DNS Remote Code Execution: Finding the Vulnerability  (Part 1)

DNS Remote Code Execution: Finding the Vulnerability (Part 1)

Flashback Team

1 год назад

284,065 Просмотров

Ссылки и html тэги не поддерживаются


Комментарии:

Your Linux Guy🐧
Your Linux Guy🐧 - 22.09.2023 08:47

Nice video, added this to my watch list, will comeback and share my thoughts, for the time being its time to work.

Ответить
Linlin Kong
Linlin Kong - 25.08.2023 14:15

Excellent work! I want to test my router , Are the mips-static.tgz and the fuzz tool open source?

Ответить
comosaycomosah
comosaycomosah - 21.08.2023 23:53

lmao i love these videos you two are relatable yet much smarter...ive learned quite abit watching you guys thanks💯

Ответить
this is really me
this is really me - 20.08.2023 17:19

Great format. This is so clearly described and spoken that I listened to it a SECOND time, as a “podcast”. Thanks for going that extra “kilometer” and describing what’s on-screen.

Ответить
The Insider
The Insider - 17.08.2023 15:28

$4000 for the online course. I don't even have $40.

Ответить
Full Power
Full Power - 16.08.2023 14:16

I have a Question for Experts what I can not extract from that what is. My Provider had a Damage in a Knot where a Car crashed in.... first the internetconnection was lost, a few Minutes....after That it was ok for a few Minutes.... then it crashed again and was a longer Time out of Order. Since that I can not connect my Handy and my TV but every other Device works as usual. One Thing is that my Handy and the TV dont find the Port anymore... How is that possible?

Ответить
Florian Poujade
Florian Poujade - 31.07.2023 10:59

Can't wait for part 2! :)

Ответить
Tear Here
Tear Here - 11.06.2023 12:29

I'm surprised this is free.. This kind of walk-through is something you get from paid courses.

Ответить
Elies Lou
Elies Lou - 10.06.2023 15:15

I love how this video starts by explaining what LAN is, and 2 minutes later it's binary reverse eng

Ответить
Cloud 9
Cloud 9 - 06.06.2023 08:24

I wonder what’s pornhub ? , going to check it out tonight

Ответить
Hariboo
Hariboo - 06.06.2023 06:20

what a nice research

Ответить
Tabycat kitty
Tabycat kitty - 03.06.2023 00:21

Crazy ammount of research, good job

Ответить
meowpower
meowpower - 01.06.2023 21:30

Sorry, can't talk right now, 200k people are hacking my LAN.

Ответить
Gh\x0st
Gh\x0st - 01.06.2023 16:24

Can't wait until the second part pops out. I really want to hit the ground running with this kind of exploitation

Ответить
🐙 squid
🐙 squid - 30.05.2023 12:11

Vamos 🔥🔥🎉

Ответить
Zhirayr Hakobyan
Zhirayr Hakobyan - 28.05.2023 14:56

Talk faster if you can please. It will only make good of your channel

Ответить
David Lo
David Lo - 26.05.2023 18:03

he's just showing off

Ответить
David Santos
David Santos - 26.05.2023 13:42

The best Pedro.

Ответить
kevin hernandez
kevin hernandez - 26.05.2023 07:44

No mamen están cabrones <3 (amazing work)

Ответить
Spawn
Spawn - 24.05.2023 18:01

Critters

Ответить
Anti Quark
Anti Quark - 20.05.2023 08:19

I feel like $20k is a paltry sum to pay hackers for a hardware (firmware?) Bug on a device sold to hundreds of thousands of people

Ответить
PwnySlaystation01
PwnySlaystation01 - 20.05.2023 02:17

Awaiting part 2!

Ответить
Jefferson Marques
Jefferson Marques - 17.05.2023 21:47

part 2 ??

Ответить
brakejet
brakejet - 16.05.2023 15:52

Another piece of software that forgot to never trust user input 🙃

Ответить
Hassan
Hassan - 13.05.2023 21:57

I appreciate every video in this channel, This is very useful. Thank you, guys.

Ответить
noredine
noredine - 12.05.2023 18:55

Seeing my exact router in this vid is funny and terrifying

Ответить
Mihai NICOLAE
Mihai NICOLAE - 11.05.2023 10:07

Love your voice, is so soothing for teaching/learning. Thanks!

Ответить
SwagSupreme
SwagSupreme - 11.05.2023 08:20

Waiting for part 2! Amazing work!

Ответить
aldelta19
aldelta19 - 10.05.2023 21:26

Zero dot zero dot zero dot zero… rofl

Ответить
snowdaysrule1
snowdaysrule1 - 10.05.2023 07:52

I don't think I've ever said "Oh my God you can do that?!" so many times while watching a video haha. Amazing stuff

Ответить
Mazen Alzahrani
Mazen Alzahrani - 09.05.2023 17:04

Ha Ha HA, Hack PS5 if you can...

Ответить
Noot Noot
Noot Noot - 07.05.2023 13:25

guess all these kind of exploits wouldn't happen if we all used Rust XD

Ответить
전재영
전재영 - 05.05.2023 06:16

DNS
DAS
닫힌문닫혀있는문
DZS
OPDZM
모래시계가작용하여연문

Ответить
Duntari Gaming
Duntari Gaming - 04.05.2023 22:30

Thats another lvl...

Ответить
Anonim
Anonim - 01.05.2023 01:34

Where is the second part?

Ответить
Blvck Games
Blvck Games - 25.04.2023 20:23

hell I really appreciate what this guys are doing, because I don't understand 70% of what they are talking about. There is soooo much to learn and it seems scary 🤯

Ответить
Mark C
Mark C - 24.04.2023 18:36

Just another example of cops thinking they're above those they're supposed to serve

Ответить
Sanfordfloridarepairs
Sanfordfloridarepairs - 24.04.2023 00:02

I have no clue wtf your saying half the time but, I still watch hoping something will stick. something better than nothing, right? I love hearing the actual thought process of the hack as if you're going threw it for the first time. I like this very much.

Ответить
Brotato Brosaurus
Brotato Brosaurus - 22.04.2023 19:24

Regardless of the exploit, it's pretty disturbing that stock router firmware is spamming DNS requests to arbitrary commercial domains, just to blink an LED light...

Ответить
bo feng
bo feng - 20.04.2023 09:32

where is part2? ❤

Ответить
-ncrypt
-ncrypt - 16.04.2023 22:32

Incredible work. I'm blown away to see this entire research from start to finish, including the thought process. Well done. I hope to one day be able to do what you do!

Ответить
Микола Микола
Микола Микола - 15.04.2023 15:43

Wooowww amazing!!!! But how did you run MIPS executable on PC? Or you we're was on target via ssh?

Ответить
Tony CamposMejia
Tony CamposMejia - 14.04.2023 23:17

Thanks for sharing

Ответить
Thomas
Thomas - 14.04.2023 17:23

So awesome that you guys share this knowledge, really, keep up the great work!

Ответить
Olivier Lasne
Olivier Lasne - 14.04.2023 15:51

Thank you for this

Ответить
PPP KenKen
PPP KenKen - 14.04.2023 00:06

Exploit machine language x000x

Ответить