Комментарии:
phenomenal presentation, well done!
ОтветитьThis is great. Thank you,
ОтветитьAwesome video !
ОтветитьWhat a great video
ОтветитьGreat video, helped a lot!
ОтветитьThis was a fantastic explanation. Thank you!!
Ответитьgreat video man ... wait for new ones.. thanks
ОтветитьWow, such a high quality information and presentation. Thank you.
ОтветитьGreat information delivered in exceptional quality. Superb.
ОтветитьOne video only I got what I wanted. thanks
ОтветитьIncredible video!!
ОтветитьThis was lovely! Thanks for creating and sharing this amazing video!
ОтветитьWell done, I hope you start your videos back up.
ОтветитьGreat video and really well explained, thank you
Ответитьbest video I've seen so far explaining COM
ОтветитьDudeee, this is such a great video! Thank you!
ОтветитьWow! You are amazing! You clearly explained in 12 minutes what it took me 2 months to understand ! Thanks for the excellent presentation
ОтветитьGreat video! Thanks alot.
ОтветитьThank you for arming me with what I need to defend against hackers for hire. Great video, keep them coming!
ОтветитьThank you for this!
ОтветитьThat channel is…no words…too much!!!Congrats
ОтветитьThank you for your great content
ОтветитьAwesome!
ОтветитьEvery time I watch your videos I am blown away by the clarity of your exposition.
Thank you for making such wonderfully enlightening content!
Excellent and straight to the point explanation for this technique. I still need to read a little into this, but this has definitely given me a better understanding of COM Hijacking. Thank you for posting such useful content on yt, you've gained a new subscriber in me 😁
ОтветитьAny resources books, you obviously know a lot of stuff. CompTia Sec+ ? OSCP ?
ОтветитьYou mentioned that a windows standard user can only modify his own registry hive. So how would an attacker attack someone else? - Wouldn't this only work if the same windows standard user is logged on (which is the attacker in this case)?
ОтветитьRealy good explaination. Ty so much
ОтветитьThanks for the video, very insightful =)
ОтветитьAwesome content man!
I'm going to share this!
Where can we get the code for context menu file exfiltration cpp file
ОтветитьThis video is so informative!!
ОтветитьGreat video. Could you share your code regarding the COMProxy passthrough with reverse shell. I'm having issues getting this bit working?
ОтветитьAmazing Video! Cleary explained with details. Keep it up!
ОтветитьSuch a high quality video. Keep it up!
Ответить