Cyber Ryan | Cyber Security
Cyber Ryan | Cyber Security
  • Видео 84
  • Просмотров 69 155
Find Any Device on the Internet (Shodan)
Unlock the secrets of Shodan.io in this comprehensive guide on how to find internet-facing devices with ease! In this video, we dive into the powerful tool Shodan, often called the “search engine for hackers.” Whether you’re a cybersecurity student, ethical hacker, or tech enthusiast, you’ll discover how to utilize Shodan for penetration testing and security research.
Learn how to uncover devices like routers, webcams, servers, and more that are exposed to the internet. This step-by-step tutorial will walk you through Shodan's interface, search filters, and real-world examples of how it’s used to identify potential vulnerabilities in systems.
Perfect for beginners and advanced users alike, ...
Просмотров: 1 689

Видео

Master theHarvester: A Beginner’s Guide to OSINT for Ethical Hacking and Cybersecurity
Просмотров 733День назад
Discover how to unleash the power of theHarvester, the essential OSINT (Open-Source Intelligence) tool for cybersecurity professionals and ethical hackers! In this beginner-friendly tutorial, we take a deep dive into setting up and mastering theHarvester to gather critical information about your targets, including emails, subdomains, IPs, and much more. Whether you're a cybersecurity student, I...
Mastering Web Exploits: Ethical Hacking Techniques for Every Vulnerability
Просмотров 1,8 тыс.14 дней назад
Are you ready to take your cybersecurity skills to the next level? In this video, "Exploiting Web Vulnerabilities (How to Hack Web Applications)," we dive deep into the world of ethical hacking and web application security. Whether you're a cybersecurity student, ethical hacker, IT professional, or just starting your journey to learn how to hack, this video is packed with actionable insights. W...
Learn to Hack: Directory Fuzzing & PHP Reverse Shells
Просмотров 47328 дней назад
If you you are new to this series and would like to follow along, watch this video to setup your virtual machines: ruclips.net/video/sDOB2rvyFOg/видео.html Ethical Hacking Shorts Playlist: ruclips.net/p/PLsaIWaZ2IOipKD59RGeLi2CzkrTO7Aqoa Discord: discord.com/invite/DKEYsRefSA TikTok: www.tiktok.com/@cyberryan This video is a compilation of shorts from my 'Learn to Hack' series where I cover eth...
How Hackers Copy Login Pages (setoolkit)
Просмотров 1,6 тыс.Месяц назад
How Hackers Copy Login Pages (setoolkit)
Learn to Hack: User Discovery, LinPEAS, and Hashcat
Просмотров 538Месяц назад
Learn to Hack: User Discovery, LinPEAS, and Hashcat
Learn to Hack: Discovery, Enumeration, and Vulnerability Research
Просмотров 682Месяц назад
Learn to Hack: Discovery, Enumeration, and Vulnerability Research
Vulnerability Lets You Steal ANY Kia Car Remotely
Просмотров 864Месяц назад
Vulnerability Lets You Steal ANY Kia Car Remotely
Apple Visions Pro Vulnerability Exploits Your Eyeballs
Просмотров 7842 месяца назад
Apple Visions Pro Vulnerability Exploits Your Eyeballs
New Email Scam Uses Photos of Your Home
Просмотров 3262 месяца назад
New Email Scam Uses Photos of Your Home
Security Researcher SUED For Doing the Right Thing
Просмотров 1,2 тыс.3 месяца назад
Security Researcher SUED For Doing the Right Thing
2024 SSN Leak - Everything You Need to Know (Find Out if You're Affected)
Просмотров 763 месяца назад
2024 SSN Leak - Everything You Need to Know (Find Out if You're Affected)
Get Started Hacking: Creating a Virtual Lab
Просмотров 4103 месяца назад
Get Started Hacking: Creating a Virtual Lab
Hacker uses AI to Infiltrate Security Company
Просмотров 1,3 тыс.4 месяца назад
Hacker uses AI to Infiltrate Security Company
Apex Pros Hacked LIVE (Explained)
Просмотров 308 месяцев назад
Apex Pros Hacked LIVE (Explained)
Hacker Selling Unreleased Music on the Dark Web! (BUSTED) Cyber Security News #2
Просмотров 82Год назад
Hacker Selling Unreleased Music on the Dark Web! (BUSTED) Cyber Security News #2
Space Hacking, NASA, Malware & More! Aerospace Cyber Security News
Просмотров 122Год назад
Space Hacking, NASA, Malware & More! Aerospace Cyber Security News
Teenager Arrested for Hacking DraftKings
Просмотров 168Год назад
Teenager Arrested for Hacking DraftKings
Activision was Hacked. This is How it Could Have Been Prevented.
Просмотров 147Год назад
Activision was Hacked. This is How it Could Have Been Prevented.
Dota 2 Had Malicious Game Modes 😨😱
Просмотров 391Год назад
Dota 2 Had Malicious Game Modes 😨😱
Update Your iPhone ASAP! Apple Zero Day Vulnerabilities Patched
Просмотров 181Год назад
Update Your iPhone ASAP! Apple Zero Day Vulnerabilities Patched
Reddit was Hacked.
Просмотров 105Год назад
Reddit was Hacked.
Riot Games Has Been HACKED! Why GAMERS Should Be Concerned! #securitybreach #leagueoflegends
Просмотров 306Год назад
Riot Games Has Been HACKED! Why GAMERS Should Be Concerned! #securitybreach #leagueoflegends

Комментарии

  • @phantomtec
    @phantomtec 2 дня назад

    Ryan you "Cyber"? You dirty, dirty young man... Remember Sir, its a slippery slope, just like P. Diddy once did! @phantomtec - Peace 💕❤☮☮❤💕 (hope you enjoyed the additional interaction point)

  • @tech-one100
    @tech-one100 2 дня назад

    Ceh v13 sir

  • @gest9007
    @gest9007 3 дня назад

    hey ryan, i dont wanna be that guy, but you shouldnt eat those goldfishes. there was a huge rat next to them 4:40

    • @cyberryan
      @cyberryan 3 дня назад

      He’s a friendly rat 🐀

  • @cyberryan
    @cyberryan 3 дня назад

    What tool or topic should I cover next? 🤔

    • @shr3wd568
      @shr3wd568 3 дня назад

      Great videos, bro. I am trying to learn more about cybersecurity and vulnerabilities. Can you make a video about samples of the exploitation of vulnerabilities in a closed network setting and how to practice with them? More power to your channel bro!

    • @cyberryan
      @cyberryan 3 дня назад

      Definitely! Thank you for the comment much love

    • @moneyman6227
      @moneyman6227 День назад

      Like what the other guy said I would like an example of using the cve’s exploit code to get into a ctf machine using metasploit or just manually

    • @cyberryan
      @cyberryan День назад

      It’s on my list! Was thinking of either doing retired HTB machine walkthroughs or just showcasing CVE exploits

  • @bluesquare23
    @bluesquare23 9 дней назад

    I use blue terminal text too! People say blue on black is bad for your eyes, but what they don’t know is I don’t care.

    • @cyberryan
      @cyberryan 9 дней назад

      That’s just the default output text for theHarvester 😅 my terminal is pretty basic!

  • @eyezikandexploits
    @eyezikandexploits 9 дней назад

    Script kiddie

  • @GDMOSolitary
    @GDMOSolitary 9 дней назад

    cool man , quick,solid , up to a point no chit chat .

  • @cyberryan
    @cyberryan 10 дней назад

    Fruit by the Foot should sponsor this video like if you agree

  • @Anonymous51701
    @Anonymous51701 10 дней назад

    How did you learn so much. How long did it take you. You should make a video on that

    • @cyberryan
      @cyberryan 10 дней назад

      Hmm I never really thought about that i didn’t think I had a big enough audience to make that kind of video yet. That’s a good idea thank you!

  • @Trosshack
    @Trosshack 13 дней назад

    Keep it up bro. You actually taught me something and I'm pretty experienced (one of the reasons i love hacking, always something to learn) but thank you because i didnt know you could use # or --, I've always just used -- Nice! 👍

    • @Trosshack
      @Trosshack 13 дней назад

      Wow I think I just found something, I put that sentence between 2 "--" and it rendered something... hmmm... is youtube vulnerable to XSS or something in it comment section? We should look into this bro...

  • @wmpdx7
    @wmpdx7 13 дней назад

    Bro can you upload these videos without your face and Focused on the Shell please It'll be helpful for new learners 👀😕

    • @_LGD
      @_LGD 12 дней назад

      on the flip side, it’s nice to see it’s an actual human talking and not some ai generated slop lol

    • @wmpdx7
      @wmpdx7 12 дней назад

      @_LGD but the screen is so stretched to 😕

  • @Trosshack
    @Trosshack 13 дней назад

    Did you know that if you run "cd Downloads/ " for example and before you hit enter, hit tab, it will cycle through the files in that directory and you can save a lot of time. Great stuff bro. Keep it going.

    • @cyberryan
      @cyberryan 13 дней назад

      Great tip!

    • @safepancake7551
      @safepancake7551 10 дней назад

      There’s an awesome zsh plugin called fzf-tab which fully revolutionizes this, it’s great, in combination with zag syntax highlighting and autosuggestion plugin it’s really made navigating through my file system via cli so much nicer

  • @hichemsavastano4430
    @hichemsavastano4430 16 дней назад

    People think it's easy when they see hacking in training lab but when u try on real website it's hard ‽

  • @HairyDingle
    @HairyDingle 16 дней назад

    Appreciate you taking the time to put all this together man and putting it into a video format. A lot of the time videos on this specific topic usually just have Ai generated garbage that just goes around in circles and never really becomes useful. It's always missing key info but this was helpful as shit to me and very on point in my learning path

    • @cyberryan
      @cyberryan 16 дней назад

      That’s awesome to hear! Tbh I don’t really watch a lot of other cybersecurity content I just make videos that I find interesting or helpful

  • @yamashita8822
    @yamashita8822 16 дней назад

    Can you create a video on chaining vulnerabilities. #NewSubscriber!!

    • @cyberryan
      @cyberryan 16 дней назад

      Hmm that’s interesting. Something like exploiting one vulnerability to get a foothold and then another vulnerability to exploit privileges? Could definitely try to create something like that in my lab or even do some retired HackTheBox machine tutorials

    • @yamashita8822
      @yamashita8822 16 дней назад

      Another suggestion is to create a video about the mindset and mental things that you may encounter in the journey of becoming a pentester/ethical hacker.

  • @guyfoxjr8243
    @guyfoxjr8243 17 дней назад

    Love from india keep going my brother

    • @cyberryan
      @cyberryan 16 дней назад

      Thank you! Much love

  • @Trosshack
    @Trosshack 17 дней назад

    I never had luck with sqlmap but its probably because im looking into modern websites owned by big companies and most are very secure against SQLi

  • @Trosshack
    @Trosshack 17 дней назад

    The only issue i have with these practice websites is that on real websites they 9 times out of 10 have xss blocked, sanitization, validation, etc. Most look for payloads like this (basic) and most payloads you try will not work even with encoding and obfuscation. So to me practicing with DVWA sites or other practice sites will only be valuable for beginners. So i guess thats good. Question? Do you bug hunt? If so let me know, im starting a team to bug hunt together, learn, make videos, etc. Let me know if your interested or want to know more or if you just want to talk bro. Awesome content still btw!

    • @cyberryan
      @cyberryan 17 дней назад

      Yes this content was definitely targeted towards beginners. I don’t think I’m at a level to bug hunt quite yet so I haven’t looked into it. Thank you for the kind words!

    • @Trosshack
      @Trosshack 17 дней назад

      @cyberryan oh... I was under the impression you were an experienced hacker just teaching beginners... my bad bro. Anyway, that fine honestly because our goal is to help anyone who want to learn how to bug hunt or pentest or be able to within a couple months. When I started looking into hacking when I was 10 (thats the year 2002) there was like nothing available, but now there is too much available and we're going to create some videos on RUclips so that enthusiast can learn what actually needed and not feel overwhelmed at all. I'll let you know when we post them. If you have any questions, feel free to ask, I've been a bug hunter for about 5 years but been into cybersecurity/hacking/computers since 1997. Good luck man!

    • @cyberryan
      @cyberryan 17 дней назад

      @@Trosshack I appreciate it! I'll have to check those out once they are posted

  • @ChaosJoker-t9w
    @ChaosJoker-t9w 17 дней назад

    I am your 1000 subscriber congratulations for hitting 1k

    • @cyberryan
      @cyberryan 17 дней назад

      Thank you so much!

  • @hairtie8640
    @hairtie8640 17 дней назад

    Great videos man really easy to follow

    • @cyberryan
      @cyberryan 17 дней назад

      I appreciate that!

  • @hiraeth5534
    @hiraeth5534 17 дней назад

    Bro awesome video fr. Keep at it

    • @cyberryan
      @cyberryan 17 дней назад

      I appreciate it!

  • @cyberryan
    @cyberryan 18 дней назад

    Is there a web vulnerability that I didn't cover? Let me know what you would want to see in a future video below!

  • @Elevation196
    @Elevation196 19 дней назад

    Ffuf is something I still seem to not understand , because where is the wordlist or how does it access the wordlist ? Is it from the URL link that is inserted?

    • @cyberryan
      @cyberryan 19 дней назад

      The wordlist is stored locally on the kali machine. FFUF loops through the list and uses each word in the list to make a web request with that word being the directory or page. If the server responds, than we know that the directory or page exists

  • @CodeWithBehram7497
    @CodeWithBehram7497 20 дней назад

    First Here❤

  • @MetaphoricMinds
    @MetaphoricMinds 20 дней назад

    Keep up the good work!

  • @jobjobbington6884
    @jobjobbington6884 21 день назад

    This attack seems very specific to bakeries. What if I want to look at… whatever they serve at hooters instead

    • @cyberryan
      @cyberryan 21 день назад

      Alright, you got me with this one 😂

  • @finnlolstar13
    @finnlolstar13 21 день назад

    Subbed 🙏

  • @Anonymous51701
    @Anonymous51701 21 день назад

    Nice and simple explanation

  • @CesarD321
    @CesarD321 22 дня назад

    Good stuff

    • @cyberryan
      @cyberryan 22 дня назад

      Thanks for watching!

  • @JohlBrown
    @JohlBrown 22 дня назад

    yeah i get bored when you read the URL like three times there's so much bread here but i get bored and I'm 30, feel like target demo for these is younger than that

    • @cyberryan
      @cyberryan 22 дня назад

      That’s good feedback. Thank you

  • @jobjobbington6884
    @jobjobbington6884 22 дня назад

    I’m sure you explain somewhere else and I could easily google it but… How does one prevent this?

    • @cyberryan
      @cyberryan 22 дня назад

      Secure coding! Use parameterized queries, stored procedures, and validate/sanitize all user input. You could also implement a Web Application Firewall (WAF) that is made to detect and block malicious web requests like SQL injection and cross site scripting

  • @Anonymous51701
    @Anonymous51701 22 дня назад

    Thanks for your video

    • @cyberryan
      @cyberryan 22 дня назад

      Thanks for watching!

  • @daniel.cabbage
    @daniel.cabbage 23 дня назад

    I am currently making a elearning course about this, you did very good job explaining it

  • @ambroiserabier4294
    @ambroiserabier4294 24 дня назад

    Haven't seen much. Is this channel mostly about php vulnerabilities ?

    • @cyberryan
      @cyberryan 24 дня назад

      No, I am just currently covering the tabs in the DVWA, which is a PHP web application. I plan on covering many cybersecurity topics, and have already covered ethical hacking tools / techniques not involving PHP web applications.

  • @SakaturiPessina
    @SakaturiPessina 26 дней назад

    Hello, are you a real hacker? Can you help me in anyway?

    • @Trosshack
      @Trosshack 13 дней назад

      He's just stating out. I'm a professional cybersecurity analyst and bug hunter.. I've been hacking for 10+ years. I'd be happy to assist you with anything you need. What's up?

    • @SakaturiPessina
      @SakaturiPessina 11 дней назад

      Really can you help me?, it’s unfortunately a really big case that involves abuse, it’s alright if you can’t.

    • @Trosshack
      @Trosshack 11 дней назад

      @@SakaturiPessina umm... I'm not sure, how can we talk further? I do possess those skills needed to do whatever you need with a computer.

  • @evertondeoliveirasoares2406
    @evertondeoliveirasoares2406 26 дней назад

    Subject: Questions about IDOR and Bug Bounty Hi , hope you're doing well! I'm a beginner in pentesting and bug bounty hunting, and I recently started studying IDOR (Insecure Direct Object Reference) and Access Control through PortSwigger's labs. A friend recommended this path as it's often easier to find these vulnerabilities and generate some income. I would like to ask for some practical tips: 1. What is the best approach to finding IDOR vulnerabilities in real-world programs? 2. What mindset or steps should I adopt when analyzing applications? 3. Do you have any recommendations for tools or methods that I could start incorporating right away? Thank you very much for any insights you can share. Your content has been extremely helpful on this journey!

  • @evertondeoliveirasoares2406
    @evertondeoliveirasoares2406 26 дней назад

    Subject: Questions about IDOR and Bug Bounty Hi , hope you're doing well! I'm a beginner in pentesting and bug bounty hunting, and I recently started studying IDOR (Insecure Direct Object Reference) and Access Control through PortSwigger's labs. A friend recommended this path as it's often easier to find these vulnerabilities and generate some income. I would like to ask for some practical tips: 1. What is the best approach to finding IDOR vulnerabilities in real-world programs? 2. What mindset or steps should I adopt when analyzing applications? 3. Do you have any recommendations for tools or methods that I could start incorporating right away? Thank you very much for any insights you can share. Your content has been extremely helpful on this journey!

    • @cyberryan
      @cyberryan 26 дней назад

      I highly recommend you check out HackTheBox and its Web Attacks module. Their entire pentest job role path is awesome but the Web Attacks module will go into IDOR academy.hackthebox.com/course/preview/web-attacks

  • @TheMaro57
    @TheMaro57 27 дней назад

    Dude the beginning of your video will freak people out

    • @cyberryan
      @cyberryan 27 дней назад

      I’ll try to make it less scary 😂

  • @Qutoe
    @Qutoe 27 дней назад

    This is basic knowledge and will not work on 99.99% of modern web apps.

    • @cyberryan
      @cyberryan 27 дней назад

      You can’t hack modern web applications without knowing the basics!

    • @Anonymous51701
      @Anonymous51701 22 дня назад

      Well no shi. You think websites would just hang around with this vulnerability?? And when did he say anything about this being applicable to modern websites

  • @skaramicke
    @skaramicke 27 дней назад

    People coding web services like this need to loose their job. Fast.

    • @cyberryan
      @cyberryan 27 дней назад

      This is a web application that is intentionally easy to hack to practice on. If this were production I would 100% agree with you 😂

  • @ward7576
    @ward7576 28 дней назад

    This could be the best explanation why giving 777 permission is a bad idea

  • @miljanjoksimovic5488
    @miljanjoksimovic5488 28 дней назад

    Thanks!

  • @The-Pug-Experience
    @The-Pug-Experience 28 дней назад

    Yo this is dope. Keep doing more vids like this, subbed

    • @cyberryan
      @cyberryan 28 дней назад

      Thanks! Many more to come

  • @domdefault
    @domdefault 29 дней назад

    Straight to the point while still being really informative, great videos

    • @cyberryan
      @cyberryan 29 дней назад

      I appreciate it!

  • @JennaHasm
    @JennaHasm 29 дней назад

    Why do you have so few views?

    • @cyberryan
      @cyberryan 29 дней назад

      We are just getting started!

  • @AtomicNickRoblox
    @AtomicNickRoblox Месяц назад

    This is an insta sub for me thanks bro!

  • @bambastala7446
    @bambastala7446 Месяц назад

    This is bad you have to explain how we can host this fake page in ngrok or any other tool without getting a red page