Тёмный

Hacking Websites by Uploading files (With symlinks) 

Tech Raj
Подписаться 763 тыс.
Просмотров 17 тыс.
50% 1

Опубликовано:

 

30 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 61   
@SteveBClark
@SteveBClark 11 месяцев назад
The GOAT is back....❤
@ReligionAndMaterialismDebunked
@ReligionAndMaterialismDebunked 11 месяцев назад
:3 I wonder if this can be used on my bug bounty targets. Also, I'm wondering how many Iranian, Lebanon, Saudi Arabian, North Korea, China, and other sites of terrorist, and dictatorship nations I get can into. 😅🥰🤑😋🤤 Great Indian hacker video. English. :3 😅 Shalom. Namaste.
@dishusharma7881
@dishusharma7881 11 месяцев назад
Where did you learn to pronounce environment as enveeronment? I am curious.
@_SebJ1000
@_SebJ1000 11 месяцев назад
It's intresting to learn that they place the password in an environment variable, wonder if most devs encrypt it as well. As that might be the slightest bit more secure.
@TheAKAnonymous
@TheAKAnonymous 11 месяцев назад
so late to watch your video
@lnstagrarm
@lnstagrarm 11 месяцев назад
More unique python projects please
@TheAKAnonymous
@TheAKAnonymous 11 месяцев назад
a suggestion, maybe you should try different titles something special surprising to be able to get more views adding curiosity to new students i mean we are technical student we understand your titles but new students might not and last thing as always this was a awesome video your's TheAKAnonymous
@raoulduke8064
@raoulduke8064 11 месяцев назад
yeees new video! GOAT is back
@rajeevpuri8319
@rajeevpuri8319 10 месяцев назад
thank you Sir , for this easy to understandable video for a noob like me.🙏🙏
@ReligionAndMaterialismDebunked
@ReligionAndMaterialismDebunked 11 месяцев назад
:3 I wonder if this can be used on my bug bounty targets. Also, I'm wondering how many Iranian, Lebanon, Saudi Arabian, North Korea, China, and other sites of terrorist, and dictatorship nations I get can into. 😅🥰🤑😋🤤 Great Indian hacker video. English. :3 😅 Shalom. Namaste.
@prudhvikonakalla9605
@prudhvikonakalla9605 11 месяцев назад
Raj-"kingu kingu"
@Nin_Cada
@Nin_Cada 11 месяцев назад
So what is the counter of it? How to not let the hackers get access to the filesystem using symlincks?
@ClashWithHuzefa
@ClashWithHuzefa 11 месяцев назад
Check whether if it is a symlink file or not, and don't let the Web server read, access directories, or file outside the Web root. If you are using php, there is a function is_link() to check whether its a symbolic link file or not
@Nin_Cada
@Nin_Cada 11 месяцев назад
@@ClashWithHuzefa i see.. So, couple of rules for the webserver should do the trick. Thanks ✨
@ClashWithHuzefa
@ClashWithHuzefa 11 месяцев назад
@AkeaNine welcome buddy
@manishneupane6070
@manishneupane6070 11 месяцев назад
Wow, great video. Thank you for making
@jesusdacoast872
@jesusdacoast872 2 месяца назад
Very informative, thanks.
@TejaRavipudi
@TejaRavipudi 11 месяцев назад
big fan. happy that you are back.
@Si6n9ne
@Si6n9ne 9 месяцев назад
where to get this source file of the one you doing right now,
@divyam847
@divyam847 11 месяцев назад
glad that you're back :)
@montala3380
@montala3380 7 месяцев назад
Hi brother, the symlink is only work when target site use ZIP/ TAR. How about normal upload file? can I upload that symlink file to retrieve the content?
@pinged69
@pinged69 9 месяцев назад
Does this affect sites that do not do anything with the file, just purely serve it? I have a pretty basic file hosting service thats public, do I need to somehow worry about this? Symlinks are not something that can be POSTed over HTTPS, right?
@scorpionisready
@scorpionisready 2 месяца назад
Informative ❤️
@SankalpaBaral1337
@SankalpaBaral1337 11 месяцев назад
Brother do you remember you used to create challenges (like CTF)? Please make those types of videos again.
@monsterzero6928
@monsterzero6928 11 месяцев назад
Can you please make a video on burpsuite how to inject files on servers by changing the file extension and injecting a backdoor with that
@evilspidy6924
@evilspidy6924 11 месяцев назад
Is this exploit have any number like cve-#####
@schooldropout1337
@schooldropout1337 11 месяцев назад
Is finding a way to upload files without following the usual restrictions considered a security problem? Yes, bypassing file upload restrictions is a security vulnerability because it can potentially allow malicious files to be uploaded to a system, which can lead to various security risks and issues.
@x_ankur
@x_ankur 11 месяцев назад
How to do that
@schooldropout1337
@schooldropout1337 11 месяцев назад
@@x_ankur bro raj will provide an exclusive demo for that scenario 🤠
@ReligionAndMaterialismDebunked
@ReligionAndMaterialismDebunked 11 месяцев назад
Thanks for the donation, and question, brother! 🤝🤑☺️
@ReligionAndMaterialismDebunked
@ReligionAndMaterialismDebunked 11 месяцев назад
:3 I wonder if this can be used on my bug bounty targets. Also, I'm wondering how many Iranian, Lebanon, Saudi Arabian, North Korea, China, and other sites of terrorist, and dictatorship nations I get can into. 😅🥰🤑😋🤤 Great Indian hacker video. English. :3 😅 Shalom. Namaste.
@khushipardeshi3114
@khushipardeshi3114 5 месяцев назад
Hua kisi se actually hack??
@SwineTech
@SwineTech 11 месяцев назад
Daemon, a program that runs in the background, anyone noticed the daemon
@mindlesstelevision3213
@mindlesstelevision3213 11 месяцев назад
Good to see you Back ❤️♥️
@anuzravat
@anuzravat 10 месяцев назад
is there some related article for this symlink vuln, u would like to recommend
@Si6n9ne
@Si6n9ne 9 месяцев назад
Is there any way to recreate this vulnerability, I wanna try and test it out If yes someone point me to it please
@NathanielMensah-d2d
@NathanielMensah-d2d 3 месяца назад
Good content Man.
@anudeepkalyadapu1657
@anudeepkalyadapu1657 8 месяцев назад
What a video ! Looking forward for such videos man! Keep it up
@Faysalauchan
@Faysalauchan 4 месяца назад
😮😮 so amazing
@HackingBinaries-dt2fh
@HackingBinaries-dt2fh 11 месяцев назад
Love you man, just subscribed
@st.john_one
@st.john_one 11 месяцев назад
pretty informative and cool, thanks
@gowthamreddysomala
@gowthamreddysomala 11 месяцев назад
Anna nee Videos Kosam Wait Chastunnam ..
@nemizy
@nemizy 11 месяцев назад
you went to traversal attack method lol
@shahzansid
@shahzansid 11 месяцев назад
@sbh3612
@sbh3612 10 месяцев назад
@x_ankur
@x_ankur 11 месяцев назад
THAT WAS CRAZYYYYYY BRUHHHHH 🔥🔥🔥🔥🔥❤❤❤❤
@usningame5177
@usningame5177 11 месяцев назад
Do you provide. Course
@TechnicalHeavenSM
@TechnicalHeavenSM 11 месяцев назад
😍😍😍.. You are back❤❤
@mahesharyatech
@mahesharyatech 11 месяцев назад
Any Issues With Users ?
@jimmlmao
@jimmlmao 11 месяцев назад
thats actually genius
@rishi8413
@rishi8413 11 месяцев назад
love the explaination
@vicmacarra
@vicmacarra 11 месяцев назад
Lel, interesting
@Topfive_realestate
@Topfive_realestate 11 месяцев назад
Love you bro 💪💪
@ClashWithHuzefa
@ClashWithHuzefa 11 месяцев назад
Amazing
@sagarhp2350
@sagarhp2350 11 месяцев назад
He's back.. 🤩
@JohnDoe-xp9rd
@JohnDoe-xp9rd 11 месяцев назад
Cool
@localh0ste
@localh0ste 11 месяцев назад
@IDK_911
@IDK_911 11 месяцев назад
just upload webshell
@PlayerOne69
@PlayerOne69 11 месяцев назад
@pavansasank
@pavansasank 11 месяцев назад
Далее
I legally defaced this website.
25:48
Просмотров 521 тыс.
Watch me hack a Wordpress website..
28:52
Просмотров 237 тыс.
I used AI to hack this website...
23:23
Просмотров 63 тыс.
Hack With SMS | SMS Spoofing like Mr. Robot!
11:32
Meta Has Changed The Game.
10:17
Просмотров 667
How hackers crack password protected ZIP files
9:07
Просмотров 316 тыс.
Learn Reverse Engineering (for hacking games)
7:26
This is how Hackers can *OWN YOU* with just a link!
8:05