Windows 11 hacking using a reverse shell // NETCAT and Hak5 OMG Cable

preview_player
Показать описание
Create your own virtual machine on Linode with 60-day $100 credit*

* Please note: Credits expire in 60 days. Errata: The promo code mentioned in the video is incorrect - you need to use the link above to automatically add credit.

* Thanks to Linode for sponsoring this video!

// MENU //
0:00 ▶️ Introduction
1:05 ▶️ Network Topology
3:40 ▶️ Method 1: Easy Method
5:09 ▶️ OMG Cable
8:00 ▶️ Method 2

// STEPS and INSTRUCTIONS //

// SOCIAL //

// MY STUFF //

// SPONSORS //

hak5
netcat
rat
hak5 omg
omg cable
hak5 reverse shell
rubber ducky
windows
windows 11
windows 10
real time protection
windows anti virus
windows real time protection

Disclaimer: This video is for educational purposes only. I own all equipment used for this demonstration. No actual attack took place on any websites.

Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!

#hak5 #netcat #reverseshell
Рекомендации по теме
Комментарии
Автор

Create your own virtual machine on Linode with 60-day $100 credit*

* Please note: Credits expire in 60 days. Errata The promo code mentioned in the video is incorrect - you need to use the link above to automatically add credit.

* Thanks to Linode for sponsoring this video!

// MENU //
0:00 ▶ Introduction
1:05 ▶ Network Topology
3:40 ▶ Method 1: Easy Method
5:09 ▶ OMG Cable
8:00 ▶ Method 2

// STEPS and INSTRUCTIONS //

// SOCIAL //

// MY STUFF //

// SPONSORS //

Disclaimer: This video is for educational purposes only. I own all equipment used for this demonstration. No actual attack took place on any websites.

Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!

davidbombal
Автор

If David used his skills in a bad way, there would be some massive problems to his targets, love your content David! Hope you see this!

officialakbuda
Автор

-Great content Professor David.
-Basically the device connected to the PC opens a session to the server where we send the commands that return to the host where the session was opened.
-Similarly when people download infected files they turn their PCs unknowingly into a Nod (Soldier PC) in a future botnet attack that is common today.
-Or have your data stolen your PC for example.
-Always good to be very careful with what we download, run or connect to our PCs.
-Thank you very much for the knowledge Professor David Bombal...!!!

educastellini
Автор

Really clear tutorial - step by step - so we can follow alone - thank you for your time and effort best wishes for 2022

msphonerepairmaldegem
Автор

I love watching these tutorials because it helps me be more informed about threats and how to protect myself and my family and business, so thank you for always providing such informative videos! Theoretically, could this be modified so that the payload connects over the TOR network to a TOR hidden service?

starblaiz
Автор

as someone who is wants to be a network and system admin/engineer your hacking videos have been very helpful

Italiangentleman
Автор

Hi David thanks again for this education.
I just wanted to tell you that because of your education i want to be part of the youtubers in IT so i'm working currently on video's inspired by your hard work. Every video i wil mention you as my primal motivation :) Happy new year!

SystemDemon
Автор

You are way cooler than the bears coffee dude teaching hacking. 🔥🔥🔥

khalifakhalifi
Автор

I like how clean this video is and how good it is genrally, than you and have a great new year!

getalife
Автор

Advance Happy new year david bombal 😊😊😊

ashwinkannan
Автор

Happy New Year David! Cool Channel I’m retired but learning as a hobby and keep the mind sharp. Your Always informative and interesting! Stay cool. 😎

Cipher
Автор

I have a question, in method 2 that you taught, the target machine needs to execute the script for you to gain access to it, or is it not necessary for it to execute?, because if you think about it that way you could only use this way to physically apply the code to target machine

biel-tr
Автор

Just want to say aside firm the knowledge I really appreciate the video production. Keep up the good work.

KefashWhite
Автор

Great stuff clearly explained, as usual. Hope you are well David.

shinty
Автор

I really like these videos, thanks David.

guilherme
Автор

You the best David, I'm gonna try it in my lab right now, this is really cool :)

gcobanindzoyi
Автор

You have great tutorial videos👍…Happy New Year 🎉

KimmoTervakari
Автор

homie stays on that 11 and shits dope

chrisborland
Автор

Every video of Yours is Gem 💎💎💎

More Power to #DavidBombal

From Kashmir

nadeembhat
Автор

Your all video's are very good and very informative keep it up David and happy new year

adithyans.m