Execute Hidden Python Commands [Tutorial]

preview_player
Показать описание
Hide a Stager in One Line of Code

Cyber Weapons Lab, Episode 153

A stager is how a hacker establishes a communication channel between them and their target in preparation for an attack. Today, on Cyber Weapons Lab, we'll explore how a stager works and how to execute any hidden Python commands you sneak onto a target's machine.

Follow Null Byte on:
Рекомендации по теме
Комментарии
Автор

I did this once in MATLAB to prank a friend, was supposed to download and set a desktop background saying "I love Windows" on his Linux machine. Worked flawlessly in my VM, but it somehow ended up corrupting his root user.. We still don't know how and why, but I made sure to compensate him in beer for his troubles, so no hard feelings thankfully :D

Droggelbecherbot
Автор

You can import multiple modules in python with one import statement using commas. I.e. import json, requests. Also, ";"s count as new lines.

Gavinnnnnnnnnnnnnnn
Автор

I'm sure he still stare at the camera while he is explaining the code.

youraveragedirtbikerider
Автор

Can you run Python as a daemon? Or you have to run it in a screen instance?

hatrez
Автор

You can also encrypt whole payload file by reverse base64 and then execute it without dropping it on disk

tomashublik
Автор

Thank you so much! I love python. 💗 Especially when in the buffer stack.

Ms.Robot.
Автор

Awesome! Thanks a lot.
Chances are in a remote and out-to-date system there is no requests library or Python3, so using the Python2 and standard library you may achieve the exact outcome..
Please keep feeding us so high quality stuff! #ThanksForAllTheFish

bendover
Автор

Modems with wpa 2 vulnerabilities are hacked.
New modem passwords are broken?

mehmetk
Автор

Hey Kody can you make a video about bug bounty/ find vulnerability in sites. pls

franciscolucarini
Автор

Hello nullbyte, please how i can have. Two wlan card like wlan0 and wlan1 i should have 2 wifi card ? Thanks for your answering.

zardashtjaza
Автор

System shock is a good game. Nice picture.

danielwasserlauf
Автор

Kody I wanna know that if SS7 is legal to exploit and why dont you focus on networks nowadays loved your vedios though!

uppypasha
Автор

Hey are you the one who have another channel called "learning code by gaming"

aniketsingh
Автор

This can make awesome python malware payload.

mr.roboter
Автор

Excuse me this is a query. I have wifi with 802.11x security which nobody is able to connect in my university. Plz Respond so i can fully wxplain my query

apurvbose
Автор

You know that you can use "import requests, json, base64"?

rizerphe
Автор

OMG Thank you, Kody! Python will always be my favourite programming language because it's my first learnt language <3 What is your favourite programming language?

vodoo
Автор

How use metasploit to generate an security patch bypassing app plz help to make it on termux app

shivampatel
Автор

Excellent as always, thanks for sharing 👍🏼

iangraham
Автор

Hey, Null. Can you show us how to make a homemade vpn (through Linux server or raspberry pi) and your thoughts on making a vpn vs buying one? I would like your input on the pros and cons.

Great video by the way and keep up the awesome content

jaybofa