- 26
- 40 895
Fusion Labs
Pakistan
Registrace 6. 04. 2024
Welcome to Fusion Labs, đĄïžđ»
Are you curious about the world of digital defense, penetration testing, and securing online systems? Look no further! On this channel, we dive deep into the realms of cyber security
Here's what you can expect:
Tutorials & Guides: Learn step-by-step how to conduct ethical hacking, from reconnaissance to exploitation and beyond. We break down complex concepts into easy-to-follow tutorials suitable for beginners and seasoned professionals alike.
Cybersecurity News & Updates: Stay ahead of the curve with our coverage of the latest cyber threats, vulnerabilities, and industry news. Understand the real-world implications and how they affect businesses and individuals.
Tool Reviews & Recommendations: Explore a variety of cybersecurity tools, software, and platforms through our unbiased reviews and recommendations.
Stay secure, stay informed, and let's explore the fascinating world of cyber security together.
Are you curious about the world of digital defense, penetration testing, and securing online systems? Look no further! On this channel, we dive deep into the realms of cyber security
Here's what you can expect:
Tutorials & Guides: Learn step-by-step how to conduct ethical hacking, from reconnaissance to exploitation and beyond. We break down complex concepts into easy-to-follow tutorials suitable for beginners and seasoned professionals alike.
Cybersecurity News & Updates: Stay ahead of the curve with our coverage of the latest cyber threats, vulnerabilities, and industry news. Understand the real-world implications and how they affect businesses and individuals.
Tool Reviews & Recommendations: Explore a variety of cybersecurity tools, software, and platforms through our unbiased reviews and recommendations.
Stay secure, stay informed, and let's explore the fascinating world of cyber security together.
CVE-2024-24919 Security Check point Gateway Explained | Bug Bounty | Fusion Labs
đ CVE-2024-24919 Security Gateway Vulnerability Explained
In this video, we dive into the critical security vulnerability affecting Check Point Security Gateways. Letâs explore the details of CVE-2024-24919 and understand why itâs crucial to take action.
Github Tool for CVE-2024-24919: github.com/mr-kasim-mehar/CVE-2024-24919-Exploit
đ What is CVE-2024-24919?
Description: CVE-2024-24919 is an information disclosure vulnerability that impacts the VPN component of Check Point Security Gateways.
Risk: Improper handling of sensitive data within the VPN gateway allows attackers to leak confidential information, including credentials and internal network details1.
đ Affected Systems:
Check Point Security Gateways with remote Access VPN or Mobile Access Software Blades enabled are at risk.
The vulnerability potentially allows an attacker to read certain information on internet-exposed Check Point Security Gateways2.
đĄïž Mitigation Steps:
Identify Affected Devices: Use tools like Intruderâs Attack Surface View to identify all affected Check Point devices.
Apply Patches: Ensure you apply the latest patches available for your specific device.
Enhanced Monitoring: Monitor device logs for suspicious activity related to the affected endpoint.
Stay Informed: Keep an eye on the Check Point advisory page for any updates2.
Remember, staying informed and taking timely action is crucial to protect your network infrastructure. Letâs secure our systems together! đ
Feel free to customize this description to fit your video style and audience. Good luck with your CZcams channel!
In this video, we dive into the critical security vulnerability affecting Check Point Security Gateways. Letâs explore the details of CVE-2024-24919 and understand why itâs crucial to take action.
Github Tool for CVE-2024-24919: github.com/mr-kasim-mehar/CVE-2024-24919-Exploit
đ What is CVE-2024-24919?
Description: CVE-2024-24919 is an information disclosure vulnerability that impacts the VPN component of Check Point Security Gateways.
Risk: Improper handling of sensitive data within the VPN gateway allows attackers to leak confidential information, including credentials and internal network details1.
đ Affected Systems:
Check Point Security Gateways with remote Access VPN or Mobile Access Software Blades enabled are at risk.
The vulnerability potentially allows an attacker to read certain information on internet-exposed Check Point Security Gateways2.
đĄïž Mitigation Steps:
Identify Affected Devices: Use tools like Intruderâs Attack Surface View to identify all affected Check Point devices.
Apply Patches: Ensure you apply the latest patches available for your specific device.
Enhanced Monitoring: Monitor device logs for suspicious activity related to the affected endpoint.
Stay Informed: Keep an eye on the Check Point advisory page for any updates2.
Remember, staying informed and taking timely action is crucial to protect your network infrastructure. Letâs secure our systems together! đ
Feel free to customize this description to fit your video style and audience. Good luck with your CZcams channel!
zhlĂ©dnutĂ: 258
Video
Bug Bounty $10000 | Password Reset Token Swapped Vulnerability POC | Proof of Concept | Fusion Lab
zhlĂ©dnutĂ 123PĆed 19 hodinami
Proof of Concept of Password reset token vulnerability Disclaimer Important Notice: The content provided in this video is intended for educational and informational purposes only. The demonstrations and techniques shown are conducted within a controlled environment and with explicit permission. Unauthorized exploitation of vulnerabilities without consent from the relevant parties is illegal and...
Bug Bounty: IDOR Explained in Hindi + Lab Solving Tutorial | Fusion Labs | #bugbounty
zhlĂ©dnutĂ 154PĆed dnem
Welcome to Fusion Labs! In this video, we dive deep into the world of Bug Bounties with a focus on Insecure Direct Object References (IDOR) vulnerabilities. This tutorial, conducted in Hindi, covers everything from understanding IDOR to solving lab exercises using XAMPP on a local system. Key Topics Covered: - Introduction to IDOR - Setting up XAMPP for a local web server environment - Step-by-...
Server Hacking : Understanding SMTP Port 25 Security with Metasploitable2 | Fusion Labs | Bug Bounty
zhlĂ©dnutĂ 158PĆed dnem
Welcome to our educational series on cybersecurity! In this video, we provide an in-depth tutorial on SMTP port 25 using Metasploit. This video is designed for cybersecurity professionals and enthusiasts who want to learn about network security, vulnerabilities, and ethical hacking practices. Topics Covered: Introduction to SMTP and port 25 Setting up Metasploit for security testing Identifying...
Bug Bounty: WAF bypass POC - Proof of Concept | Fusion Labs | #bugbounty
zhlĂ©dnutĂ 569PĆed 21 dnem
Welcome to my latest bug bounty exploration! In this video, I'll be demonstrating a powerful Proof of Concept (PoC) for bypassing a Web Application Firewall (WAF), showcasing how understanding WAFs can lead to finding critical vulnerabilities. âĄïž What You'll Learn: Overview of Web Application Firewalls (WAFs) Importance of WAFs in Web Security Anatomy of a WAF Bypass Step-by-Step Guide to Imple...
No rate Limit on Password Reset Vulnerability | Bug Bounty | $100 bounty #hackerone
zhlĂ©dnutĂ 910PĆed 28 dny
No rate Limit on Password Reset Vulnerability | Bug Bounty | $100 bounty #hackerone
Server Hacking - Telnet:23 - Gaining Reverse Shell With Metasploit - #1 | Fusion Labs | #bugbounty
zhlĂ©dnutĂ 529PĆed mÄsĂcem
In this video, we explore how to exploit a Telnet vulnerability on the Metasploitable 2 virtual machine. Metasploitable 2 is intentionally designed to be vulnerable, making it an excellent platform for security testing and demonstrating common vulnerabilities. Port Scanning: We start by performing a port scan on the Metasploitable machine. One of the ports we focus on is port 23, which correspo...
Authentication Bypass - Enumerate Username via Stubly Responses - Lab #4 | Fusion Labs - #bugbounty
zhlĂ©dnutĂ 310PĆed mÄsĂcem
Join me as we dive into Lab 4 of the Web Security Academy to explore Authentication Bypass techniques. In this video, weâll uncover common vulnerabilities and learn how to exploit them responsibly to strengthen our understanding of web security. Letâs explore the Username Enumeration via Subtly Different Responses lab from the Web Security Academy. Hereâs how you can approach it: 1. Visit the L...
Lecture 6 - Finding SSRF | Server Side Request Forgery - Fusion Labs | #bugbounty
zhlĂ©dnutĂ 173PĆed mÄsĂcem
SSRF (Server-side Request Forgery) is a web security vulnerability that allows an attacker to manipulate a server-side application into making requests to unintended locations. In a typical SSRF attack, the attacker might force the server to connect to internal-only services within the organizationâs infrastructure or even external systems. This can lead to data leakage, such as exposing sensit...
2FA Password Reset Broken Logic | Bypass OTP with Burp Suite | Fusion Labs | Lab#3 | #bugbounty
zhlĂ©dnutĂ 624PĆed mÄsĂcem
In this tutorial, we explore Lab #3 in the Authentication module of the Web Security Academy. The lab focuses on a password reset vulnerability in a web application. Here are the steps we cover: 1. Test the Password Reset Functionality: We start by testing the password reset functionality for our own account. We observe the requests and responses to understand how the process works. 2. Exploit ...
How to use SSH in Kali Linux + Configuration | Fusion Labs | #bugbounty
zhlĂ©dnutĂ 123PĆed mÄsĂcem
In this step-by-step tutorial, Iâll guide you through the process of installing and configuring SSH (Secure Shell) in Kali Linux. SSH is a cryptographic network protocol that allows secure communication over an unsecured network. Whether youâre a beginner or an experienced user, this video will help you set up SSH effectively. Commands Covered: Start SSH service: $ sudo service ssh start Edit S...
2FA Simple Bypass | How to Bypass OTP with Burp Suite| Fusion Labs | Lab 2 | #bugbounty
zhlĂ©dnutĂ 1,5KPĆed mÄsĂcem
In this video, we delve into Lab #2 in the Authentication module of the Web Security Academy. The lab focuses on bypassing two-factor authentication (2FA). Youâve already obtained a valid username and password, but you lack access to the userâs 2FA verification code. To solve the lab, weâll navigate to Carlosâs account page using the provided credentials: wiener:peter. Watch the video to learn ...
Wi-Fi Penetration Testing đ - Security of Wireless Networks - Full Tutorial | #fusionlabs #wifi
zhlĂ©dnutĂ 676PĆed mÄsĂcem
Unlock the secrets of Wi-Fi security with our comprehensive 1 hour and 21 minutes tutorial on Wi-Fi Penetration Testing! Dive deep into the world of wireless security as we explore and demonstrate attacks like De-Authentication, MAC-Flooding, Password Cracking, WPS Pixie Dust, IP Spoofing, MAC Spoofing, and Wi-Fi MITM (Man in the Middle). Equip yourself with the knowledge to identify vulnerabil...
2FA - Authentication Bypass | How to Bypass Authentication with Burp Suite | Lab #1 #bugbounty
zhlĂ©dnutĂ 1,1KPĆed mÄsĂcem
In this step-by-step tutorial, Iâll guide you through the process of bypassing OTP (One-Time Password) & Authentication verification using Burp Suite. Whether youâre a beginner or an experienced bug bounty hunter, understanding how to bypass OTPs \ Authentications can be a valuable skill. Responsible Disclosure: Always follow ethical guidelines when testing for vulnerabilities. Report any findi...
Server Hacking - SSH:22 - Secure Shell Exploit With Metasploit - #1 #bugbounty
zhlĂ©dnutĂ 458PĆed mÄsĂcem
Welcome to the thrilling world of SSH exploits! In this video, we delve into the art of breaking through secure shells using the powerful Metasploit framework. Whether youâre a seasoned ethical hacker or just curious about cybersecurity, this adventure awaits you. đ„ Video Highlights: Metasploit SSH Exploits: Discover two potent techniques: 1. ssh_login: Brute-force guessing SSH login credential...
Lecture - 5 Find more Sub-Domains, Sorting, Http Probe - Bug Bounty Course | Fusion Labs #bugbounty
zhlĂ©dnutĂ 148PĆed mÄsĂcem
Lecture - 5 Find more Sub-Domains, Sorting, Http Probe - Bug Bounty Course | Fusion Labs #bugbounty
Server Hacking - FTP:21 - Backdoor Command Execution With Metasploit - #1
zhlĂ©dnutĂ 588PĆed mÄsĂcem
Server Hacking - FTP:21 - Backdoor Command Execution With Metasploit - #1
2FA Bypass | How to Bypass OTP with Burp Suite| Fusion Labs | #bugbounty
zhlĂ©dnutĂ 30KPĆed mÄsĂcem
2FA Bypass | How to Bypass OTP with Burp Suite| Fusion Labs | #bugbounty
How I find Html Injection! | Steps You Must Know | Fusion Labs #htmlinjection
zhlĂ©dnutĂ 192PĆed mÄsĂcem
How I find Html Injection! | Steps You Must Know | Fusion Labs #htmlinjection
Vulnerability Scanning and Scripting Mastery - Nmap Script Engine [.nse] | Fusion Labs
zhlĂ©dnutĂ 421PĆed mÄsĂcem
Vulnerability Scanning and Scripting Mastery - Nmap Script Engine [.nse] | Fusion Labs
Lecture - 4 Live Recon for Information Gathering - Bug Bounty Course | Fusion Labs #bugbounty
zhlĂ©dnutĂ 281PĆed mÄsĂcem
Lecture - 4 Live Recon for Information Gathering - Bug Bounty Course | Fusion Labs #bugbounty
Lecture-3 Burp Suite In-Depth Tutorial - Bug Bounty Free Course [Urdu/Hindi ]
zhlĂ©dnutĂ 215PĆed mÄsĂcem
Lecture-3 Burp Suite In-Depth Tutorial - Bug Bounty Free Course [Urdu/Hindi ]
How to Bypass 403,404 | Automated Wayđ | #403forbidden #WAF #trending
zhlĂ©dnutĂ 212PĆed mÄsĂcem
How to Bypass 403,404 | Automated Wayđ | #403forbidden #WAF #trending
Unveiling Hidden Treasures: The 403, 404 Bypass Bug Bounty Adventure | Fusion Labs #bugbounty
zhlĂ©dnutĂ 786PĆed mÄsĂcem
Unveiling Hidden Treasures: The 403, 404 Bypass Bug Bounty Adventure | Fusion Labs #bugbounty
Bug Hunting | Lect. 2 | Labs Setup | Fusion Labs #ethicalhacking #bugbountyhunting
zhlĂ©dnutĂ 249PĆed 2 mÄsĂci
Bug Hunting | Lect. 2 | Labs Setup | Fusion Labs #ethicalhacking #bugbountyhunting
Introduction to Bug Hunting | Lect. 1| Fusion Labs
zhlĂ©dnutĂ 488PĆed 2 mÄsĂci
Introduction to Bug Hunting | Lect. 1| Fusion Labs
sir class kis kis din hoti aur live kitny bjy hoti
Kal ha xss ki
Sir greatđ
Pleasure â€ïž
to the point explanation
Yes bro đŻ
ya watsapp otp baypass pa work kera ga?
Bas batate ja rahe ho ye aise hai wo vaise hai. But , ye wo sab aya kaha se, like software kon sa, wo intruder wala or wo window kaha se ayi, kuch nhi bataya, wo pehle se hi open krke rakhi hui thi. .kya fayda video bnane ka , agar proper knowledge hi nhi provide krni dost.
Bro jo bug hunting krty ha unko pta ha ye software Burp Suite Professional Edition ha
Bro plz help me to recover my gmail
Sir Mujhe apki help chahiye sir phele to ap mujhe ye confrim ke ap ye jo kam kar rhe hen ye kis network pr kr rhe hen WIFI ya Eathernet kyu ke bilkul fresh candidate hon Or sir meri problem ye hai ke me Metasploitbale Lab pr If config kr rha hon to mre pas ip adress eathernet pr nhi aa rha or wifi pr 10.0.0.1 aa rha hai to sir please ap meri is me help kren me apke videos se hecking try rha hon
V.box ky ap usy bridge adapter kary aur ma Ethernet use krta hu
Apka koi whatsapp group hy kia Aur yeh lecture paid hoty ya unpaid
@@mtechsecurity unpaid lectures next video my group link v dy doun ga
how to join live class ?
sir jii video badiyaa thaaa but ye aapne cve ka exploit kese banaya hme bhi btao naaaaaa..........
Coding knowledge
Voice over krke thoda deep me explain krte sir tho jayada samjh aata
Next sy brother â€ïž
Bhai voice hi nhi AA rhi hai
Poc without voice hoti ha dear
sir apka group kase join karian
I'll update all links soon
nice bro
â€ïž
How to bro
All steps explained
Which way we select target website
Bakwas ki video
Hi
Yes bro
Please
Bro any telegram channel of your??
Whatapp community
Bro kya 6 digit ka otp bypass proxy chain ke sath Jo site multiple try per block ker deti hai
For bypass time limits use Header X-Forwaded-For : 127.0.0.1
đ„đ„đ„
Bro why did you check 517 only first??
New Sub â„ïžđż
oh fk you are brilliant
Next video carding
very useful
Bro how about bypassing OTP card? đ
next Level !!
bhai facebook ka id pass hack kaise kren
Most helpful video. Keep it up â€
Hi i want to contact with you...Bt How..?
Not possible in google or gmail
Yr please background sound na lgaya kro
2step same gmail otp ja rha hai kya otp bypass ho sakta pls reply đą
2 step verification bypass ho sakta hai kya
If it is vulnerable
Ak work krwana
Bro any contact info apni plz jaldi provide
Can You make a tool for a website , for 2FA bypass in there .. I can p ay high for this
Vaiya Mera Facebook account hack kar liya ek bande ne, Kiya Mai ese karke apna feacebook account bapas la sakta hu??đ„șđ„ș
If fb is vulnerable
Aoa, is me jo user and password k payload mile ha ham apne kisi b account k related kaisay find kr saktay ha
Mujhe aapki video achchhi lagi isliye mai aapka channel subscribe kar rha hoo par Mujhe vishwas nhi ho rha is attack par Please full course banao hacking par â€â€đ
â€ïž
hi
SQL Injection ka full video pleaseâ€ïž
how you write that report
From Chat gpt
Bhai a gmail pe work karega? Mera purana account he đą otp bypass karna he
If gmail is vulnerable
SoftwARE NAME?
Burp Suite
Bro For Contact Give Your Telegram I'd â€
Sir do you know any other approaches except brute force? Because i think it will not gonna work for those website which has a time limit for otp ? Do you have any solution?
Yes bro you can check my Authentication bypass Playlist I'll cover differ methodologies their with practical lab solving...đŻ
Nice bro
Which software use for attack
Burp suite professional Edition