- Видео 73
- Просмотров 34 573
Hacking0x101
Добавлен 27 июл 2007
Ethical Hacking and Linux channel.
🚨 **Master Meterpreter Post-Exploitation Techniques!** 🚨
In this video, dive deep into the world of post-exploitation with Meterpreter! Learn how attackers use advanced features. Whether you're a cybersecurity professional or a pentester, this step-by-step guide will help you understand the practical aspects of Meterpreter commands and scenarios.
💡 **Knowledge is your best defense!**
📺 Watch the video now and take your skills to the next level!
Don’t forget to **like, share, and subscribe** for more cybersecurity tutorials.
#Cybersecurity #Pentesting #Meterpreter #EthicalHacking #PostExploitation #InfoSec #EthicalHacker"
For more insights and articles on cybersecurity and linux, check out my blog: blog.amit-agarwal.co.in/
Follow me on X for updat...
💡 **Knowledge is your best defense!**
📺 Watch the video now and take your skills to the next level!
Don’t forget to **like, share, and subscribe** for more cybersecurity tutorials.
#Cybersecurity #Pentesting #Meterpreter #EthicalHacking #PostExploitation #InfoSec #EthicalHacker"
For more insights and articles on cybersecurity and linux, check out my blog: blog.amit-agarwal.co.in/
Follow me on X for updat...
Просмотров: 23
Видео
Mastering Meterpreter: Advanced Post-Exploitation with Metasploit
Просмотров 56День назад
Dive deep into Meterpreter , the ultimate post-exploitation tool in Metasploit! 🛠️ In this third video of my Metasploit series, I'll guide you through: - Setting up and using Meterpreter effectively - Powerful post-exploitation commands and scripts - Real-world scenarios to showcase Meterpreter's capabilities If you're looking to enhance your skills as an ethical hacker, this video is packed wi...
Metasploit Basics for Beginners | Learn How to Get Started
Просмотров 12414 дней назад
In this video, we dive into the basics of Metasploit, one of the most powerful penetration testing frameworks available. Whether you're a beginner or just brushing up your skills. Basic commands to launch exploits and manage sessions. Practical examples for real-world scenarios. This step-by-step guide will help you understand the core functionalities of Metasploit, giving you a strong foundati...
Introduction to Metasploit for Beginners | Learn Ethical Hacking & Penetration Testing
Просмотров 14221 день назад
Are you new to Metasploit and want to understand how it works? In this introductory video, we explore the fundamentals of Metasploit, the most powerful tool for ethical hackers and penetration testers. 💡 What You'll Learn: What is Metasploit, and why it's essential for cybersecurity? Key components: Exploits, payloads, modules, and more Step-by-step guide to setting up Metasploit A simple workf...
Mastering Blackeye: The Powerful Phishing Tool for Security Testing
Просмотров 1,9 тыс.Месяц назад
In this video, I dive deep into the Blackeye Phishing Tool, one of the most powerful and effective tools for social engineering and phishing simulations. Whether you're a beginner or an experienced penetration tester, this video will guide you through the features and capabilities of Blackeye, showing you how it can be used in ethical hacking and security assessments. By the end of this video, ...
Understanding Phishing Attacks with Zphisher - Step-by-Step Guide
Просмотров 1742 месяца назад
Phishing remains one of the most common and dangerous cybersecurity threats. In this video, I dive into Zphisher, a powerful tool used by security researchers to simulate phishing attacks and raise awareness about their tactics. 🔍 What you'll learn in this video: How to install and set up Zphisher. Demonstration of phishing techniques in action. Real-world scenarios and how attackers operate. ⚠...
Building a Pro Home Lab for Pentesting?
Просмотров 4632 месяца назад
I showcase my home lab setup with multiple networks, tackle issues in Kali Linux, and secure vulnerable machines using host-only networks. 🚀 🎥 What’s inside the video? Setting up isolated networks for better segmentation 🛡️ Fixing common issues with multiple networks in Kali 🔧 Securing vulnerable VMs by restricting external access 🔒 Whether you’re a beginner or experienced in cybersecurity, thi...
Getting Started with the Social Engineering Toolkit (SET): Beginner's Guide to Social Engineering
Просмотров 1032 месяца назад
In this video, I provide a step-by-step guide on using the Social Engineering Toolkit (SET) for beginners, demonstrating how hackers use social engineering to manipulate users. Whether you're new to cybersecurity or looking to understand the tools used in social engineering attacks, this tutorial will give you the basics to start with SET and recognize social engineering tactics. For more insig...
Game Hacking - Get extra life's or coin's
Просмотров 265 месяцев назад
In this video we will talk about Game hacking for fun (and fun only). I do not promote any kind of hacking cheating in any kind of games. We will use cheatengine fo r this.
OSINTCombine Bookmarks collection
Просмотров 467 месяцев назад
OSINTCombine Bookmarks collection #bookmark #bookmarks #collection #osint #awesome
pam backdoor - One password to rule them all
Просмотров 13111 месяцев назад
I will create a PAM backdoor in this one which allows one password to login as any user using any method - ssh, console login or whatever.
windows pentools
Просмотров 7311 месяцев назад
Windows Tools for penetration testing and ethical hacking. github repo: github.com/raj77in/windows-pentools
Linux disown a process
Просмотров 56Год назад
Disown a process to keep it running after you close your terminal or logout
AD setup on AWS with awscli and user-data (cloud-config) - completely automated
Просмотров 652 года назад
AD setup on AWS with awscli and user-data (cloud-config) - completely automated
script to scrape crt.sh for subdomain enumeration
Просмотров 7602 года назад
script to scrape crt.sh for subdomain enumeration
Pentester Academy Command Injection lab walkthrough with curl
Просмотров 4522 года назад
Pentester Academy Command Injection lab walkthrough with curl
THM 0x44haz Simple reversing challenge
Просмотров 562 года назад
THM 0x44haz Simple reversing challenge
Linux Tips to speed up your workflow for CyberSecurity testing
Просмотров 703 года назад
Linux Tips to speed up your workflow for CyberSecurity testing
sir what is the difference between the phishing and the social engineering attack
Phishing is part of social engineering
Big Fan sir
Thanks,You are the best
Hi, when I use Blackeye, I get a 502 Bad Gateway error on Google, but it works fine in Firefox on Linux. With Zphisher, the link shows "cannot be found" when I run it in Google, but it works fine in Firefox and Linux. How can I fix this?
@carlosbenedictgarcia3791 what do you mean by run in Google?
Many thanks!
I can’t open any page when it’s on. Why??
@fordaleampofo8685 I did not have any such issue. Did you import burp CA? Are you sure you have set it for tab only.
@ burp??…can you send me your handle so you can walk me through??…I really need your help on this
Sorry, cant walk you through. Burp is intercepting proxy.
Can we use blackeye without kali Linux ?
@ryanxgamming1286 Yes you can
Hello, i have a problem: when i have to click send to the command ./blackeye.sh it say that i dont have the autorization. I have tried to do it in sudo but it doesnt recognize it. What can i do?
@@TheRagnarök_04 One of the reasons this can happen is if the folder is mounted with noexec. Try running from some other folder.
Make a video about cryptolocker malware development and execution!!
It's not working
What is not working? For any help you ever ask, you will have to fist describe your issue
@@raj77inThe link is not generating and if it generate still you cannot use in different device.
Bro im getting two option when i performed it into android how 1 ngrok 2 localtunnel Ngrok is not producing link while localtunnel is producing when i pasted that link that is required some ip how to use it please clearify me 😊 Actually it is not displaying the link
ngrok, you need to have a key. I don't think you can use it without a API key. for the localtunnel option, I saw that sometimes it does not work. If you try 3-4 times with some time in between, you should get a link. Or you can register for ngrok and configure the API key.
@raj77in I had done it multiple times but didn't work
@@Adi_IITB okay, then I don't know why
वास्तविक पते से भिन्न IP पते के साथ msfconsole में प्रवेश करने में सक्षम होने के लिए अनुसरण करने योग्य स्पष्ट चरण क्या हैं? उदाहरण के लिए, टोर नेटवर्क के साथ मेटास्प्लोइटेबल पेन्टेस्टिंग के मामले में, क्योंकि पारंपरिक तरीके से यह संभव नहीं है।
Volume is so low bro
@Progressive_Entrepreneur I will try to fix in next one. Thanks for letting me know
the video is breaking up...
Thanks for the feedback. I will check.
I don’t understand it it won’t load
How come my won’t ever load
What happens?
@@raj77in proxies just won’t load sites but I configurated a different system and 👍🏼👍🏼👍🏼
Great😮❤
Thanks Sir
Thanks for this great video Amita. This is my second day using expect, it's very easy to use. I can definetly see it being very useful and fun. Quick question: are you giving the script a .exp extension for any reason? I'm creating shell scripts and I don't seem to be having any issues.
Thanks for the nice words. No ".exp" is not required specifically. As everything in linux extensions are not required but some of them are commonly used like ".sh" for shell scrips and so on and on similar lines ".exp" is commonly used to designate expect scripts.
@@raj77in Hi Amita, Happy new year! Thank you for your reply.
bro can you please tell me if i am a beginner understanding of CEH level so how much time it take to clear it the CPENT. m talking about time and effort that i have to put in preparation to clear it and what the platform i have to follow for it. i hope positive response come from your side.🙂
Time and effort will vary drastically depending upon your knowledge of network, firewall, OSs and so on. If you do not not have prior experience with sites like THM or HTB then it would takes little longer. Mostly the labs and cybervrange provided is sufficient
bro did you have to use tools like sshutle, proxychains ... to pivot to the internal?? bqz in the course heath doesnt teach tools like that. can you tell how did you manage to pivot to the internal? is the pnpt bundle enough to pass the exam? i think im overthinking by watching tryhack me rooms like wreath,throwback,holo...
PNPT bundle is all you need to pass. You might have to spend some time in learning some of the techniques shown but course is enough.
@@raj77in so i dont need to worry about the tools like proxychains??
@XORO yes that is correct
@@raj77in thanx for the reply?
Man the audio is really bad
Thanks for your feedback, I am working on improving it.
Can i get your linkedin id
You should be able to find me there by my name 😀
Good stuff Amit , but the voice was glitchy
Thanks four your input. I will try to improve it.
Congrats Raj. Is peh alone is enough or do we need ro complete full pnpt bundle?
Thanks @cyberwarrior better to complete bundle
Make a playlist for this series
Sir can you provide your email iam enrolling for cpent Thank you
Hi Arun, I cannot give my email id on a public platform but I am sure you can find me on twitter and/or linkedin where you can DM me and I can help you :)
@@raj77in ur username
@@arunperam ruclips.net/video/B3UiyI-emas/видео.html
did yoyu enroll?@@raj77in
@harshsingh001 I passed long time ago
👍👍
Always a pleasure to hear you
Thanks Debiprasanna
Sir is it necessary to watch all those 3hr long videos of each module ?
Yes , that and do some research and searching on your own as well.
@@raj77in yea and you have to earn it.. you not just passing it for the piece of paper but for the knowledge so of course @Anandu S Shali you have to listen to all videos, read the book and do the labs and take notes.
Congratulations! I am gonna take the exam can you please clarify few doubts?
Sure,
did u pass?
Will you share your notes? i will be approciated if you help me with that
I need to clean up my notes before I can share them and that is going to take some time.
@@raj77in I will wait for it thank you for supporting
Hello..where is noted
I replied earlier to a different comment that I will not be able to upload them as it is too much work to clean them up and I dont see much value in doing so much work.
Will you share your notes?
Sorry, cannot share my notes without cleaning ot up. I will try to clean it up and share.
@@raj77in Yes please do share much needed. :)
@@charanskmr777 I have been trying to do that but there are too many things that I need to remove before I can share. I dont think I will be able to spend that much time. If I can, I will do that and share.
@@raj77in oh okies bro.... anyways thanq for your efforts 😇
Did u find the course material enough to prepare ?
Yes it is good and sufficient. But along with it you need to do your research wherever you still have doubts.
Man you are really smart lol
Bro create a playlist owasp top 10
Very informative 👍👍 thx
Can you also lay down the roadmap on how to prepare if someone is super new to Pentest ? What can Help and what you did for preparation ?
Sure, I will try to do that.
Great to hear from you after a long time..
Thanks to have share this video ! How do you insert the emoticon on vi ?
You can search in some site and then copy paste from there. If you know the unicode, then you can use that within vim to type the emoticon.
@@raj77in so simple as that ?! Thanks for your answer ! it works !
Stupid poor demo,!
Thanks for the positive feedback. I agree with you but I recorded 5 time and first 4 times it worked and in the final one it mis-behaved. I will be careful in next ones.
Hahahaha 18:51 fail there is no table name 😂
Nice video
OMG 😍💋 💝💖❤️
Thank you for sharing this.
Badhia hei Amit
Badhia hei bhai (Aka)... subscribed too; will wait for more.
Thanks
Superb