Комментарии:
this video is more sponsor than video. This guy got greedy as fuck
ОтветитьThe guy's vocabulary burst 50 nerves in less than 1ns.
Ответитьnot great, just a long form ad lol
ОтветитьThe (researchers) really need to update that for the most recent 2023 vulnerabilities aka zero days ones. Personally, I'm not interested in the older ones, because they are not as interesting as the zero days vulnerablies of 2023. I'm probably going to get looked down upon for saying that, but I don't care.😎
ОтветитьAny link to binwalk or those tool developers like if the utility of the tools are usually this bit intense what about the tools creat? 😲😲😲😲
ОтветитьPlease make a series about firmware analysis and bug hunting! Absolut cool stuff and would love to learn more about it!
ОтветитьI used telnet to connect to my router and netcat to dump all files and memory.
ОтветитьI'd like to se a deeper dive that connects right here? Please, John!
ОтветитьMy GOD... TP-LINK in certain cases... leave me... open mouth.
ОтветитьYay! Im an EE in embedded firmware, I love seeing you do this. Please more!
ОтветитьThanks for posting
ОтветитьBeing able to push out a bad firmware update to networked devices, takes a lot of patience but if you like that type of thing... Router firmware typically is a small file, just getting familiar with that can be fun too. Knowing how to modify and package 'bad code' is another whole skill-set. Printers are also fun, PRET helps with that, a bit of an older tool now too. They never patch , smart devices are lucky if they get one update 2 tops before its forgotten and forever vulnerable. I'd keep the hardware part, and software separate if its a topic you are going to spend time on. I'd be happy to see you go through it lol , make my brain itch.
ОтветитьThat would be pretty interesting. Opening a firmware to a forrest camera, and finding a bunch of stuff there.
ОтветитьKavigihan is also a very good box creator on HTB 😉 Hi Kavi !
ОтветитьBugProve doesn't work for my embedded devices, but the idea is awesome.
ОтветитьGlad you took time to read the article!
ОтветитьEntire video was just a sponsored ad for bug prove
ОтветитьPretty fun commercial.
ОтветитьI see quite a few people upset cause its sponsored content so just wanted to come down here and say i thought the video was awesome. It brings to light an attac vector people often overlook and shows off a dope tool in the process.
Keep up the good work brother!
Was waiting for this for quite a while tbh.. thanks! :)
ОтветитьHey, there's this guy called save it for parts and basically he hacks hardware and firmware for just about anything, including reading satellites. Would think it would be pretty awesome for someone who's on the software side to team up with someone on the hardware side to do some bad ass hacks, ya know... for education and cuz people be broke... and omg cables be pricey
ОтветитьA big sponsor chunk
ОтветитьWoah BugProve looks cool
Ответитьat least can we see the password?!
ОтветитьA bit of a stinker, John. You're normally not one to sucker viewers into videos that are basically an ad. It'd be great if you can hint to videos being ads in the title or image.
ОтветитьI'm still trying to process the three DNS powershell scripts that you analyzed recently. Watching you slice and dice those scripts was INSANE! Now I need to figure out how to get a text message when you create new content so I can pull my car to the side of the road and watch your stuff the second it comes out!
ОтветитьMy favourite thing about John is not his elite computing skills, its his ability to slot 'hey' into each sentence and it go almost unnoticed because he does it so well. We need a hey counter John!
ОтветитьI hope to see more similar content for hardware hacking
ОтветитьAbsolutely amazing, thank you John!!
Ответить❤❤Super ❤❤❤❤
Ответить😀😀
ОтветитьAwesome, wanna c more, keep up the good work
ОтветитьYou Are The Best
Ответить👍👍👍👍
ОтветитьNice
ОтветитьNice
ОтветитьDark mode is on the roadmap, no worries.
Ответитьthis ad for this video is longer than the content
ОтветитьIt has only been recent years where we started arguing to clients that they had to replace legacy firewalls. It used to be we didn't do anything with them if they were still working but then several high profile vulnerabilities pushed us into a updating and replacing program. It is crazy as we had clients with 15 year old firewalls at one point.
ОтветитьPls show us how to use esp32 to manuclipate networks
ОтветитьWhenever you make a video it is always helpful and I get to learn something new!
ОтветитьHello 👋
ОтветитьOpenwrt
ОтветитьIf Jhon said " i don't know... " he's going to master the it😊👋
ОтветитьAmazing. Might have to talk to my dad about changing our wifi password tho
ОтветитьI'll catch up on this on tiktok ;) seriously though. Thanks for all you do John!
Ответить😊Lots of love from Nepal..!❤
Ответить