$9060 OS Command Injection POC | Private Bug Bounty Program 2023 | P1 Insecure OS Firmware

preview_player
Показать описание
$9060 OS Command Injection POC | Private Bug Bounty Program 2023 | P1 Insecure OS/Firmware
-----------------------------------------------------------------------
------------------------------------------------------------------------
Embark on an exhilarating journey into the world of cybersecurity and ethical hacking as we explore a real-world Unauthenticated Remote Code Execution Exploit that led to a $9060 bug bounty reward. This Proof of Concept (PoC) demonstration unveils the steps behind this successful hack, showcasing how vulnerabilities can result in reverse shell. Stay tuned for an insightful exploration of cybersecurity and ethical hacking in 2023!
------------------------------------------------------------------------

Path:

Shodan Query:
Рекомендации по теме
Комментарии
Автор

Finally you solved my problem of how to get interactive shell and port forwarding with ngrok 🎉❤

MrHome-iv
Автор

Wooww buddy, veryy nice... Awsome.. i am really jealous of you; in a right way :)... Wonderfull find...

sudhas
Автор

Excellent Video Brother. How to discover endpoints and hidden parameters for SQL Injection, XSS, LFI, RFI, RCE, OS Command Injection, CSTI, and SSTI web application vulnerabilities? Thanks

Free.Education
Автор

can you explain how you approach the target and how you get to know that there is os injection

RajuHa-gm
Автор

बहुत बढ़िया वीडियो भाई। SQL इंजेक्शन, XSS, LFI, RFI, RCE, OS कमांड इंजेक्शन, CSTI, और SSTI वेब एप्लिकेशन कमजोरियों के लिए एंडपॉइंट और छिपे हुए पैरामीटर कैसे खोजें? धन्यवाद

Free.Education
Автор

Very cool. I watched the video but I still don’t understand. Can you tell me your steps? Steps after subdomain search

rootroot-nb
Автор

Do you use a vpn or tor to add a little bit of security and privacy

tech_N
Автор

I like Dr FarFar also😂, thank you for sharing 🙏

DevPoint.
Автор

Nice bro.
Please make large videos on other content deeply

prudhvikonakalla
Автор

hello abhishek, do u use vulnerbility scanner to find a vulnerable parameter or do you manually test each one

tokyorockstarVALORANT
Автор

Hi can you please link cve id you exploited and is it in nuclei templates?

studiospan
Автор

Hi brother, did you use some wordlist to fuzz and get that weird .sh file? And how did you guess and test for that particular attack?

pittsec
Автор

How do you figure out where to test for shellshock?

BruceWayne-zwdt
Автор

I just stumbled on your channel, what is the name of the that httpclient your using?

---webx
Автор

Hi, how did you prepared your payload?

Mustafa-wqew
Автор

just wanna ask one thing did you use some publicly available cve? to exploit it like if it was running a vulnerable version of sonic firewall. pls reply..

AyushKumar-rguk
Автор

bro aap ye sab kaha se sikh te ho please tell me

vivekkhandagre
Автор

Please suggest me some resources where I could lear rce

cksuwarnaraj
Автор

How still be shell shock vulnerability in today's world

tntxqx
Автор

Are you exploiting it based on a previously published CVE?

zedvn