I needed that explanation video for a long time;)! Just one small note: Please increase the size of the terminal font in the future videos for people who are watching on their phones. And thanks for these amazing contents!
FYI. If you are using the new Kali with ZSH and you're getting ^M when hitting enter. Do FG in one command like this. stty raw -echo;fg then reset and it will let you hit enter
A great alternative/extra to these is rlwrap. A tool that gives you some functionalities by running "rlwrap nc -nvlp ". For sure you will have to upgrade the looks of the reverse shell the same way as Rayn shows but I used rlwrap once and now it's a no brainer use for me. Awesome vids keep it up!
Hi I have a question for you bro. I heard for bof , the exploit will already be built and the vuln parameters given. We just need to make payload and do some tweaking and get the job done. It would be very much appreciated if you can walk us through how the process works. Thanks !
From my experience with OSCP, for the buffer overflow box you'll have to build exploit from scratch. There are some other exploits where the parameters everything will already be built out you'll just need to modify the exploit to get it working
I'm sure you can upgrade it even more but these have tended to be enough for what I've needed. My goal for this series is to simplify the commands as much as possible down to the essentials. We can definitely explore more in depth stuff in future series'