Tech with Joe
Tech with Joe
  • Видео 19
  • Просмотров 1 077
Analyzing and Visualizing Active Directory Events with Splunk and ADTimeline
🔍 Deep Dive into Active Directory Event Analysis with Splunk and ADTimeline!
🚀 Recommended Learning Path:
1. Windows Fundamentals (Free Module): tryhackme.com/module/windows-fundamentals
2. Windows Active Directory Basics (Free): tryhackme.com/r/room/winadbasics
3. Attacktive Directory (Free): tryhackme.com/room/attacktivedirectory
📚 Splunk & SIEM Learning Resources:
- Splunk: Exploring SPL (Free): tryhackme.com/r/room/splunkexploringspl
- Introduction to SIEM (Free): tryhackme.com/r/room/introtosiem
- Splunk Basics (Paid): tryhackme.com/jr/splunk101
🕒 Video Timestamps:
0:00 - Introduction & Plan
4:52 - Setting Up AD
12:31 - Generate Events & Logs in AD
16:10 - Install ADTimeline & Export Data To Splu...
Просмотров: 8

Видео

Back to Basics CyberTalents
Просмотров 28Месяц назад
➤ Welcome to my walkthrough of the "Back To Basics" challenge from CyberTalents! Lesson learnt on this box: 📦 Always take a peek 👀 into the source code 💻 of a page when you consult it, even if it's disabled! 🚫 #CybersecurityFundamentals #SourceCodeSecurity #SecureCoding #CodeReview #VulnerabilityAssessment #CybersecurityEducation #SoftwareDevelopment #ApplicationSecurity #ThreatModeling #CodeAn...
CyberTalents - Wifi Attacks - WPA Crack
Просмотров 228Месяц назад
➤ Welcome to my walkthrough of the "WPA Crack" challenge from CyberTalents! In this video, we dive deep into Wi-Fi penetration testing, focusing on breaking WPA/WPA2 security protocols. What's the Challenge About? The "WPA Crack" challenge has you testing your skills by cracking a Wi-Fi handshake. You'll learn about WPA/WPA2 security and how attackers exploit its vulnerabilities. Key Techniques...
The SHOCKING Truth About CyberTalents Web ghaZe Exposed
Просмотров 39Месяц назад
CTF Challenge Walkthrough: Hash Collisions & Magic Hashes in PHP" In this video, we dive deep into the world of #CTFChallenges and explore the fascinating concepts of hash collisions and magic hashes in PHP. We break down complex topics such as the MD5 collision and demonstrate how certain hash functions can lead to vulnerabilities in cybersecurity. For more insights: CTF Time Writeup: ctftime....
CyberTalents - Steganography - JTAG Dump
Просмотров 832 месяца назад
➤ CyberTalents' 'JTAG Dump' challenge, where we uncover the secrets hidden in a binary file. Join me, if you're more a reading guy please check the walkthrough that I created for this box on my medium article: ➡ Medium: medium.com/@Joe-seph/cybertalents-jtag-dump-box-walkthrough-dc267b2ca4f5 Tags: #Cybersecurity #DigitalForensics #steganography #binary #CyberTalents #CTF #CybersecurityTraining ...
CyberTalents - Steganography - I love Music
Просмотров 612 месяца назад
➤ CyberTalents' 'I love Music' challenge, where we uncover the secrets hidden in an audio file. Join me, if you're more a reading guy please check the walkthrough that I created for this box on my medium article: ➡ Medium: medium.com/@Joe-seph/cybertalents-i-love-music-walkthrough-aa0c751bce52 Tags: #Cybersecurity #DigitalForensics #steganography #audio #CyberTalents #CTF #CybersecurityTraining...
CyberTalents - Steganography - Images3c
Просмотров 592 месяца назад
➤ CyberTalents' 'Images3c' challenge, where we uncover the secrets hidden in a simple image. Join me, if you're more a reading guy please check the walkthrough that I created for this box on my medium article: ➡ Medium: medium.com/@Joe-seph/cybertalents-images3c-box-walkthrough-dacbb03d26a2 Tags: #Cybersecurity #DigitalForensics #steganography #CyberTalents #CTF #CybersecurityTraining #hiddenme...
SSH Ninja CTF Walkthrough Part 2: SSH Tunneling & Privilege Escalation (SUID Bit Exploitation)
Просмотров 782 месяца назад
➤ Welcome to Part 2 of the SSH Ninja CTF Walkthrough from SecDojo platform! In this video, I’ll take you through SSH tunneling, privilege escalation, and how to identify and exploit misconfigurations in binary files, particularly focusing on SUID bit misuse. These kinds of misconfigurations can leave a system vulnerable, and I'll demonstrate how to take advantage of them. ✦ For Part 1, check ou...
CyberTalents - Mailer Box
Просмотров 302 месяца назад
➤ CyberTalents' 'Mailer' challenge, where we uncover the secrets hidden in a phishing email. Join me, if you're more a reading guy please check the walkthrough that I created for this box on my medium article: ➡ Medium: medium.com/@Joe-seph/cybertalents-mailer-boxwalkthrough-e329a22480fa Tags: #Cybersecurity #DigitalForensics #PhishingEmail #CyberTalents #CTF #CybersecurityTraining #MalwareAnal...
CyberTalents - Network Communications - The Count box
Просмотров 272 месяца назад
🔍 Explore The Count box in the Network Communications lesson on CyberTalents. 📦💻 In this video, I guide you through each step, breaking down key concepts and techniques to help you master network communications. 🚀 Connect with me on social media: - LinkedIn: www.linkedin.com/in/youssef-abouyahia/ - Website: www.x.com/JoesephAb ✨ Tags: #NetworkCommunications #CyberSecurity #EthicalHacking #TechE...
CyberTalents - XSS - Searching for the cookie box
Просмотров 562 месяца назад
In this video walkthrough, we delve into the "Searching for the Cookie" box, an XSS type challenge from the CyberTalents platform. I will guide you through the process step-by-step, utilizing payloads and Burp Suite to effectively exploit this vulnerability. This tutorial is tailored for both beginners and those looking to sharpen their skills in web security. ❌ Disclaimer: Please only refer to...
Quiz: Planning and Scoping a Penetration Testing Assessment - CISCO Network Academy
Просмотров 582 месяца назад
🧷 In this educational video, I take you through the second quiz for the module Planning and Scoping a Penetration Testing Assessment as part of the course Introduction to Ethical Hacking and Penetration Testing offered by CISCO Networking Academy. 💡 Join me as I navigate through each question, providing explanations and insights along the way to enhance your understanding of penetration testing...
CyberTalents - Obfuscation - Iam Legend Box
Просмотров 542 месяца назад
⏭️ In this video walkthrough, we explore the JSFuck Obfuscation technique playing a box called 'Iam Legend' Box from CyberTalents platform. Join me as I break down the process step-by-step, providing insights into effective obfuscation methods and their applications in cybersecurity. Whether you're a beginner or looking to enhance your skills, this tutorial is designed to help you grasp the ess...
CyberTalents - Encoding - Who am I box
Просмотров 502 месяца назад
In this video, I tackle the "Who Am I?" box on the CyberTalents platform. I walk through the encoding challenges presented in the box, demonstrating my problem-solving process and sharing key insights along the way. Join me as I decode the clues and reveal my findings! #CyberTalents #WhoAmI #Encoding #CTF #Cybersecurity #base64
CyberTalents - Cookies - Admin has the power
Просмотров 722 месяца назад
Hope this helps you in your journey, don't forget to follow and like if you found this video useful. #CyberTalents #CTF #WebSecurity #CookieManipulation #AdminAccess #Hacking #CaptureTheFlag
CyberTalents - Javascript - This is Sparta box
Просмотров 582 месяца назад
CyberTalents - Javascript - This is Sparta box
Intro to Ethical Hacking & Penetration Testing Quiz 1 - Cisco
Просмотров 193 месяца назад
Intro to Ethical Hacking & Penetration Testing Quiz 1 - Cisco
CyberTalent - Text Operation - One of a kind box
Просмотров 533 месяца назад
CyberTalent - Text Operation - One of a kind box
Pop Quiz - Final Portfolio Project (ALX Graduation Project)
Просмотров 267 месяцев назад
Pop Quiz - Final Portfolio Project (ALX Graduation Project)

Комментарии

  • @hakimtoutay
    @hakimtoutay Месяц назад

    first comment yaaah

  • @zed-c7t
    @zed-c7t Месяц назад

    i know but it only just hacks easy passwords and common passwords not strongest one

    • @tech-with-joe
      @tech-with-joe Месяц назад

      @@zed-c7t indeed for specific you would need to create your custom wordlists (try CUPP for that)

    • @GroupTrust
      @GroupTrust Месяц назад

      ​@@tech-with-joe Can you make video for use cupp?

  • @zed-c7t
    @zed-c7t Месяц назад

    but it dosent work because its word list

    • @tech-with-joe
      @tech-with-joe Месяц назад

      It will work just give it time, or use another wordlist in the Seclist repository (check github)

    • @GroupTrust
      @GroupTrust Месяц назад

      ​@@tech-with-joewhat about itertools? Can you make that video?

  • @itsaad484
    @itsaad484 2 месяца назад

    Keep up the fantastic work! 👍

  • @ElMehdiAbouyahia
    @ElMehdiAbouyahia 2 месяца назад

    Thanks for the explanation. Keep it up !

  • @thegamingclassroom
    @thegamingclassroom 6 месяцев назад

    Looks like clean good work. Good job, Josh! :)