Skip to content

  • id: 33bc7119-2ac7-44e6-b5c9-61aaafe59af6
  • id: de278e78-2c0d-484f-a71b-95e62d0c886c

%%33bc7119-2ac7-44e6-b5c9-61aaafe59af6_start%%

truedata-ws · PyPI

Omnivore | Original

Truedata's Official Python Package


%%33bc7119-2ac7-44e6-b5c9-61aaafe59af6_end%%

%%de278e78-2c0d-484f-a71b-95e62d0c886c_start%%

Mind Blowing 🤯 Reverse Shell Demo with DNS data bouncing exfiltration!

Omnivore | Original

Big thanks to Brilliant for sponsoring this video! Get started with a free 30 day trial and 20% discount: https://Brilliant.org/DavidBombal The First 200 people that sign up will get a special discount.

Disclaimer: This video is for educational purposes only.

// Jakoby’s SOCIAL// YouTube: https://www.youtube.com/c/IamJakoby LinkedIn: https://www.linkedin.com/in/i-am-jakoby X: https://x.com/i_am_jakoby Instagram: https://www.instagram.com/i_am_jakoby/ GitHub: https://github.com/I-Am-Jakoby TikTok: https://www.tiktok.com/@i_am_jakoby

// YouTube Video REFERENCE // Next Gen Hacker?: https://youtu.be/6jqJ7Ga5CoE The best Hacking Courses & Certs? Your 2024 roadmap to Pentester success: https://youtu.be/10P4aoXdXTI

// David's SOCIAL // Discord: https://discord.com/invite/usKSyzb X: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube: https://www.youtube.com/@davidbombal

// MY STUFF // https://www.amazon.com/shop/davidbombal

// SPONSORS // Interested in sponsoring my videos? Reach out to my team here: [email protected]

// MENU // 00:00 - Coming Up 00:57 - Sponsored Section 03:01 - Intro 03:19 - Power Shell Gallery 05:05 - Modules 06:28 - Microsoft Patch 08:04 - Consulting with the Cybersecurity Community
08:58 - Microsoft Honeypot 10:09 - Models by Jakoby 11:33 - Running Models 12:01 - How Models Function 13:43 - The Vulnerability of The Site 15:30 - Ransomware 18:20 - Owning Models 19:13 - Bug Bounty Program 22:23 - Reverse Shell Generator 29:25 - Methods For Execution 31:49 - How To Solve 33:47 - Engage with the Ethical Hackers 34:20 - Exfiltration Data Bouncing 39:12 - Demo 39:56 - Capture DNS Traffic 41:01 - Running Vanish 50:05 - Running A lot of Testing, No Man’s Land 52:29 - Get ahold of IamJakoby 54:08 - Hak5 Payload 55:57 - Imposter Syndrome 57:41 - Background Story into Hacking 01:07:27 - Stationed in Hawaii 01:10:00 - Conclusion

Disclaimer: This video is for educational purposes only.

Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!

hak5 #cybersecurity #microsoft


%%de278e78-2c0d-484f-a71b-95e62d0c886c_end%%