Earn $$. Learn What You Need to Get Certified (90% Off): https://nulb.app/cwlshop
How to Pop a Shell Using a Video
Full Tutorial: https://nulb.app/x4k28
Subscribe to Null Byte: https://goo.gl/J6wEnH
Nick's Twitter: https://twitter.com/nickgodshall
Cyber Weapons Lab, Episode 199
In our latest video, we're showing how hackers can take advantage of flaws in common Linux file system managers to modify a video to run malicious code, phoning back to a hacker's server and running commands. Big shout out to Tokyoneon (https://twitter.com/tokyoneon_), whose article on Null Byte serves as the basis for this cybersecurity tutorial.
To learn more, check out Tokyoneon's article on Null Byte: https://nulb.app/x4k28
Follow Null Byte on:
Twitter: https://twitter.com/nullbyte
Flipboard: https://flip.it/3.Gf_0
Website: https://null-byte.com
Weekly newsletter: https://eepurl.com/dE3Ovb
Vimeo: https://vimeo.com/channels/nullbyte
How to Pop a Shell Using a Video
Full Tutorial: https://nulb.app/x4k28
Subscribe to Null Byte: https://goo.gl/J6wEnH
Nick's Twitter: https://twitter.com/nickgodshall
Cyber Weapons Lab, Episode 199
In our latest video, we're showing how hackers can take advantage of flaws in common Linux file system managers to modify a video to run malicious code, phoning back to a hacker's server and running commands. Big shout out to Tokyoneon (https://twitter.com/tokyoneon_), whose article on Null Byte serves as the basis for this cybersecurity tutorial.
To learn more, check out Tokyoneon's article on Null Byte: https://nulb.app/x4k28
Follow Null Byte on:
Twitter: https://twitter.com/nullbyte
Flipboard: https://flip.it/3.Gf_0
Website: https://null-byte.com
Weekly newsletter: https://eepurl.com/dE3Ovb
Vimeo: https://vimeo.com/channels/nullbyte
Comments