Earn $$. Learn What You Need to Get Certified (90% Off): How to Pop a Shell Using a Video Full Tutorial: Subscribe to Null Byte: Nick's Twitter: Cyber Weapons Lab, Episode 199 In our latest video, we're showing how hackers can take advantage of flaws in common Linux file system managers to modify a video to run malicious code, phoning back to a hacker's server and running commands. Big shout out to Tokyoneon (), whose article on Null Byte serves as the basis for this cybersecurity tutorial. To learn more, check out Tokyoneon's article on Null Byte: Follow Null Byte on: Twitter: Flipboard: Website: Weekly newsletter: Vimeo:
Hide player controls
Hide resume playing