Create a Reverse Shell Using a Fake MP4 File Tutorial
Earn . Learn What You Need to Get Certified (90 Off): How to Pop a Shell Using a Video Full Tutorial: Subscribe to Null Byte: Nick s Twitter: Cyber Weapons Lab, Episode 199 In our latest video, we re showing how hackers can take advantage of flaws in common Linux file system managers to modify a video to run malicious code, phoning back to a hacker s server and running commands. Big shout out to Tokyoneon whose article on Null Byte serves as the basis for this cybersecurity tutorial. To learn more, check out Tokyoneon s article on Null Byte: Follow Null Byte on: Twitter: Flipboard: Website: Weekly newsletter: Vimeo:
|
|