Learn Ethical Hacking with Just Hacked On in Sleepless Nights!
How to Create ShellCode Runners Using Artificial Intelligence
In this video, we explore how artificial intelligence can be used to create ShellCode runners, a critical component in penetration testing and ethical hacking. Learn how AI tools assist in automating the creation and execution of shellcode payloads, analyze security flaws, and improve exploitation techniques.
DVWA XSS Attack Demo – Reflected & Stored
In this practical demo, we show how Reflected and Stored XSS vulnerabilities can be exploited inside DVWA. Learn how attackers inject malicious scripts.
IoT Camera Hacking
Think your smart cam is secure? Think again! In this eye-opening video by Just Hacked On, we expose the vulnerabilities of IoT cameras and show how we can compromise them. Learn about weak passwords, outdated firmware, and other security flaws, plus get practical tips to protect your smart devices.
File Extension Spoofing
CVE-2023-38831 is a file extension spoofing vulnerability. An attacker could exploit this vulnerability by creating a modified RAR or ZIP archive containing malicious files, which could lead to arbitrary code execution. CVE-2023-3079 has been observed exploited in the wild from April to August 2023.
From Code to System Takeover
Experience how a single line of PowerShell can take over a Windows system in seconds. This video reveals a stealthy method used to fetch and execute a remote payload, all in one go—fast, silent, and effective.
CJMCU HID Attack | USB Payload Injection
In this video, I performed a real-time HID (Human Interface Device) attack using the CJMCU microcontroller board. I showed how this board works and how a payload can be injected into a target system using USB emulation.
Digispark HID Attack | Real-Time System Takeover
In this video, I performed a live HID (Human Interface Device) attack using Digispark USB, a microcontroller board, to take over the system.
Extract Hidden Metadata from Images using ExifTool
I used ExifTool inside Windows to extract hidden metadata from an image. Most people don’t realize that their pictures may contain sensitive information—such as location, device name, date/time, and even software used.
