Sir aap bhi iss course ko advanced level tak leke jaao taaki haam acche se padh saake future mai aapka koi course purchase karne ka try karenge ... Aur ek naye playlist start kro regarding how to enter into CTF challenges!! live practicals!!
This course journay is till intermediate and if you are talking about the CTFs this will taught laot of technique to enter and solve a ctfs because this total practical oriented course where you get lot of techniques to solve a CTF or pentesting of an organisation. So i request don't miss any class and also share your friends who want to make their carrier in cybersecurity. This course is follow a proper roadmap so don't worry but i want only support guys.
Guys its marketing strategy of CEH they using the AI word to sell their course. If you see the syllabous of V13 then you will realize its similar to previous just they add the AI words with everyone. But don't worry i will come with a good and better course with AI.
Sir ,my name is Sourya Dutta ,i have a question related to switches of nmap My question is that, sir you use -PS for TCP SYN scan under host discovery, but there is also a switch available -sS for TCP SYN scan under scanning techniques. have they different use cases or i can use any one for TCP SYN scan ??? and also thank you sir to provide this great course to us.
@kadiwalafarman RST packet is send to forcefully close the connection that's one reason another reason is to use this technique that firewall can't log this into own logs because attacker not performing three way complete handshake. Its only performing half by sending RST. May be you got your answer if still any doubt then ask me.
is it safe to use with login in browser in kali machine? some of security does not give advice to login in kali machine. so what's the truth behind it.
Today I was downloading Parrot OS, so when I was downloading the iso file of Parrot OS it was not downloading, the reason for not downloading was told by the virus scan that the iso file was not safe or is there any other reason due to which the windows security system or Google Chrome's security system was not allowing it ?
Great sir plz don't discontinue this series we want it soo much 😊😊
After sometime it's gonna be paid bro 😅
@@AlphaSec-zn1on you don't worry brother 😁
Beta paid hona hota to ab tk ho chuka hota, sikhne pe focus kro faltu ki baato pe nhi
@@defronix yes sir
Yes sir very very deep and useful content it will take some time but will reach a great level views
Sir ap bohoot achy sa samjhaty ho
Nice lecture sir
Sir aap bhi iss course ko advanced level tak leke jaao taaki haam acche se padh saake future mai aapka koi course purchase karne ka try karenge ... Aur ek naye playlist start kro regarding how to enter into CTF challenges!! live practicals!!
This course journay is till intermediate and if you are talking about the CTFs this will taught laot of technique to enter and solve a ctfs because this total practical oriented course where you get lot of techniques to solve a CTF or pentesting of an organisation. So i request don't miss any class and also share your friends who want to make their carrier in cybersecurity. This course is follow a proper roadmap so don't worry but i want only support guys.
@@shamsingh9688 Thankyou for your response! mai appka saath dunga journey ke end tak!!
Sir please describe about different types of ARP Protocols
We will discuss in wifi pentesting journey
Sir Ready for Lecture 8 !!
Great
Make a video playlist about the CEH v13 ( AI )
Guys its marketing strategy of CEH they using the AI word to sell their course. If you see the syllabous of V13 then you will realize its similar to previous just they add the AI words with everyone. But don't worry i will come with a good and better course with AI.
Sir ,my name is Sourya Dutta ,i have a question related to switches of nmap
My question is that, sir you use -PS for TCP SYN scan under host discovery, but there is also a switch available -sS for TCP SYN scan under scanning techniques.
have they different use cases or i can use any one for TCP SYN scan ???
and also thank you sir to provide this great course to us.
In 56:12 computer send tcp Ack then what used of Rst in tcp
@kadiwalafarman
RST packet is send to forcefully close the connection that's one reason another reason is to use this technique that firewall can't log this into own logs because attacker not performing three way complete handshake. Its only performing half by sending RST.
May be you got your answer if still any doubt then ask me.
Sir please Share last 2 videos PPT
uploaded on my linkedin account
Sir please give us PPT contents
Sure i will provide you PPT please give me some time don't worry i promise i will add.
is it safe to use with login in browser in kali machine? some of security does not give advice to login in kali machine. so what's the truth behind it.
Today I was downloading Parrot OS, so when I was downloading the iso file of Parrot OS it was not downloading, the reason for not downloading was told by the virus scan that the iso file was not safe or is there any other reason due to which the windows security system or Google Chrome's security system was not allowing it ?
For newer version of parrot os there is some proble
DOUBT:
to bhaiya kya exam mein sare tool ke command yaad rakhna padta hai