- id: 33bc7119-2ac7-44e6-b5c9-61aaafe59af6
- id: de278e78-2c0d-484f-a71b-95e62d0c886c
%%33bc7119-2ac7-44e6-b5c9-61aaafe59af6_start%%
truedata-ws · PyPI
Truedata's Official Python Package
%%33bc7119-2ac7-44e6-b5c9-61aaafe59af6_end%%
%%de278e78-2c0d-484f-a71b-95e62d0c886c_start%%
Mind Blowing 🤯 Reverse Shell Demo with DNS data bouncing exfiltration!
Big thanks to Brilliant for sponsoring this video! Get started with a free 30 day trial and 20% discount: https://Brilliant.org/DavidBombal The First 200 people that sign up will get a special discount.
Disclaimer: This video is for educational purposes only.
// Jakoby’s SOCIAL// YouTube: https://www.youtube.com/c/IamJakoby LinkedIn: https://www.linkedin.com/in/i-am-jakoby X: https://x.com/i_am_jakoby Instagram: https://www.instagram.com/i_am_jakoby/ GitHub: https://github.com/I-Am-Jakoby TikTok: https://www.tiktok.com/@i_am_jakoby
// YouTube Video REFERENCE // Next Gen Hacker?: https://youtu.be/6jqJ7Ga5CoE The best Hacking Courses & Certs? Your 2024 roadmap to Pentester success: https://youtu.be/10P4aoXdXTI
// David's SOCIAL // Discord: https://discord.com/invite/usKSyzb X: https://www.twitter.com/davidbombal Instagram: https://www.instagram.com/davidbombal LinkedIn: https://www.linkedin.com/in/davidbombal Facebook: https://www.facebook.com/davidbombal.co TikTok: http://tiktok.com/@davidbombal YouTube: https://www.youtube.com/@davidbombal
// MY STUFF // https://www.amazon.com/shop/davidbombal
// SPONSORS // Interested in sponsoring my videos? Reach out to my team here: [email protected]
// MENU //
00:00 - Coming Up
00:57 - Sponsored Section
03:01 - Intro
03:19 - Power Shell Gallery
05:05 - Modules
06:28 - Microsoft Patch
08:04 - Consulting with the Cybersecurity Community
08:58 - Microsoft Honeypot
10:09 - Models by Jakoby
11:33 - Running Models
12:01 - How Models Function
13:43 - The Vulnerability of The Site
15:30 - Ransomware
18:20 - Owning Models
19:13 - Bug Bounty Program
22:23 - Reverse Shell Generator
29:25 - Methods For Execution
31:49 - How To Solve
33:47 - Engage with the Ethical Hackers
34:20 - Exfiltration Data Bouncing
39:12 - Demo
39:56 - Capture DNS Traffic
41:01 - Running Vanish
50:05 - Running A lot of Testing, No Man’s Land
52:29 - Get ahold of IamJakoby
54:08 - Hak5 Payload
55:57 - Imposter Syndrome
57:41 - Background Story into Hacking
01:07:27 - Stationed in Hawaii
01:10:00 - Conclusion
Disclaimer: This video is for educational purposes only.
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
hak5 #cybersecurity #microsoft
%%de278e78-2c0d-484f-a71b-95e62d0c886c_end%%