I'm glad I took this course and learned the basics of PowerShell-Empire/Starkiller, which I barely knew before (it's briefly mentioned in PTSv2). However, after many attempts and many hours "lost," I can say that today Windows Defender can block almost everything. In addition to the aforementioned powershell/privesc/bypass, which only works with Windows Defender disabled (and even requires user input LOL), persistence techniques are also easily blocked. Both registry method and scheduled task method at Windows reboot do not reconnect to the Listener, and a quick look at the Windows Defender history shows that they are blocked easily. In practice, the only thing that still works is Invoke-Obfuscation! :,) Anyway, as always, thank Alexis for using your time to share your knowledge with everyone for free. See you soon!
It s ennificient I find that hackers can't send the infectious.xls with defender windows enable . I guess there is some code to disable windows defender or make the infectious files stealth ?
Hey guys i have a question, i need to protect windows in passive mode against linux cd usb, there is a way i can do that ?🤔 Because i try with bios UEFI secure boot but him just take of the bios battery reset password disabled secure boot... Total encryption is no admissible actually because difficulty to reach access in case we need recover something, so i am looking by something in a windows file system level ? I need block him to replace magnify by cmd... Ty in advance.
@@maddinmanek8679 ty, yeas i guess i will need some kind of key lock physically. Would be nice be at the top of the food chain by blocking access in a binary way and show muscle 💪🏻 😁 hope i can do something at a binary level like encrypt just windows folder, that would be nice 🙂
Every time when I use *Metasploit* with my *Windows 10* _command prompt._ it shows me an *error* like this: *Unable to load the EventMachine C extension; To use the pure-ruby reactor, require 'em/pure_ruby'*
@@sandeepr7141 I don’t think it is the man’s English that is the problem but some people need the subtitles to better understand what is being said (regardless of if the speaker “has an accent”))
I'm glad I took this course and learned the basics of PowerShell-Empire/Starkiller, which I barely knew before (it's briefly mentioned in PTSv2).
However, after many attempts and many hours "lost," I can say that today Windows Defender can block almost everything.
In addition to the aforementioned powershell/privesc/bypass, which only works with Windows Defender disabled (and even requires user input LOL), persistence techniques are also easily blocked.
Both registry method and scheduled task method at Windows reboot do not reconnect to the Listener, and a quick look at the Windows Defender history shows that they are blocked easily.
In practice, the only thing that still works is Invoke-Obfuscation! :,)
Anyway, as always, thank Alexis for using your time to share your knowledge with everyone for free.
See you soon!
You are great teacher. Seriously. Your skill are amazing. I am your fan. Lots of love from India. 🇮🇳
yayyyyyy Fav Teacher back again with another video ( hackersploit voice )
Another one from hackersploit 🔥🔥🔥
ruclips.net/video/K3t6Jf3vuPw/видео.html
Hackersploit Back again with another video😍
for you guys
Good stuff
Keep up the good work
ruclips.net/video/K3t6Jf3vuPw/видео.html
Perfect as always 😎
As always great video keep it doing 😊
Check this one out ruclips.net/video/K3t6Jf3vuPw/видео.html
I did learn some from this. But non of the persistence techniques seem to work on WIn 10 anymore. Spent all day trying
It s ennificient I find that hackers can't send the infectious.xls with defender windows enable . I guess there is some code to disable windows defender or make the infectious files stealth ?
Hey guys i have a question, i need to protect windows in passive mode against linux cd usb, there is a way i can do that ?🤔 Because i try with bios UEFI secure boot but him just take of the bios battery reset password disabled secure boot...
Total encryption is no admissible actually because difficulty to reach access in case we need recover something, so i am looking by something in a windows file system level ? I need block him to replace magnify by cmd... Ty in advance.
Probably protecting physical access?
@@maddinmanek8679 ty, yeas i guess i will need some kind of key lock physically.
Would be nice be at the top of the food chain by blocking access in a binary way and show muscle 💪🏻 😁 hope i can do something at a binary level like encrypt just windows folder, that would be nice 🙂
ruclips.net/video/K3t6Jf3vuPw/видео.html
Thanks for the knowledge
ruclips.net/video/K3t6Jf3vuPw/видео.html
Useful , also its better to take a snapshot before trying .
ruclips.net/video/K3t6Jf3vuPw/видео.html
Anyone else have problems getting PE to work on the last few builds of kali?
ruclips.net/video/K3t6Jf3vuPw/видео.html
Hello sir! Can I download your videos from link in the web site?
Why not of course
We can
ruclips.net/video/K3t6Jf3vuPw/видео.html
Every time when I use *Metasploit* with my *Windows 10* _command prompt._ it shows me an *error* like this:
*Unable to load the EventMachine C extension; To use the pure-ruby reactor, require 'em/pure_ruby'*
Missing packages to run it
@@disrael2101 What should i do
@@arcane2024 why not just run it in linux?
@@itzzbayzz Today I installed kali linux in virtual box. Now it is working fin. thanks
*_Thanks for everyone who help_*
Most commentors of this channel should take a complete Linux basic course to stop asking basic questions....
ruclips.net/video/K3t6Jf3vuPw/видео.html
💥💥💥
Love it
ruclips.net/video/K3t6Jf3vuPw/видео.html
💀😈
First💀
Please add English subtitles to your videos sir
Why? His accent is understandable
@@sandeepr7141 I don’t think it is the man’s English that is the problem but some people need the subtitles to better understand what is being said (regardless of if the speaker “has an accent”))