
@user-jv2cw9xi6z 3 года назад
This is basically ratting, i prefer to do it on windows. Just build the client.exe file and bind it with a legit video or photo, change the extension with an extension spoofer and thats it, also crypt the file
@VenemonTV
@VenemonTV 7 месяцев назад
How?
@strictlyirving498
@strictlyirving498 3 месяца назад
Lol, post a video of how you prefer yours done lol. This video is a cool video
@lllbadalll
@lllbadalll 2 месяца назад
​@@strictlyirving498Just use rats, learn how to
@afnank007
@afnank007 3 года назад
Its Great...👍
@chiranjeevinaidu3660
@chiranjeevinaidu3660 3 года назад
Can we do this with a jpeg file
@limbo8749
@limbo8749 2 года назад
Hey can someone send me a list of all vulnerable Linux?
@emilioortega9487
@emilioortega9487 3 года назад
Someone could understand something I didn’t understand, does this exploit only works in linux computers ? doesn’t Windows have this vulnerability? And does this only work being in the same network ?
@MsHojat
@MsHojat 3 года назад
There are some related exploits that are comparable in Windows. However as far as I know they will always have the shortcut indicator on the icon which would require the user to be a bit dumber to run.
@michelangelop3923
@michelangelop3923 3 года назад
With a static public ip it can work everywhere (with Linux)
@romanhossen6392
@romanhossen6392 2 года назад
You just look like spider man homecoming actor Tom Holland 😍
@bandeirante8597
@bandeirante8597 3 года назад
This guy is less scary
@Pentestersploit
@Pentestersploit 3 года назад
It work
@rpmathur1278
@rpmathur1278 3 месяца назад
Not working on internet using ng rock or cloudflared
@divyanshuverma3365
@divyanshuverma3365 3 года назад
I am getting a error when I use nautilus . it goes like this ** (org.gnome.Nautilus:5727): WARNING **: 12:53:45.087: Error on getting connection: Failed to load SPARQL backend: Cannot autolaunch D-Bus without X11 $DISPLAY Unable to init server: Could not connect: Connection refused (org.gnome.Nautilus:5727): Gtk-WARNING **: 12:53:45.088: cannot open display:
@mahirfr
@mahirfr 3 года назад
I thought it can be done in windows.
@alanjames7480
@alanjames7480 3 года назад
I too
@mikebenson9423
@mikebenson9423 3 года назад
Could be done on windows using a payload like Powercat or a using HTA file in MSploit and venom. You need to obfuscate the payload the same way, and it should work the same.
@mahirfr
@mahirfr 3 года назад
@@mikebenson9423 Any video guide?
@mikebenson9423
@mikebenson9423 3 года назад
@@mahirfr everything is not on video. The main part of hacking is reading documentation and fail again and again. You know what you want to acheive. You can acheive it on Linux. You want to achieve the same thing on Windows. So you go to Google and search for : "Windows Reverse shell", then you analyse the different codes and scripts, and try to work with one of them. When it's working use the same way of the video, adapt to windows, to obfuscate your code. And it should work. Search, read, search again, read again, try, fail, try, fail, try, fail, try, fail...try..it worked ? No it failed...try again and again and again. Be patient. The more you try, the more you fail, the more you learn.
@mahirfr
@mahirfr 3 года назад
@@mikebenson9423 I fully understand what you are trying to say. I also get to acknowledge that if you see a tutorial or read a guide it's all time straight forward that's why you don't get know to other things related,.. (I mean not always you get to know) so thanks.... I realize now..
@ha1fdan
@ha1fdan 3 года назад
does it work with windows?
@RTPTechTips
@RTPTechTips 3 года назад
Not based on example shown. This one is set to linux file mgmt + reverse shell /bin/bash
@udayveersingh2122
@udayveersingh2122 2 года назад
Atleast you blink your eyes
@peterfromla7505
@peterfromla7505 2 года назад
So how to prevent this kind of attack? I'm a video editor by the way. I receive tons of footage from my clients on a regular basis.
@lesliesavage9229
@lesliesavage9229 Год назад
It isn't going to work anyway. If somebody sends you a link in this manner, clicking on the link will put a dialog box asking you what to do with it. If they changed the dot address to, for example .MP4, it will try to open in your player that will show an error. He also doesn't cover how to do a netcat over the net, which means everything here is local, or on your net work only. It's just not workable in the real world.
@deathfromthekrypt
@deathfromthekrypt 3 года назад
What switches are you using on your keyboard
@NickThePyromaniac
@NickThePyromaniac 3 года назад
Cherry MX blue
@padie2006
@padie2006 3 года назад
Where’s Cody??
@alanjames7480
@alanjames7480 3 года назад
Yah, Where is he
@NullByteWHT
@NullByteWHT 3 года назад
Hacking
@laszlob3683
@laszlob3683 17 дней назад
Pls create a video with the same ide but targetting ios devices
@howiewhite4773
@howiewhite4773 3 года назад
Lay off the wellbutrin and zoloft brother
@rectify2003
@rectify2003 3 года назад
29.2?
@3xRubiks
@3xRubiks 3 года назад
Why do I need a reverse shell
@kaunghtetsan4925
@kaunghtetsan4925 3 года назад
I have rolling ip-s! How do I put ip idress in mp4 file?
@tayfun7552
@tayfun7552 3 года назад
Google DynDNS or use a server
@aidenlopez6415
@aidenlopez6415 3 года назад
The thing is i cant even trust ur links
@abbasshahzad3163
@abbasshahzad3163 2 года назад
tried it and its showing as a .desktop file when zipped
@abbasshahzad3163
@abbasshahzad3163 2 года назад
so i got it but its still listening and cant find it
@magbenyo
@magbenyo 3 года назад
you have changed
Далее
Haunt a Computer Using SSH [Tutorial]
19:10
Просмотров 389 тыс.
catch EVERY reverse shell while hacking! (VILLAIN)
19:03
skibidi toilet multiverse 039 (part 2)
08:58
Просмотров 2,8 млн
Best father #shorts by Secret Vlog
00:18
Просмотров 18 млн
Write Your Own Bash Scripts for Automation [Tutorial]
16:35
Hide a Hacker's Reverse Shell in ONE Command
11:29
Просмотров 82 тыс.
PowerShell Hacking
8:42
Просмотров 70 тыс.
This is how Hackers can *OWN YOU* with just a link!
8:05
Times Square
0:16
Просмотров 7 млн
готова дочка 🤣
0:13
Просмотров 11 млн
Ява 638 сегодня в Тренде ?
0:14
Просмотров 1,6 млн