Hi, In this video I have covered the following topics: What is pkexec How pkexec works Demonstration of Privilege Escalation using SUID pkexec STEPS to Achieve Root Access https://youtu.be/ytRokFfjW-E
Hey guys, In this video, I have covered the following topics: What is log4j Log4j Vulnerability (CVE: 2021-44228) Mitigation or Fix What is LDAP (Lightweight Directory Access Protocol) What is JNDI (Java Naming & Directory Interface) How Exploit or Payload …
In this video I have covered the following topics Address Resolution Protocol (ARP) IP Address & MAC Address ARP Request & ARP Response ARP Cache ARP Spoofing/Poisoning Demonstration of ARP Spoofing/Poisoning Attack Why & How ARP Spoofing Works What Can …
In this video I have explained the following topics: Server Side Template Injection Why SSTI arises in web applications How SSTI is different from XSS Demonstration of the Attack (SSTI) Detection of SSTI Detection of SSTI by automation in Bash …
In this video I have explained the following topics: What is authentication? What is authorization? Account TakeOver Vulnerability Brute-Force Attack & it’s prevention Session-Hijacking by XSS & it’s prevention Session Side-Jacking & it’s prevention Account TakeOver by cross-site request forgery …
Hey guys, In this video, I will explain the following topics: What is path traversal attack in web application security How it can be exploited? What is local file inclusion What is relative and absolute path with example Demonstration of …