Pilgrimage | Hack the Box | Malayalam | Walkthrough | HTB | Ethical hacking
Pilgrimage starts with a website that reduces image size. we'll find an exposed Git repo on the site, and use it to see it’s using a version of Image Magick to do the image reduction that has a file read vulnerability. we’ll use that to enumerate the host and pull the SQLite database. That database gives a plaintext password that works for SSH. There’s a script run by root that’s monitor file uploads using inotifywait. When there’s a file, it runs binwalk on the file to look for executables. we'll abuse a vulnerability in binwalk to get execution as root.
Link for Hack the box
https://affiliate.hackthebox.com/29icft3zq24o
Disclaimer :
All video’s and tutorials are for informational and educational purposes only. The tutorials and videos provided there is only for those who are interested to learn about Cyber security, Penetration Testing and malware analysis. Hacking tutorials is against misuse of the information and we strongly suggest against it.
All tutorials and videos have been made using our own routers, servers, websites and other resources, they do not contain any illegal activity. We do not promote, encourage, support or excite any illegal activity or hacking without written permission in general. We want to raise security awareness and inform our readers on how to prevent themselves from being a victim of hackers. If you plan to use the information for illegal purposes, please leave this website now. We cannot be held responsible for any misuse of the given information.
1. Information provided on this Channel are for educational purposes only. This channel is no way responsible for any misuse of the information.
2. This Channel is all about ethical hacking.
3. This Channel is totally meant for providing information on “Computer Security”, “Computer Programming” and other related computer tricks and tweaks topics and is no way related towards the terms “CRACKING” or “HACKING” (Unethical).
4. I’ll include few blogs which may contain the information related to ‘Hacking Password’ or ‘Hacking email accounts’ or similar terms. You shall not misuse the information the information to gain unauthorised access. Also be aware, performing hack attempts without permission on computers that you do not own is illegal.
5. I’ll not be responsible for any direct or indirect damage caused due to the usage of the information provided on this site.
6. I reserve the right to modify the Disclaimer at any time without notice.
#parrotos
#kalilinux
#cybersecurity
#ethicalhackingmalayalam
#cybersecuritymalayalam
#Imagemagik
#Binwalk
71
views
whatsapp scam
Audio doesn't belong to me or person I personally know. Topic seems to be really genuine thats why I'm adding this here. If anyone finds any issue with this just text me.
I will try to figure out whats really happening behind the scenes. Mean while everyone take care.
3
views
Gofer| Hack the Box | Malayalam | Walkthrough | HTB | Ethical hacking
Link for Hack the box
https://affiliate.hackthebox.com/29icft3zq24o
Disclaimer :
All video’s and tutorials are for informational and educational purposes only. The tutorials and videos provided there is only for those who are interested to learn about Cyber security, Penetration Testing and malware analysis. Hacking tutorials is against misuse of the information and we strongly suggest against it.
All tutorials and videos have been made using our own routers, servers, websites and other resources, they do not contain any illegal activity. We do not promote, encourage, support or excite any illegal activity or hacking without written permission in general. We want to raise security awareness and inform our readers on how to prevent themselves from being a victim of hackers. If you plan to use the information for illegal purposes, please leave this website now. We cannot be held responsible for any misuse of the given information.
1. Information provided on this Channel are for educational purposes only. This channel is no way responsible for any misuse of the information.
2. This Channel is all about ethical hacking.
3. This Channel is totally meant for providing information on “Computer Security”, “Computer Programming” and other related computer tricks and tweaks topics and is no way related towards the terms “CRACKING” or “HACKING” (Unethical).
4. I’ll include few blogs which may contain the information related to ‘Hacking Password’ or ‘Hacking email accounts’ or similar terms. You shall not misuse the information the information to gain unauthorised access. Also be aware, performing hack attempts without permission on computers that you do not own is illegal.
5. I’ll not be responsible for any direct or indirect damage caused due to the usage of the information provided on this site.
6. I reserve the right to modify the Disclaimer at any time without notice.
#parrotos
#kalilinux
#cybersecurity
#ethicalhackingmalayalam
#cybersecuritymalayalam
11
views
JUPITER | Hack the Box | Malayalam | Walkthrough | HTB | Ethical hacking
Jupiter is an linux hosting hosting a Grafana dashboard on http. Inital foothold is exploiting raw SQL queries executed by POSTgresQL database via code execution in copy command. Privilege escaltion is made by accessing Jupyter notebook running by jovian user. To get shell we will exploit config files of a binary using root permissions.
00:00 - intro
00:24 - nmap
01:27 - vhost enumeration
02:02 - directory enumeration
02:50 - port 80
04:05 - kiosk subdomain
06:55 - Grafana raw sql injection
09:20 - postgresql copy to execute exploitation
14:16 - shell as postgres
26:55 - pivoting to juno
30:35 - shell as juno
32:13 - escalating to jovian
35:28 - root
Link for Hack the box
https://affiliate.hackthebox.com/29icft3zq24o
Disclaimer :
All video’s and tutorials are for informational and educational purposes only. The tutorials and videos provided there is only for those who are interested to learn about Cyber security, Penetration Testing and malware analysis. Hacking tutorials is against misuse of the information and we strongly suggest against it.
All tutorials and videos have been made using our own routers, servers, websites and other resources, they do not contain any illegal activity. We do not promote, encourage, support or excite any illegal activity or hacking without written permission in general. We want to raise security awareness and inform our readers on how to prevent themselves from being a victim of hackers. If you plan to use the information for illegal purposes, please leave this website now. We cannot be held responsible for any misuse of the given information.
1. Information provided on this Channel are for educational purposes only. This channel is no way responsible for any misuse of the information.
2. This Channel is all about ethical hacking.
3. This Channel is totally meant for providing information on “Computer Security”, “Computer Programming” and other related computer tricks and tweaks topics and is no way related towards the terms “CRACKING” or “HACKING” (Unethical).
4. I’ll include few blogs which may contain the information related to ‘Hacking Password’ or ‘Hacking email accounts’ or similar terms. You shall not misuse the information the information to gain unauthorised access. Also be aware, performing hack attempts without permission on computers that you do not own is illegal.
5. I’ll not be responsible for any direct or indirect damage caused due to the usage of the information provided on this site.
6. I reserve the right to modify the Disclaimer at any time without notice.
#parrotos
#kalilinux
#cybersecurity
#ethicalhackingmalayalam
#cybersecuritymalayalam
15
views
PC | Hack the Box | Malayalam | Walkthrough | HTB | Ethical hacking
PCis an easy linux hosting hosting a gRPC on port 50051. we will exploit gRPC using grpcurl and grpcui via sqlite injection. Root part is pretty straight forwarding using a exploit from exploit db to gain access, pyLoad running as root
00:00:16 - port scanning
00:01:58 - enumeration
00:02:30 - gRPC
00:04:09 - grpcurl
00:08:24 - grpcli
00:12:28 - testing sqli
00:13:45 - using sqlmap to dump db
00:14:28 - manuel testing
00:21:00 - sshing as sau user
00:21:27 - port forwarding
00:22:27 - exploiting pyload
00:26:22 - root
00:26:38 - explaining the exploit
Link for Hack the box
https://affiliate.hackthebox.com/29icft3zq24o
Disclaimer :
All video’s and tutorials are for informational and educational purposes only. The tutorials and videos provided there is only for those who are interested to learn about Cyber security, Penetration Testing and malware analysis. Hacking tutorials is against misuse of the information and we strongly suggest against it.
All tutorials and videos have been made using our own routers, servers, websites and other resources, they do not contain any illegal activity. We do not promote, encourage, support or excite any illegal activity or hacking without written permission in general. We want to raise security awareness and inform our readers on how to prevent themselves from being a victim of hackers. If you plan to use the information for illegal purposes, please leave this website now. We cannot be held responsible for any misuse of the given information.
1. Information provided on this Channel are for educational purposes only. This channel is no way responsible for any misuse of the information.
2. This Channel is all about ethical hacking.
3. This Channel is totally meant for providing information on “Computer Security”, “Computer Programming” and other related computer tricks and tweaks topics and is no way related towards the terms “CRACKING” or “HACKING” (Unethical).
4. I’ll include few blogs which may contain the information related to ‘Hacking Password’ or ‘Hacking email accounts’ or similar terms. You shall not misuse the information the information to gain unauthorised access. Also be aware, performing hack attempts without permission on computers that you do not own is illegal.
5. I’ll not be responsible for any direct or indirect damage caused due to the usage of the information provided on this site.
6. I reserve the right to modify the Disclaimer at any time without notice.
#parrotos
#kalilinux
#cybersecurity
#ethicalhackingmalayalam
#cybersecuritymalayalam
8
views
FILE UPLOAD | BUG BOUNTY TUTORIAL | PART 23 | MALAYALAM | ETHICAL HACKING
Tutorial series focus on beginner level knowledge sharing series for those who are interested in bug bounty. Series covers both theory and practical's for common web application vulnerability. Stay tuned for more videos.
Disclaimer :
All video’s and tutorials are for informational and educational purposes only. The tutorials and videos provided there is only for those who are interested to learn about Cyber security, Penetration Testing and malware analysis. Hacking tutorials is against misuse of the information and we strongly suggest against it.
All tutorials and videos have been made using our own routers, servers, websites and other resources, they do not contain any illegal activity. We do not promote, encourage, support or excite any illegal activity or hacking without written permission in general. We want to raise security awareness and inform our readers on how to prevent themselves from being a victim of hackers. If you plan to use the information for illegal purposes, please leave this website now. We cannot be held responsible for any misuse of the given information.
1. Information provided on this Channel are for educational purposes only. This channel is no way responsible for any misuse of the information.
2. This Channel is all about ethical hacking.
3. This Channel is totally meant for providing information on “Computer Security”, “Computer Programming” and other related computer tricks and tweaks topics and is no way related towards the terms “CRACKING” or “HACKING” (Unethical).
4. I’ll include few blogs which may contain the information related to ‘Hacking Password’ or ‘Hacking email accounts’ or similar terms. You shall not misuse the information the information to gain unauthorized access. Also be aware, performing hack attempts without permission on computers that you do not own is illegal.
5. I’ll not be responsible for any direct or indirect damage caused due to the usage of the information provided on this site.
6. I reserve the right to modify the Disclaimer at any time without notice.
4
views
XXE | PART 21 | BUG BOUNTY TUTORIAL | MALAYALAM | ETHICAL HACKING
Tutorial series focus on beginner level knowledge sharing series for those who are interested in bug bounty. Series covers both theory and practical's for common web application vulnerability. Stay tuned for more videos.
Disclaimer :
All video’s and tutorials are for informational and educational purposes only. The tutorials and videos provided there is only for those who are interested to learn about Cyber security, Penetration Testing and malware analysis. Hacking tutorials is against misuse of the information and we strongly suggest against it.
All tutorials and videos have been made using our own routers, servers, websites and other resources, they do not contain any illegal activity. We do not promote, encourage, support or excite any illegal activity or hacking without written permission in general. We want to raise security awareness and inform our readers on how to prevent themselves from being a victim of hackers. If you plan to use the information for illegal purposes, please leave this website now. We cannot be held responsible for any misuse of the given information.
1. Information provided on this Channel are for educational purposes only. This channel is no way responsible for any misuse of the information.
2. This Channel is all about ethical hacking.
3. This Channel is totally meant for providing information on “Computer Security”, “Computer Programming” and other related computer tricks and tweaks topics and is no way related towards the terms “CRACKING” or “HACKING” (Unethical).
4. I’ll include few blogs which may contain the information related to ‘Hacking Password’ or ‘Hacking email accounts’ or similar terms. You shall not misuse the information the information to gain unauthorised access. Also be aware, performing hack attempts without permission on computers that you do not own is illegal.
5. I’ll not be responsible for any direct or indirect damage caused due to the usage of the information provided on this site.
6. I reserve the right to modify the Disclaimer at any time without notice.
15
views
XXE | PART 20 | BUG BOUNTY TUTORIAL | MALAYALAM | ETHICAL HACKING
Tutorial series focus on beginner level knowledge sharing series for those who are interested in bug bounty. Series covers both theory and practical's for common web application vulnerability. Stay tuned for more videos.
Disclaimer :
All video’s and tutorials are for informational and educational purposes only. The tutorials and videos provided there is only for those who are interested to learn about Cyber security, Penetration Testing and malware analysis. Hacking tutorials is against misuse of the information and we strongly suggest against it.
All tutorials and videos have been made using our own routers, servers, websites and other resources, they do not contain any illegal activity. We do not promote, encourage, support or excite any illegal activity or hacking without written permission in general. We want to raise security awareness and inform our readers on how to prevent themselves from being a victim of hackers. If you plan to use the information for illegal purposes, please leave this website now. We cannot be held responsible for any misuse of the given information.
1. Information provided on this Channel are for educational purposes only. This channel is no way responsible for any misuse of the information.
2. This Channel is all about ethical hacking.
3. This Channel is totally meant for providing information on “Computer Security”, “Computer Programming” and other related computer tricks and tweaks topics and is no way related towards the terms “CRACKING” or “HACKING” (Unethical).
4. I’ll include few blogs which may contain the information related to ‘Hacking Password’ or ‘Hacking email accounts’ or similar terms. You shall not misuse the information the information to gain unauthorised access. Also be aware, performing hack attempts without permission on computers that you do not own is illegal.
5. I’ll not be responsible for any direct or indirect damage caused due to the usage of the information provided on this site.
6. I reserve the right to modify the Disclaimer at any time without notice.
18
views
Wifinetic | Hack the Box | Malayalam | Walkthrough | HTB | Ethical hacking
Link for Hack the box
https://affiliate.hackthebox.com/29icft3zq24o
Disclaimer :
All video’s and tutorials are for informational and educational purposes only. The tutorials and videos provided there is only for those who are interested to learn about Cyber security, Penetration Testing and malware analysis. Hacking tutorials is against misuse of the information and we strongly suggest against it.
All tutorials and videos have been made using our own routers, servers, websites and other resources, they do not contain any illegal activity. We do not promote, encourage, support or excite any illegal activity or hacking without written permission in general. We want to raise security awareness and inform our readers on how to prevent themselves from being a victim of hackers. If you plan to use the information for illegal purposes, please leave this website now. We cannot be held responsible for any misuse of the given information.
1. Information provided on this Channel are for educational purposes only. This channel is no way responsible for any misuse of the information.
2. This Channel is all about ethical hacking.
3. This Channel is totally meant for providing information on “Computer Security”, “Computer Programming” and other related computer tricks and tweaks topics and is no way related towards the terms “CRACKING” or “HACKING” (Unethical).
4. I’ll include few blogs which may contain the information related to ‘Hacking Password’ or ‘Hacking email accounts’ or similar terms. You shall not misuse the information the information to gain unauthorised access. Also be aware, performing hack attempts without permission on computers that you do not own is illegal.
5. I’ll not be responsible for any direct or indirect damage caused due to the usage of the information provided on this site.
6. I reserve the right to modify the Disclaimer at any time without notice.
#parrotos
#kalilinux
#cybersecurity
#ethicalhackingmalayalam
#cybersecuritymalayalam
#filedisclosure
6
views
Blind TIME BASED SQL Injection | PART 19 | BUG BOUNTY TUTORIAL | MALAYALAM | ETHICAL HACKING
Tutorial series focus on beginner level knowledge sharing series for those who are interested in bug bounty. Series covers both theory and practical's for common web application vulnerability. Stay tuned for more videos.
Disclaimer :
All video’s and tutorials are for informational and educational purposes only. The tutorials and videos provided there is only for those who are interested to learn about Cyber security, Penetration Testing and malware analysis. Hacking tutorials is against misuse of the information and we strongly suggest against it.
All tutorials and videos have been made using our own routers, servers, websites and other resources, they do not contain any illegal activity. We do not promote, encourage, support or excite any illegal activity or hacking without written permission in general. We want to raise security awareness and inform our readers on how to prevent themselves from being a victim of hackers. If you plan to use the information for illegal purposes, please leave this website now. We cannot be held responsible for any misuse of the given information.
1. Information provided on this Channel are for educational purposes only. This channel is no way responsible for any misuse of the information.
2. This Channel is all about ethical hacking.
3. This Channel is totally meant for providing information on “Computer Security”, “Computer Programming” and other related computer tricks and tweaks topics and is no way related towards the terms “CRACKING” or “HACKING” (Unethical).
4. I’ll include few blogs which may contain the information related to ‘Hacking Password’ or ‘Hacking email accounts’ or similar terms. You shall not misuse the information the information to gain unauthorised access. Also be aware, performing hack attempts without permission on computers that you do not own is illegal.
5. I’ll not be responsible for any direct or indirect damage caused due to the usage of the information provided on this site.
6. I reserve the right to modify the Disclaimer at any time without notice.
13
views
XSS Labs | PART 8 | BUG BOUNTY TUTORIAL | MALAYALAM |
Tutorial series focus on beginner level knowledge sharing series for those who are interested in bug bounty. Series covers both theory and practical's for common web application vulnerability. Stay tuned for more videos.
Disclaimer :
All video’s and tutorials are for informational and educational purposes only. The tutorials and videos provided there is only for those who are interested to learn about Cyber security, Penetration Testing and malware analysis. Hacking tutorials is against misuse of the information and we strongly suggest against it.
All tutorials and videos have been made using our own routers, servers, websites and other resources, they do not contain any illegal activity. We do not promote, encourage, support or excite any illegal activity or hacking without written permission in general. We want to raise security awareness and inform our readers on how to prevent themselves from being a victim of hackers. If you plan to use the information for illegal purposes, please leave this website now. We cannot be held responsible for any misuse of the given information.
1. Information provided on this Channel are for educational purposes only. This channel is no way responsible for any misuse of the information.
2. This Channel is all about ethical hacking.
3. This Channel is totally meant for providing information on “Computer Security”, “Computer Programming” and other related computer tricks and tweaks topics and is no way related towards the terms “CRACKING” or “HACKING” (Unethical).
4. I’ll include few blogs which may contain the information related to ‘Hacking Password’ or ‘Hacking email accounts’ or similar terms. You shall not misuse the information the information to gain unauthorised access. Also be aware, performing hack attempts without permission on computers that you do not own is illegal.
5. I’ll not be responsible for any direct or indirect damage caused due to the usage of the information provided on this site.
6. I reserve the right to modify the Disclaimer at any time without notice.
33
views
Forest | Malayalam Tutorial | Hack the Box
Forest is an easy windows box, which contains active directory enumerations. then we'll find kerberostable account from initial enumeration, which leads to our initial access into the box. Then using bloodhound and Dcsync attack we can steal credentials of other users.
Disclaimer :
All video’s and tutorials are for informational and educational purposes only. The tutorials and videos provided there is only for those who are interested to learn about Cyber security, Penetration Testing and malware analysis. Hacking tutorials is against misuse of the information and we strongly suggest against it.
All tutorials and videos have been made using our own routers, servers, websites and other resources, they do not contain any illegal activity. We do not promote, encourage, support or excite any illegal activity or hacking without written permission in general. We want to raise security awareness and inform our readers on how to prevent themselves from being a victim of hackers. If you plan to use the information for illegal purposes, please leave this website now. We cannot be held responsible for any misuse of the given information.
1. Information provided on this Channel are for educational purposes only. This channel is no way responsible for any misuse of the information.
2. This Channel is all about ethical hacking.
3. This Channel is totally meant for providing information on “Computer Security”, “Computer Programming” and other related computer tricks and tweaks topics and is no way related towards the terms “CRACKING” or “HACKING” (Unethical).
4. I’ll include few blogs which may contain the information related to ‘Hacking Password’ or ‘Hacking email accounts’ or similar terms. You shall not misuse the information the information to gain unauthorised access. Also be aware, performing hack attempts without permission on computers that you do not own is illegal.
5. I’ll not be responsible for any direct or indirect damage caused due to the usage of the information provided on this site.
6. I reserve the right to modify the Disclaimer at any time without notice.
#parrotos
#kalilinux
#cybersecurity
#ethicalhackingmalayalam
#cybersecuritymalayalam
#activedirectory
10
views
XSS Labs | PART 7 | BUG BOUNTY TUTORIAL | MALAYALAM |
Tutorial series focus on beginner level knowledge sharing series for those who are interested in bug bounty. Series covers both theory and practical's for common web application vulnerability. Stay tuned for more videos.
Disclaimer :
All video’s and tutorials are for informational and educational purposes only. The tutorials and videos provided there is only for those who are interested to learn about Cyber security, Penetration Testing and malware analysis. Hacking tutorials is against misuse of the information and we strongly suggest against it.
All tutorials and videos have been made using our own routers, servers, websites and other resources, they do not contain any illegal activity. We do not promote, encourage, support or excite any illegal activity or hacking without written permission in general. We want to raise security awareness and inform our readers on how to prevent themselves from being a victim of hackers. If you plan to use the information for illegal purposes, please leave this website now. We cannot be held responsible for any misuse of the given information.
1. Information provided on this Channel are for educational purposes only. This channel is no way responsible for any misuse of the information.
2. This Channel is all about ethical hacking.
3. This Channel is totally meant for providing information on “Computer Security”, “Computer Programming” and other related computer tricks and tweaks topics and is no way related towards the terms “CRACKING” or “HACKING” (Unethical).
4. I’ll include few blogs which may contain the information related to ‘Hacking Password’ or ‘Hacking email accounts’ or similar terms. You shall not misuse the information the information to gain unauthorised access. Also be aware, performing hack attempts without permission on computers that you do not own is illegal.
5. I’ll not be responsible for any direct or indirect damage caused due to the usage of the information provided on this site.
6. I reserve the right to modify the Disclaimer at any time without notice.
22
views
XSS Labs | PART 6 | BUG BOUNTY TUTORIAL | MALAYALAM |
Tutorial series focus on beginner level knowledge sharing series for those who are interested in bug bounty. Series covers both theory and practical's for common web application vulnerability. Stay tuned for more videos.
Disclaimer :
All video’s and tutorials are for informational and educational purposes only. The tutorials and videos provided there is only for those who are interested to learn about Cyber security, Penetration Testing and malware analysis. Hacking tutorials is against misuse of the information and we strongly suggest against it.
All tutorials and videos have been made using our own routers, servers, websites and other resources, they do not contain any illegal activity. We do not promote, encourage, support or excite any illegal activity or hacking without written permission in general. We want to raise security awareness and inform our readers on how to prevent themselves from being a victim of hackers. If you plan to use the information for illegal purposes, please leave this website now. We cannot be held responsible for any misuse of the given information.
1. Information provided on this Channel are for educational purposes only. This channel is no way responsible for any misuse of the information.
2. This Channel is all about ethical hacking.
3. This Channel is totally meant for providing information on “Computer Security”, “Computer Programming” and other related computer tricks and tweaks topics and is no way related towards the terms “CRACKING” or “HACKING” (Unethical).
4. I’ll include few blogs which may contain the information related to ‘Hacking Password’ or ‘Hacking email accounts’ or similar terms. You shall not misuse the information the information to gain unauthorised access. Also be aware, performing hack attempts without permission on computers that you do not own is illegal.
5. I’ll not be responsible for any direct or indirect damage caused due to the usage of the information provided on this site.
6. I reserve the right to modify the Disclaimer at any time without notice.
5
views
Devel | Hack the Box | Malayalam | Walkthrough
Devel is an easy linux box which can be exploitable from public vulnerability. Starts of with anonymous login access with ftp which leads to get initial access into the box. Then we will escalate our privileges using
ms10-015 exploit to gain system authority
01:15 nmap
02:50 ftp
03:45 reverse shell
08:00 post exploit suggester
10:24 kitrap0d
11:47 flags
14:15 me struggling
https://affiliate.hackthebox.com/29icft3zq24o
Disclaimer :
All video’s and tutorials are for informational and educational purposes only. The tutorials and videos provided there is only for those who are interested to learn about Cyber security, Penetration Testing and malware analysis. Hacking tutorials is against misuse of the information and we strongly suggest against it.
All tutorials and videos have been made using our own routers, servers, websites and other resources, they do not contain any illegal activity. We do not promote, encourage, support or excite any illegal activity or hacking without written permission in general. We want to raise security awareness and inform our readers on how to prevent themselves from being a victim of hackers. If you plan to use the information for illegal purposes, please leave this website now. We cannot be held responsible for any misuse of the given information.
1. Information provided on this Channel are for educational purposes only. This channel is no way responsible for any misuse of the information.
2. This Channel is all about ethical hacking.
3. This Channel is totally meant for providing information on “Computer Security”, “Computer Programming” and other related computer tricks and tweaks topics and is no way related towards the terms “CRACKING” or “HACKING” (Unethical).
4. I’ll include few blogs which may contain the information related to ‘Hacking Password’ or ‘Hacking email accounts’ or similar terms. You shall not misuse the information the information to gain unauthorised access. Also be aware, performing hack attempts without permission on computers that you do not own is illegal.
5. I’ll not be responsible for any direct or indirect damage caused due to the usage of the information provided on this site.
6. I reserve the right to modify the Disclaimer at any time without notice.
#parrotos
#kalilinux
#cybersecurity
#ethicalhackingmalayalam
#cybersecuritymalayalam
#lfi
#spring
10
views
Fuzzing & XSS | PART 5 | BUG BOUNTY TUTORIAL | MALAYALAM |
Tutorial series focus on beginner level knowledge sharing series for those who are interested in bug bounty. Series covers both theory and practical's for common web application vulnerability. Stay tuned for more videos.
Disclaimer :
All video’s and tutorials are for informational and educational purposes only. The tutorials and videos provided there is only for those who are interested to learn about Cyber security, Penetration Testing and malware analysis. Hacking tutorials is against misuse of the information and we strongly suggest against it.
All tutorials and videos have been made using our own routers, servers, websites and other resources, they do not contain any illegal activity. We do not promote, encourage, support or excite any illegal activity or hacking without written permission in general. We want to raise security awareness and inform our readers on how to prevent themselves from being a victim of hackers. If you plan to use the information for illegal purposes, please leave this website now. We cannot be held responsible for any misuse of the given information.
1. Information provided on this Channel are for educational purposes only. This channel is no way responsible for any misuse of the information.
2. This Channel is all about ethical hacking.
3. This Channel is totally meant for providing information on “Computer Security”, “Computer Programming” and other related computer tricks and tweaks topics and is no way related towards the terms “CRACKING” or “HACKING” (Unethical).
4. I’ll include few blogs which may contain the information related to ‘Hacking Password’ or ‘Hacking email accounts’ or similar terms. You shall not misuse the information the information to gain unauthorised access. Also be aware, performing hack attempts without permission on computers that you do not own is illegal.
5. I’ll not be responsible for any direct or indirect damage caused due to the usage of the information provided on this site.
6. I reserve the right to modify the Disclaimer at any time without notice.
6
views
Socket | Malayalam Tutorial | Hack the Box
Socket is a medium linux box, which hosts a webserver for scanning QR codes on port 80. On downloading the application we'll identify its trying to connect to vhost on port 5789. On exploiting sql injection on sqlite we can leak the credentials for the user. Root access can be gained by exploiting the loopholes in pyInstaller by including root files in spec files.
00:40 nmap
01:40 website
03:05 downloading the app
04:43 Analyzing the app
07:16 ws.qreader.htb
09:25 redirecting the traffic via burp
12:45 sql injection on sqlite
18:35 admin hash
21:24 identifying user
27:00 exploiting pyinstaller
14
views
TAKE OVER| PART 4 | BUG BOUNTY TUTORIAL | MALAYALAM | THM
Tutorial series focus on beginner level knowledge sharing series for those who are interested in bug bounty. Series covers both theory and practical's for common web application vulnerability. Stay tuned for more videos.
Disclaimer :
All video’s and tutorials are for informational and educational purposes only. The tutorials and videos provided there is only for those who are interested to learn about Cyber security, Penetration Testing and malware analysis. Hacking tutorials is against misuse of the information and we strongly suggest against it.
All tutorials and videos have been made using our own routers, servers, websites and other resources, they do not contain any illegal activity. We do not promote, encourage, support or excite any illegal activity or hacking without written permission in general. We want to raise security awareness and inform our readers on how to prevent themselves from being a victim of hackers. If you plan to use the information for illegal purposes, please leave this website now. We cannot be held responsible for any misuse of the given information.
1. Information provided on this Channel are for educational purposes only. This channel is no way responsible for any misuse of the information.
2. This Channel is all about ethical hacking.
3. This Channel is totally meant for providing information on “Computer Security”, “Computer Programming” and other related computer tricks and tweaks topics and is no way related towards the terms “CRACKING” or “HACKING” (Unethical).
4. I’ll include few blogs which may contain the information related to ‘Hacking Password’ or ‘Hacking email accounts’ or similar terms. You shall not misuse the information the information to gain unauthorised access. Also be aware, performing hack attempts without permission on computers that you do not own is illegal.
5. I’ll not be responsible for any direct or indirect damage caused due to the usage of the information provided on this site.
6. I reserve the right to modify the Disclaimer at any time without notice.
6
views
INFORMATION GATHERING & PROXIES | PART 3 | BUG BOUNTY TUTORIAL | MALAYALAM
Tutorial series focus on beginner level knowledge sharing series for those who are interested in bug bounty. Series covers both theory and practical's for common web application vulnerability. Stay tuned for more videos.
Disclaimer :
All video’s and tutorials are for informational and educational purposes only. The tutorials and videos provided there is only for those who are interested to learn about Cyber security, Penetration Testing and malware analysis. Hacking tutorials is against misuse of the information and we strongly suggest against it.
All tutorials and videos have been made using our own routers, servers, websites and other resources, they do not contain any illegal activity. We do not promote, encourage, support or excite any illegal activity or hacking without written permission in general. We want to raise security awareness and inform our readers on how to prevent themselves from being a victim of hackers. If you plan to use the information for illegal purposes, please leave this website now. We cannot be held responsible for any misuse of the given information.
1. Information provided on this Channel are for educational purposes only. This channel is no way responsible for any misuse of the information.
2. This Channel is all about ethical hacking.
3. This Channel is totally meant for providing information on “Computer Security”, “Computer Programming” and other related computer tricks and tweaks topics and is no way related towards the terms “CRACKING” or “HACKING” (Unethical).
4. I’ll include few blogs which may contain the information related to ‘Hacking Password’ or ‘Hacking email accounts’ or similar terms. You shall not misuse the information the information to gain unauthorised access. Also be aware, performing hack attempts without permission on computers that you do not own is illegal.
5. I’ll not be responsible for any direct or indirect damage caused due to the usage of the information provided on this site.
6. I reserve the right to modify the Disclaimer at any time without notice.
9
views
INFORMATION GATHERING & PROXIES | PART 3 | BUG BOUNTY TUTORIAL | MALAYALAM
Tutorial series focus on beginner level knowledge sharing series for those who are interested in bug bounty. Series covers both theory and practical's for common web application vulnerability. Stay tuned for more videos.
Disclaimer :
All video’s and tutorials are for informational and educational purposes only. The tutorials and videos provided there is only for those who are interested to learn about Cyber security, Penetration Testing and malware analysis. Hacking tutorials is against misuse of the information and we strongly suggest against it.
All tutorials and videos have been made using our own routers, servers, websites and other resources, they do not contain any illegal activity. We do not promote, encourage, support or excite any illegal activity or hacking without written permission in general. We want to raise security awareness and inform our readers on how to prevent themselves from being a victim of hackers. If you plan to use the information for illegal purposes, please leave this website now. We cannot be held responsible for any misuse of the given information.
1. Information provided on this Channel are for educational purposes only. This channel is no way responsible for any misuse of the information.
2. This Channel is all about ethical hacking.
3. This Channel is totally meant for providing information on “Computer Security”, “Computer Programming” and other related computer tricks and tweaks topics and is no way related towards the terms “CRACKING” or “HACKING” (Unethical).
4. I’ll include few blogs which may contain the information related to ‘Hacking Password’ or ‘Hacking email accounts’ or similar terms. You shall not misuse the information the information to gain unauthorised access. Also be aware, performing hack attempts without permission on computers that you do not own is illegal.
5. I’ll not be responsible for any direct or indirect damage caused due to the usage of the information provided on this site.
6. I reserve the right to modify the Disclaimer at any time without notice.
3
views
Bug Bounty | Malayalam Tutorial series | PART 2 | TryHackme | Httpindetail
Tutorial series focus on beginner level knowledge sharing series for those who are interested in bug bounty. Series covers both theory and practical's for common web application vulnerability. Stay tuned for more videos
Like | Share and Subscribe
Tryhackme room
https://tryhackme.com/room/httpindetail
Disclaimer :
All video’s and tutorials are for informational and educational purposes only. The tutorials and videos provided there is only for those who are interested to learn about Cyber security, Penetration Testing and malware analysis. Hacking tutorials is against misuse of the information and we strongly suggest against it.
All tutorials and videos have been made using our own routers, servers, websites and other resources, they do not contain any illegal activity. We do not promote, encourage, support or excite any illegal activity or hacking without written permission in general. We want to raise security awareness and inform our readers on how to prevent themselves from being a victim of hackers. If you plan to use the information for illegal purposes, please leave this website now. We cannot be held responsible for any misuse of the given information.
1. Information provided on this Channel are for educational purposes only. This channel is no way responsible for any misuse of the information.
2. This Channel is all about ethical hacking.
3. This Channel is totally meant for providing information on “Computer Security”, “Computer Programming” and other related computer tricks and tweaks topics and is no way related towards the terms “CRACKING” or “HACKING” (Unethical).
4. I’ll include few blogs which may contain the information related to ‘Hacking Password’ or ‘Hacking email accounts’ or similar terms. You shall not misuse the information the information to gain unauthorised access. Also be aware, performing hack attempts without permission on computers that you do not own is illegal.
5. I’ll not be responsible for any direct or indirect damage caused due to the usage of the information provided on this site.
6. I reserve the right to modify the Disclaimer at any time without notice.
#parrotos
#kalilinux
#cybersecurity
#ethicalhackingmalayalam
#cybersecuritymalayalam
6
views
Httpindetail lBug BOUNTY TUTORIAL | Malayalam | PART 2 | TryHackme
Tutorial series focus on beginner level knowledge sharing series for those who are interested in bug bounty. Series covers both theory and practical's for common web application vulnerability. Stay tuned for more videos
Like | Share and Subscribe
Tryhackme room
https://tryhackme.com/room/httpindetail
For any queries text me on Insta no spamming please.
https://www.instagram.com/kn19ht.s3c/
Disclaimer :
All video’s and tutorials are for informational and educational purposes only. The tutorials and videos provided there is only for those who are interested to learn about Cyber security, Penetration Testing and malware analysis. Hacking tutorials is against misuse of the information and we strongly suggest against it.
All tutorials and videos have been made using our own routers, servers, websites and other resources, they do not contain any illegal activity. We do not promote, encourage, support or excite any illegal activity or hacking without written permission in general. We want to raise security awareness and inform our readers on how to prevent themselves from being a victim of hackers. If you plan to use the information for illegal purposes, please leave this website now. We cannot be held responsible for any misuse of the given information.
1. Information provided on this Channel are for educational purposes only. This channel is no way responsible for any misuse of the information.
2. This Channel is all about ethical hacking.
3. This Channel is totally meant for providing information on “Computer Security”, “Computer Programming” and other related computer tricks and tweaks topics and is no way related towards the terms “CRACKING” or “HACKING” (Unethical).
4. I’ll include few blogs which may contain the information related to ‘Hacking Password’ or ‘Hacking email accounts’ or similar terms. You shall not misuse the information the information to gain unauthorised access. Also be aware, performing hack attempts without permission on computers that you do not own is illegal.
5. I’ll not be responsible for any direct or indirect damage caused due to the usage of the information provided on this site.
6. I reserve the right to modify the Disclaimer at any time without notice.
#parrotos
#kalilinux
#cybersecurity
#ethicalhackingmalayalam
#cybersecuritymalayalam
3
views
Inject | Hack the Box | malayalam | Walkthrough
Inject is easy linux box which hosts a website port 8080. LFI vulnerability allows us to read the source code for the site and also another user's creds. Leaked source allow use to identify RCE which enables us the initial access to the box. Then exploiting the cron we will gain root access.
0:00 nmap
01:07 enumeration
02:22 file upload
02:47 lfi
08:52 RCE
11:02 frank user
14:15 Phil
19:17 Root
https://affiliate.hackthebox.com/29icft3zq24o
Disclaimer :
All video’s and tutorials are for informational and educational purposes only. The tutorials and videos provided there is only for those who are interested to learn about Cyber security, Penetration Testing and malware analysis. Hacking tutorials is against misuse of the information and we strongly suggest against it.
All tutorials and videos have been made using our own routers, servers, websites and other resources, they do not contain any illegal activity. We do not promote, encourage, support or excite any illegal activity or hacking without written permission in general. We want to raise security awareness and inform our readers on how to prevent themselves from being a victim of hackers. If you plan to use the information for illegal purposes, please leave this website now. We cannot be held responsible for any misuse of the given information.
1. Information provided on this Channel are for educational purposes only. This channel is no way responsible for any misuse of the information.
2. This Channel is all about ethical hacking.
3. This Channel is totally meant for providing information on “Computer Security”, “Computer Programming” and other related computer tricks and tweaks topics and is no way related towards the terms “CRACKING” or “HACKING” (Unethical).
4. I’ll include few blogs which may contain the information related to ‘Hacking Password’ or ‘Hacking email accounts’ or similar terms. You shall not misuse the information the information to gain unauthorised access. Also be aware, performing hack attempts without permission on computers that you do not own is illegal.
5. I’ll not be responsible for any direct or indirect damage caused due to the usage of the information provided on this site.
6. I reserve the right to modify the Disclaimer at any time without notice.
#parrotos
#kalilinux
#cybersecurity
#ethicalhackingmalayalam
#cybersecuritymalayalam
#lfi
#spring
13
views