WireDogSec
WireDogSec
  • Видео 260
  • Просмотров 92 355
JavaScript Essentials | TryHackMe - Cyber Security 101
If you are new and interested in what #cybersecurity has to offer, then you are in the right place! We are taking a look at the Cyber Security 101 learning path in #TryHackMe!
Like, comment, and subscribe!
#wiredogsec #informationsecurity #infosec
Resources:
Blog post:
tryhackme.com/r/resources/blog/new-cyber-security-101-path
Room:
tryhackme.com/r/room/javascriptessentials
Other resources:
Learn-JS
www.learn-js.org/
Learn JavaScript - Free JS Courses for Beginners
www.freecodecamp.org/news/learn-javascript-free-js-courses-for-beginners/
Codecademy - Learn JavaScript
www.codecademy.com/learn/introduction-to-javascript
Free Tools! How to Use Developer Tools and Javascript in Webapp Pentests
ruclips.net/v...
Просмотров: 15

Видео

Web Application Basics | TryHackMe - Cyber Security 101
Просмотров 1116 часов назад
If you are new and interested in what #cybersecurity has to offer, then you are in the right place! We are taking a look at the Cyber Security 101 learning path in #TryHackMe! Like, comment, and subscribe! #wiredogsec #informationsecurity #infosec DISCLAIMER: This video is for EDUCATIONAL PURPOSES ONLY! WireDogSec is not responsible for the actions of his viewers. WireDogSec does condone or pro...
Moniker Link (CVE 2024 21413) | TryHackMe - Cyber Security 101 (FOR EDUCATIONAL PURPOSES ONLY)
Просмотров 8219 часов назад
If you are new and interested in what #cybersecurity has to offer, then you are in the right place! We are taking a look at the Cyber Security 101 learning path in #TryHackMe! Like, comment, and subscribe! #wiredogsec #informationsecurity #infosec DISCLAIMER: This video is for EDUCATIONAL PURPOSES ONLY! WireDogSec is not responsible for the actions of his viewers. WireDogSec does condone or pro...
John The Ripper: The Basics | TryHackMe - Cyber Security 101 (FOR EDUCATIONAL PURPOSES ONLY)
Просмотров 11921 час назад
If you are new and interested in what #cybersecurity has to offer, then you are in the right place! We are taking a look at the Cyber Security 101 learning path in #TryHackMe! Like, comment, and subscribe! #wiredogsec #informationsecurity #infosec DISCLAIMER: This video is for EDUCATIONAL PURPOSES ONLY! WireDogSec is not responsible for the actions of his viewers. WireDogSec does condone or pro...
Hashing Basics | TryHackMe - Cyber Security 101
Просмотров 179День назад
If you are new and interested in what #cybersecurity has to offer, then you are in the right place! We are taking a look at the Cyber Security 101 learning path in #TryHackMe! Like, comment, and subscribe! #wiredogsec #informationsecurity #infosec Resources: Blog post: tryhackme.com/r/resources/blog/new-cyber-security-101-path Room: tryhackme.com/r/room/hashingbasics
Public Key Cryptography Basics | TryHackMe - Cyber Security 101
Просмотров 93День назад
If you are new and interested in what #cybersecurity has to offer, then you are in the right place! We are taking a look at the Cyber Security 101 learning path in #TryHackMe! Like, comment, and subscribe! #wiredogsec #informationsecurity #infosec Resources: Blog post: tryhackme.com/r/resources/blog/new-cyber-security-101-path Room: tryhackme.com/r/room/publickeycrypto
Cryptography Basics | TryHackMe - Cyber Security 101
Просмотров 203День назад
If you are new and interested in what #cybersecurity has to offer, then you are in the right place! We are taking a look at the Cyber Security 101 learning path in #TryHackMe! Like, comment, and subscribe! #wiredogsec #informationsecurity #infosec Resources: Blog post: tryhackme.com/r/resources/blog/new-cyber-security-101-path Room: tryhackme.com/r/room/cryptographybasics
Nmap: The Basics | TryHackMe - Cyber Security 101
Просмотров 20014 дней назад
If you are new and interested in what #cybersecurity has to offer, then you are in the right place! We are taking a look at the Cyber Security 101 learning path in #TryHackMe! Like, comment, and subscribe! #wiredogsec #informationsecurity #infosec Resources: Blog post: tryhackme.com/r/resources/blog/new-cyber-security-101-path Room: tryhackme.com/r/room/nmap
TCPDump: The Basics | TryHackMe - Cyber Security 101
Просмотров 30614 дней назад
If you are new and interested in what #cybersecurity has to offer, then you are in the right place! We are taking a look at the Cyber Security 101 learning path in #TryHackMe! Like, comment, and subscribe! #wiredogsec #informationsecurity #infosec Resources: Blog post: tryhackme.com/r/resources/blog/new-cyber-security-101-path Room: tryhackme.com/r/room/tcpdump
Networking Secure Protocols | TryHackMe - Cyber Security 101
Просмотров 19914 дней назад
If you are new and interested in what #cybersecurity has to offer, then you are in the right place! We are taking a look at the Cyber Security 101 learning path in #TryHackMe! Like, comment, and subscribe! #wiredogsec #informationsecurity #infosec Resources: Blog post: tryhackme.com/r/resources/blog/new-cyber-security-101-path Room: tryhackme.com/r/room/networkingsecureprotocols
Networking Core Protocols | TryHackMe - Cyber Security 101
Просмотров 34621 день назад
If you are new and interested in what #cybersecurity has to offer, then you are in the right place! We are taking a look at the Cyber Security 101 learning path in #TryHackMe! Like, comment, and subscribe! #wiredogsec #informationsecurity #infosec Resources: Blog post: tryhackme.com/r/resources/blog/new-cyber-security-101-path Room: tryhackme.com/r/room/networkingcoreprotocols
Networking Essentials | TryHackMe - Cyber Security 101
Просмотров 13221 день назад
If you are new and interested in what #cybersecurity has to offer, then you are in the right place! We are taking a look at the Cyber Security 101 learning path in #TryHackMe! Like, comment, and subscribe! #wiredogsec #informationsecurity #infosec Resources: Blog post: tryhackme.com/r/resources/blog/new-cyber-security-101-path Room: tryhackme.com/r/room/networkingessentials
Networking Concepts | TryHackMe - Cyber Security 101
Просмотров 13721 день назад
If you are new and interested in what #cybersecurity has to offer, then you are in the right place! We are taking a look at the Cyber Security 101 learning path in #TryHackMe! Like, comment, and subscribe! #wiredogsec #informationsecurity #infosec Resources: Blog post: tryhackme.com/r/resources/blog/new-cyber-security-101-path Room: tryhackme.com/r/room/networkingconcepts
Linux Shells | TryHackMe - Cyber Security 101
Просмотров 29321 день назад
If you are new and interested in what #cybersecurity has to offer, then you are in the right place! We are taking a look at the Cyber Security 101 learning path in #TryHackMe! Like, comment, and subscribe! #wiredogsec #informationsecurity #infosec Resources: Blog post: tryhackme.com/r/resources/blog/new-cyber-security-101-path Room: tryhackme.com/r/room/linuxshells
Windows PowerShell | TryHackMe - Cyber Security 101
Просмотров 57821 день назад
If you are new and interested in what #cybersecurity has to offer, then you are in the right place! We are taking a look at the Cyber Security 101 learning path in #TryHackMe! Like, comment, and subscribe! #wiredogsec #informationsecurity #infosec Resources: Blog post: tryhackme.com/r/resources/blog/new-cyber-security-101-path Room: tryhackme.com/r/room/windowspowershell
Windows Command Line | TryHackMe - Cyber Security 101
Просмотров 21421 день назад
Windows Command Line | TryHackMe - Cyber Security 101
Search Skills | TryHackMe - Cyber Security 101
Просмотров 49921 день назад
Search Skills | TryHackMe - Cyber Security 101
TryWinMe Think Cyber Monopoly | TryHackMe - Cyber Security 101
Просмотров 13628 дней назад
TryWinMe Think Cyber Monopoly | TryHackMe - Cyber Security 101
Unified Kill Chain | TryHackMe - SOC Level 1
Просмотров 58Месяц назад
Unified Kill Chain | TryHackMe - SOC Level 1
HACKING Tool Misused for Bypassing EDR! | Ransomware is still a Menace and More!
Просмотров 217Месяц назад
HACKING Tool Misused for Bypassing EDR! | Ransomware is still a Menace and More!
Cyber Kill Chain | TryHackMe - SOC Level 1
Просмотров 95Месяц назад
Cyber Kill Chain | TryHackMe - SOC Level 1
Quick and Dirty Recon for Web HACKING!
Просмотров 206Месяц назад
Quick and Dirty Recon for Web HACKING!
More AI MALWARE Found! | Using AI Tools for Cyber Security
Просмотров 204Месяц назад
More AI MALWARE Found! | Using AI Tools for Cyber Security
Credential Harvesting | TryHackMe - Offensive Security
Просмотров 280Месяц назад
Credential Harvesting | TryHackMe - Offensive Security
HACK APIs Now! | Practical API Hacking Course - Review and More!
Просмотров 55Месяц назад
HACK APIs Now! | Practical API Hacking Course - Review and More!
Persisting Active Directory | TryHackMe - Offensive Security
Просмотров 2462 месяца назад
Persisting Active Directory | TryHackMe - Offensive Security
Exploiting Active Directory | TryHackMe - Offensive Security
Просмотров 1722 месяца назад
Exploiting Active Directory | TryHackMe - Offensive Security
Lateral Movement and Pivoting | TryHackMe - Offensive Security
Просмотров 2312 месяца назад
Lateral Movement and Pivoting | TryHackMe - Offensive Security
Enumerating Active Directory | TryHackMe - Offensive Security
Просмотров 972 месяца назад
Enumerating Active Directory | TryHackMe - Offensive Security
Breaching Active Directory | TryHackMe - Offensive Security
Просмотров 3472 месяца назад
Breaching Active Directory | TryHackMe - Offensive Security

Комментарии

  • @Fiazceh
    @Fiazceh 5 дней назад

    What was the command i didn't get it

    • @wiredogsec
      @wiredogsec 5 дней назад

      What is the timestamp that you are on?

  • @marlo6846
    @marlo6846 8 дней назад

    Your video and the linked resources are very useful. Thank you!

    • @wiredogsec
      @wiredogsec 8 дней назад

      I appreciate the feedback! Thanks for watching!

  • @JoshuaJohnson-n9l
    @JoshuaJohnson-n9l 9 дней назад

    could anyone else not copy the exploit

    • @wiredogsec
      @wiredogsec 9 дней назад

      @@JoshuaJohnson-n9l Which exploit were you using? What timestamp of the video were you looking at?

  • @juliusd.2675
    @juliusd.2675 13 дней назад

    How did you know, that the second flag was located exactly at the given path?

    • @wiredogsec
      @wiredogsec 13 дней назад

      You can make an educated guess. Notice that the path says "rootflag" in it.

    • @juliusd.2675
      @juliusd.2675 13 дней назад

      @ Okay, thanks. Found another source, which uses find via sudo as missy and shows then the path👍🏻

  • @Zerokenshiro
    @Zerokenshiro 24 дня назад

    Good stuff! Your walkthrough was very insightful.

    • @wiredogsec
      @wiredogsec 24 дня назад

      I’m glad you enjoyed it! Thanks for watching!

  • @StrategicGaming-sx7qg
    @StrategicGaming-sx7qg 25 дней назад

    The S for Security in IoT is silent.

    • @wiredogsec
      @wiredogsec 24 дня назад

      IoT = Internet of Trash

  • @Aatje21
    @Aatje21 26 дней назад

    Cool video there mate! Keep up the great work

    • @wiredogsec
      @wiredogsec 26 дней назад

      I appreciate the kind words! Thanks for the support!

  • @tonyb9864
    @tonyb9864 26 дней назад

    Thanks! I'm following this path also.

    • @wiredogsec
      @wiredogsec 26 дней назад

      Thanks for watching and joining the learning experience!

  • @noblesmd
    @noblesmd 26 дней назад

    Another fine video!

    • @wiredogsec
      @wiredogsec 26 дней назад

      Thanks for watching!

  • @noblesmd
    @noblesmd 26 дней назад

    Nice Work!

    • @wiredogsec
      @wiredogsec 26 дней назад

      I appreciate the support!

  • @Ronny504
    @Ronny504 27 дней назад

    Bro what os u use kali,parrot or blackarch?

    • @wiredogsec
      @wiredogsec 27 дней назад

      Personally, I use a Kali VM. I believe that TryHackMe has a Kali VM and the AttackBox (Parrot OS). Use whichever works best for you.

    • @Ronny504
      @Ronny504 27 дней назад

      @@wiredogsec ok thx but is It good to use It as main os in SSD with dual boots windows and kali

    • @wiredogsec
      @wiredogsec 27 дней назад

      @@Ronny504 That is for you to decide. I use Windows as my main OS and have Kali on a VM.

  • @charlebeastmode8810
    @charlebeastmode8810 29 дней назад

    good stuff! thanks buddy

    • @wiredogsec
      @wiredogsec 29 дней назад

      I appreciate the feedback! Thanks for watching!

  • @Cyber_Donut21
    @Cyber_Donut21 Месяц назад

    Did you pass this on the first try? I don’t have any experience aside for 10 years Law enforcement and security + which I don’t see helping here (aside for investigations aspect.. maybe) But I thinking rip the bandaid off and go for it, if I fail, then I got another attempt, but I never did anything like this before so I am a little nervous but trying have the thought of having fun with it at the same time. I did finish the course and took good notes so I hope that’s what I need to get through this!

    • @wiredogsec
      @wiredogsec Месяц назад

      No, I didn’t pass on the first try. You should be good if you did all of the trainings and took good notes. Don’t psych yourself out. If you get stuck, remember to enumerate, enumerate, and enumerate.

  • @AhmedHassan-di8oo
    @AhmedHassan-di8oo Месяц назад

    bruh

  • @vypen-1
    @vypen-1 Месяц назад

    Hey WireDogSec! Thanks for the videos! -Vypen

    • @wiredogsec
      @wiredogsec Месяц назад

      Thanks for the support!

  • @zyyr
    @zyyr Месяц назад

    I’m new into tech but have been gaming/troubleshooting since I was a child I just got a few certs from the brand new google it program that just dropped for help desk and i.t security 🖱️ id like to find networking groups n chats to talk to ppl with you know … can u recommend any groups to join or make a video about forums etc

  • @andrelemos2106
    @andrelemos2106 Месяц назад

    you can use anew to remove duplicates!

    • @wiredogsec
      @wiredogsec Месяц назад

      Interesting. I’ve never heard of that tool or command. Thanks for sharing.

  • @danielcohenemail
    @danielcohenemail Месяц назад

    why do we have top be in /tmp folder to transfer the files?

  • @CrxzyYT
    @CrxzyYT Месяц назад

    oh great AI made horrors beyond my comprehension.

    • @wiredogsec
      @wiredogsec Месяц назад

      This is only the beginning lol.

  • @A1.4graffix
    @A1.4graffix Месяц назад

    one has to be a pretty skilled attacker to pull all that off right? good video bro.....respects

    • @wiredogsec
      @wiredogsec Месяц назад

      @@A1.4graffix I believe that AI lowers the barrier to carry out such attacks. You still have to know what you are doing, but it can help create malicious software or scripts. I have used it to fix issues with my code or make it more efficient. AI can also assist with making social engineering or phishing more effective. Sometimes you have to “sweet talk” it in order to make it carry out your requests.

  • @B1G_LIL
    @B1G_LIL 2 месяца назад

    Did you use trevorspray?

  • @jdhaynes7402
    @jdhaynes7402 2 месяца назад

    That was really helpful for me on the "Authentication Bypass - Brute Force" step where we're supposed to get a username and password. I had saved the output for the 3 usernames to a file using the "cat > valid_usernames.txt" at the end of the ffuf cmd. Then cleaned up the file using nano. Didn't work. Then I created the file from scratch (touch valid_usernames.txt) and added the 3 names manually using nano. Still didn't work. Finally I saw in your video that you used sublime - as soon as I used sublime to create the file - it worked. Not sure why the "cat >" then using nano method didn't work though - that has me curious. Thanks for your help!

    • @wiredogsec
      @wiredogsec 2 месяца назад

      I’m glad you found it helpful! Have you tried using ‘echo “users” > usernames.txt’?

  • @dedysetiawan5099
    @dedysetiawan5099 2 месяца назад

    its a really good video you got. except the last part is very confusing cause u jumped and skipped to that video part. anyway, good job

    • @wiredogsec
      @wiredogsec 2 месяца назад

      @@dedysetiawan5099 thanks for watching and I appreciate the feedback!

  • @nhntbug
    @nhntbug 2 месяца назад

    Thanks for the BlackHat Talk link

    • @wiredogsec
      @wiredogsec 2 месяца назад

      Thanks for watching!

  • @100GOD-k6j
    @100GOD-k6j 2 месяца назад

    666

  • @VenkiCodes
    @VenkiCodes 2 месяца назад

    Hello, is it possible to view the content that is being printed, anonymously?

    • @wiredogsec
      @wiredogsec 2 месяца назад

      It probably differs depending on the printer. I would check the printer vendor documentation.

  • @OiVinn-eq1ml
    @OiVinn-eq1ml 2 месяца назад

    Where did you get "ll" from? Glad you mentioned it because it doesn't say that anywhere. Don't think I could ever figure it out lol

    • @wiredogsec
      @wiredogsec 2 месяца назад

      "ll" is an alias for the long listing command (ls -l). I probably saw it in another video somewhere. You can find out for info on the "ls" command here: www.geeksforgeeks.org/ls-command-in-linux/

    • @OiVinn-eq1ml
      @OiVinn-eq1ml 2 месяца назад

      @@wiredogsec Yea I just learn about 'll" after watching your vid. But the timestamp is 16:33

    • @wiredogsec
      @wiredogsec 2 месяца назад

      @@OiVinn-eq1ml Sounds good. I am glad that you learned something new. Thanks for the support!

  • @guilhermealonso3214
    @guilhermealonso3214 2 месяца назад

    Hello, could you help me, please. In task 6, I'm putting "normalization", but it's giving an incorrect answer. Can you say why this is?

    • @wiredogsec
      @wiredogsec 2 месяца назад

      Try "normalisation." The spelling is a "s" not a "z."

    • @guilhermealonso3214
      @guilhermealonso3214 2 месяца назад

      @@wiredogsec That's right...I already got it, but anyway, thanks for responding.

  • @rizin7446
    @rizin7446 2 месяца назад

    thanks for the vid!

    • @wiredogsec
      @wiredogsec 2 месяца назад

      Thanks for the support!

  • @Bonnahin
    @Bonnahin 2 месяца назад

    Hi hope you are doing well I'm still not able to connect my ssh localhost need help

    • @wiredogsec
      @wiredogsec 2 месяца назад

      Do you have a timestamp for the video? Are you using the attack box or your own VM?

  • @Network_CyberIT
    @Network_CyberIT 2 месяца назад

    Very easy to follow. I also like the fact that you use the Attackbox.

    • @wiredogsec
      @wiredogsec 2 месяца назад

      Thanks for watching! I try to use the AttackBox whenever I can.

  • @atlien2005
    @atlien2005 3 месяца назад

    Doesn’t even seem possible to pass thru external portion of exam. I’ve tried the wordlists, breach-parse.sh, etc even was able to confirm the correct emails when enumerating in smtp. Identified portals etc. not sure how everyone is skating thru it.

    • @wiredogsec
      @wiredogsec 3 месяца назад

      You’re not alone. I got stuck on the external portion as well. Listen carefully to the hints TCM gives you. Whenever I was stuck, I would enumerate, enumerate, and enumerate. The courses have the information you need to get past it. Pay close attention to the EPP and OSINT courses.

  • @phillydee3592
    @phillydee3592 3 месяца назад

    Did the PJPT and there i realized how important enumeration was...passed so next PNPT,thanx for the video,it helps

    • @wiredogsec
      @wiredogsec 3 месяца назад

      Congrats on passing the PJPT! Enumeration is where most people get stuck or fail. It happened to me as well. I hope you pass the PNPT! Enumerate, enumerate, enumerate!

  • @majripple
    @majripple 3 месяца назад

    Which learning path are you doing next?

    • @wiredogsec
      @wiredogsec 3 месяца назад

      Probably the SOC based ones or the Red Team one.

    • @majripple
      @majripple 3 месяца назад

      @@wiredogsec I was hoping for the Soc based ones.

  • @riquebatalha
    @riquebatalha 3 месяца назад

    nice vid broo

    • @wiredogsec
      @wiredogsec 3 месяца назад

      Thanks for taking the time to watch!

  • @shivambaghel4465
    @shivambaghel4465 4 месяца назад

    I complete all of this task and understood also but at the end i did not get a shell on linux machine whle upload a php file with valid credentials, i had try lot's of way like msfvenom netcat could you please help ? i ready to give you my anydesk id

  • @demond3501
    @demond3501 4 месяца назад

    This was huge flights and all were impacted. Good review! 💪🏿

    • @wiredogsec
      @wiredogsec 4 месяца назад

      Hopefully they get the issues fixed ASAP. Makes me wonder how this wasn’t discovered in the testing phase.

  • @nonprofit9426
    @nonprofit9426 4 месяца назад

    Amazing!

  • @anishvk65
    @anishvk65 4 месяца назад

    bro plz do live bug bounty

    • @wiredogsec
      @wiredogsec 4 месяца назад

      I think I will after I find my first bug. I just started getting into bug bounty.

  • @0dayCTF
    @0dayCTF 4 месяца назад

    Nice work 🙏🚀

    • @wiredogsec
      @wiredogsec 4 месяца назад

      Thanks! I appreciate it!

  • @anishvk65
    @anishvk65 4 месяца назад

    Very use full bro

    • @wiredogsec
      @wiredogsec 4 месяца назад

      Thank you! I appreciate the support!

  • @oy9804
    @oy9804 4 месяца назад

    👍👍👍

  • @oy9804
    @oy9804 4 месяца назад

    Keep going 🎉

    • @wiredogsec
      @wiredogsec 4 месяца назад

      I appreciate your support!

  • @leongcheechong1681
    @leongcheechong1681 4 месяца назад

    i just passed CEH Practical , the PNPT is my next exam. Very appreciate you sharing the information.

    • @wiredogsec
      @wiredogsec 4 месяца назад

      I appreciate the kind words and good luck on your PNPT exam!

  • @joshw3539
    @joshw3539 4 месяца назад

    Try getting a drink of water.

  • @ME-L3U
    @ME-L3U 4 месяца назад

    APIs are crazy, most apps on mobile if not all uses APIs to process something server side, unauthenticated endpoints are some of the most easy to find exploits if you find the endpoint, my first bug was an unauthenticated endpoint, keep up the good content!

    • @wiredogsec
      @wiredogsec 4 месяца назад

      I appreciate the kind words! I can’t wait until I find my first bug!

  • @B1G_LIL
    @B1G_LIL 4 месяца назад

    Could you make a video on your favorite tools to compromise a DC or show your methodology on compromising a DC?

    • @wiredogsec
      @wiredogsec 4 месяца назад

      Active Directory (AD) is a part of this Learning Path in THM. It should cover some of that information. If anything is missing, I will try to set up a small AD lab and cover some items there.

  • @SharjeelKhan-cz7bd
    @SharjeelKhan-cz7bd 5 месяцев назад

    Nice reading

    • @wiredogsec
      @wiredogsec 5 месяцев назад

      Thanks for watching!