Ethical HACKING Full Course in 10 HOURS (Beginners to Pro) | Learn Ethical Hacking 2024

Поделиться
HTML-код
  • Опубликовано: 21 авг 2024

Комментарии • 8 тыс.

  • @wscubetech
    @wscubetech  2 года назад +382

    🔴 To learn Ethical Hacking online with regular LIVE CLASSES, enroll now: bit.ly/ethical-hacking-practical-course
    👉Check Out the Course Module: drive.google.com/file/d/18N0ASGiQthHBQW7OxOC6PesZ_419UQsC/view

    • @AKNagpuri853
      @AKNagpuri853 2 года назад +8

      Sir mere sath fraud hua paise ka agar aap kuchh help kar sakte hain
      Jis number se baat hua tha wo avi tak active hai aur phone bhi recceive karta hai .kya aap help kar sakte hain please help me

    • @AKNagpuri853
      @AKNagpuri853 2 года назад +2

      27 january 2022 morning time

    • @Rafik-vj8nq
      @Rafik-vj8nq 2 года назад +1

      Rk

    • @romeokanha2006
      @romeokanha2006 2 года назад +1

      Ff id ke chakkar me

    • @sk.sohibulnabab8909
      @sk.sohibulnabab8909 2 года назад

      Nk

  • @NEWASEDITS
    @NEWASEDITS Год назад +5111

    Jinke paas meri tarah computer nhi hai woh attendence lagaye😂

  • @bahubalisharma1107
    @bahubalisharma1107 2 года назад +6958

    Tomorrow is my pre board and I am watching this 😂

  • @Supercaredit834
    @Supercaredit834 5 месяцев назад +129

    Support kro aise logo ko Jo har kisi ka account hack krne me help kre 😅

  • @rishubg8834
    @rishubg8834 7 месяцев назад +59

    In this ethical hacking tutorial for beginners, you will learn these cyber security course topics-
    00:00 | Introduction, Use, Scope & Laws of Ethical Hacking
    12:52 | What is networking, Types of Networking, IP address, ports
    35:14 | OSI model vs TCP/IP Model
    41:26 | Network Protocols and there working
    49:44 | Introduction of Domain name, DNS and Zone files
    57:48 | Request VS Responses Brief
    01:08:30 | Capturing and Analyzing Network Packets
    01:11:51 | All About Linux
    01:40:28 | Install Kali in Virtual Box
    02:00:16 | Installing hacking Scripts, Tools and Wordlists.
    02:19:59 | Complete Anonymous Settings(Proxy, VPN & MAC Address)
    02:49:20 | Install and Configure Testing machines
    02:56:49 | What is Foot Printing and Reconnaissance
    03:03:26 | How to Foot printing
    03:28:13 | How to Foot printing a Website
    04:07:17 | How to Footprinting a Email
    04:12:03 | DNS, Who is and more footprinting technique
    04:28:45 | What is Network Scanning
    04:42:37 | Basic to Advance network Scanning.
    05:10:55 | What is Enumeration?
    05:21:19 | How to Enumerate NetBIOS?
    05:26:24 | How to Enumerate SNMP?
    05:29:51 | How to Enumerate SMTP?
    05:34:25 | How to Enumerate NFS?
    05:40:58 | How to Enumerate DNS?
    05:42:56 | Brief about Vulnerability Assessment
    05:53:50 | How to test for Vulnerabilities and Keep yourself safe?
    06:14:38 | What is System Hacking?
    06:19:57 | How to Escalate Privilege's in linux and Windows
    06:29:14 | What is Steganography and How it works?
    06:35:09 | How to clear logs from Windows & Linux machine?
    06:38:56 | What is Malware, Trojan & worms. (Detect malware)
    06:50:53 | How to create Payloads basic to advance?
    07:13:34 | What is Sniffing?
    07:27:12 | How to MAC Spoofing and Flooding?
    07:35:00 | Hacking DHCP and MITM
    07:44:51 | The Power of Social Engineering
    07:51:04 | Tools Used in Social Engineering
    08:00:00 | The Power of DoS/DDoS Attack
    08:10:02 | Performing DoS and DDoS Attack
    08:13:36 | What is Session Hijacking?
    08:23:06 | Performing Session Hijacking
    08:30:35 | Web Servers VS Applications
    08:39:13 | Vulnerability Scanning with Acunetix
    08:43:24 | Introduction to Hacking Wireless Networks
    08:51:54 | Hacking Wireless Networks
    09:05:22 | How Secure Mobile Platform is?
    09:15:56 | Calls, SMS, Email Bombing
    09:23:58 | How to Generate a good Payload
    09:33:04 | Keylogger applications for Android
    09:37:07 | Info Gathering from G-Account.
    09:43:52 | What is Cryptography

  • @kunalmithsrivastava2982
    @kunalmithsrivastava2982 Год назад +678

    00:00 | Introduction, Use, Scope & Laws of Ethical Hacking
    12:52 | What is networking, Types of Networking, IP address, ports
    35:14 | OSI model vs TCP/IP Model
    41:26 | Network Protocols and there working
    49:44 | Introduction of Domain name, DNS and Zone files
    57:48 | Request VS Responses Brief
    01:08:30 | Capturing and Analyzing Network Packets
    01:11:51 | All About Linux
    01:40:28 | Install Kali in Virtual Box
    02:00:16 | Installing hacking Scripts, Tools and Wordlists.
    02:19:59 | Complete Anonymous Settings(Proxy, VPN & MAC Address)
    02:49:20 | Install and Configure Testing machines
    02:56:49 | What is Foot Printing and Reconnaissance
    03:03:26 | How to Foot printing
    03:28:13 | How to Foot printing a Website
    04:07:17 | How to Footprinting a Email
    04:12:03 | DNS, Who is and more footprinting technique
    04:28:45 | What is Network Scanning
    04:42:37 | Basic to Advance network Scanning.
    05:10:55 | What is Enumeration?
    05:21:19 | How to Enumerate NetBIOS?
    05:26:24 | How to Enumerate SNMP?
    05:29:51 | How to Enumerate SMTP?
    05:34:25 | How to Enumerate NFS?
    05:40:58 | How to Enumerate DNS?
    05:42:56 | Brief about Vulnerability Assessment
    05:53:50 | How to test for Vulnerabilities and Keep yourself safe?
    06:14:38 | What is System Hacking?
    06:19:57 | How to Escalate Privilege's in linux and Windows
    06:29:14 | What is Steganography and How it works?
    06:35:09 | How to clear logs from Windows & Linux machine?
    06:38:56 | What is Malware, Trojan & worms. (Detect malware)
    06:50:53 | How to create Payloads basic to advance?
    07:13:34 | What is Sniffing?
    07:27:12 | How to MAC Spoofing and Flooding?
    07:35:00 | Hacking DHCP and MITM
    07:44:51 | The Power of Social Engineering
    07:51:04 | Tools Used in Social Engineering
    08:00:00 | The Power of DoS/DDoS Attack
    08:10:02 | Performing DoS and DDoS Attack
    08:13:36 | What is Session Hijacking?
    08:23:06 | Performing Session Hijacking
    08:30:35 | Web Servers VS Applications
    08:39:13 | Vulnerability Scanning with Acunetix
    08:43:24 | Introduction to Hacking Wireless Networks
    08:51:54 | Hacking Wireless Networks
    09:05:22 | How Secure Mobile Platform is?
    09:15:56 | Calls, SMS, Email Bombing
    09:23:58 | How to Generate a good Payload
    09:33:04 | Keylogger applications for Android
    09:37:07 | Info Gathering from G-Account.
    09:43:52 | What is Cryptography

  • @Hajmola_754
    @Hajmola_754 4 месяца назад +12

    teacher त्वं बहु उत्तमं कार्यं करोषि मम भवतः कार्यं रोचते
    भवन्तः एतादृशं विडियो निर्मान्ति एव, महत् अनुभूयते, भवतः कारणात् जीवनं सुलभं जातम्, भवतः कृते भवतः च विडियोषु बहु प्रेम ❤

  • @creatersocialsquadgaming9372
    @creatersocialsquadgaming9372 6 месяцев назад +236

    Who's watching this video in 2024😊

  • @rutvik._.sathvara4117
    @rutvik._.sathvara4117 Год назад +90

    I don't know why i dont like Coding But honestly telling i suggest this video whenever i watch Gaming streams And After 1 hour of constant watching this video I really like To learn about Ethical hack more and more Thanks alot for this 💗.

  • @ajayshah5369
    @ajayshah5369 2 года назад +20

    Sir, poor students can't purchase plz aap hi sabhi course nd path sikhaiye sir,, aap ka course se bohot se poor people padh ke life me kuchh achchhha kar payenge ..i salyut uh from nepal..may god fulfill ur every desire..❤️❤️😊😊

  • @ATTIQ_OFFICIAL
    @ATTIQ_OFFICIAL Год назад +67

    i can literally get full marks after this video my paper isn't about hacking but still he made me understood everything from 0-100 i know the basics but still he made it crystal clear now love from Pakistan boii

    • @dark6937
      @dark6937 Год назад +3

      Isi liye india tum se bahut aage hai hindu power hai yeh

    • @dark6937
      @dark6937 Год назад

      @@faizeditz5921 tum pathaar chumo or bomb phodo camel ke peshab piyo apni ma ka halala karwao aur terrorist attack karwao converted bulle😂😂😂

    • @anuragprajapati7963
      @anuragprajapati7963 Год назад

      ​@@faizeditz5921 beta power ki baat na kr to hi bhetar h

    • @mratif9247
      @mratif9247 Год назад

      @@anuragprajapati7963 hat sala mootia

    • @PankajKumar-eu7oy
      @PankajKumar-eu7oy Год назад

      Lawra le loo beticod tujhe Kashmir chahye yha se Gyan kyu le rha Kashmir ka bhikari apna aukat nhi h sale tere pass Indian se help le rha Kashmir chahye

  • @Vinay_Thakur_ML
    @Vinay_Thakur_ML 9 месяцев назад +59

    Maturity is when you realise that this is just the Tutorial in Hacking World.😂😂

    • @engineeringlife4567
      @engineeringlife4567 8 месяцев назад +3

      Yes

    • @a.ckutty6089
      @a.ckutty6089 4 месяца назад +2

      bro i am in 10th grade so, should i learn this course at this age ?

    • @HdudjdUdududur
      @HdudjdUdududur 4 месяца назад

      ​@@a.ckutty6089yes

    • @ArafutoUzumaki
      @ArafutoUzumaki 4 месяца назад

      ​@@a.ckutty6089yeah

    • @user-ks8mb7uo4l
      @user-ks8mb7uo4l 3 месяца назад

      ​@@a.ckutty6089 Yes , You should but always be safe and hidden and only hack when you have permission, one wrong move can destroy your entire life

  • @beluga3927
    @beluga3927 2 года назад +239

    जिस जिस ने पूरी video देखी मैं उनके passion को salute करता हु

    • @historylover9762
      @historylover9762 2 года назад +6

      Dekhi lekin ek sath nahi 3 din m😁😁😁

    • @Mkrboss21
      @Mkrboss21 2 года назад +1

      @@historylover9762 😀😂😂😂😂😂

    • @ayushfantasyside1508
      @ayushfantasyside1508 2 года назад

      @@historylover9762 kasa samajh ma aaya bro

    • @Sukhgaming157
      @Sukhgaming157 2 года назад +1

      Ma ne puri video dekhi aage kr kr ke 😂😂

    • @JayMahadev211
      @JayMahadev211 Год назад

      @@ayushfantasyside1508 bhai apko instagram id hack ata ha kya please bata do bhai

  • @amjidkhan6261
    @amjidkhan6261 2 года назад +121

    Great thing is that he will not waste even a second on irrelavent contants. Great job. I think coverd all basics

  • @immortaltecharena.official
    @immortaltecharena.official 9 месяцев назад +12

    This is the most unique learning video i ever found in the internet

  • @Theboys2441
    @Theboys2441 Год назад +61

    So helpful . But if it was divided in parts , i think it would be much better 😭😭😭😭

    • @AdnanBaloch-jb7fv
      @AdnanBaloch-jb7fv 3 месяца назад +1

      In this ethical hacking tutorial for beginners, you will learn these cyber security course topics-
      00:00 | Introduction, Use, Scope & Laws of Ethical Hacking
      12:52 | What is networking, Types of Networking, IP address, ports
      35:14 | OSI model vs TCP/IP Model
      41:26 | Network Protocols and there working
      49:44 | Introduction of Domain name, DNS and Zone files
      57:48 | Request VS Responses Brief
      01:08:30 | Capturing and Analyzing Network Packets
      01:11:51 | All About Linux
      01:40:28 | Install Kali in Virtual Box
      02:00:16 | Installing hacking Scripts, Tools and Wordlists.
      02:19:59 | Complete Anonymous Settings(Proxy, VPN & MAC Address)
      02:49:20 | Install and Configure Testing machines
      02:56:49 | What is Foot Printing and Reconnaissance
      03:03:26 | How to Foot printing
      03:28:13 | How to Foot printing a Website
      04:07:17 | How to Footprinting a Email
      04:12:03 | DNS, Who is and more footprinting technique
      04:28:45 | What is Network Scanning
      04:42:37 | Basic to Advance network Scanning.
      05:10:55 | What is Enumeration?
      05:21:19 | How to Enumerate NetBIOS?
      05:26:24 | How to Enumerate SNMP?
      05:29:51 | How to Enumerate SMTP?
      05:34:25 | How to Enumerate NFS?
      05:40:58 | How to Enumerate DNS?
      05:42:56 | Brief about Vulnerability Assessment
      05:53:50 | How to test for Vulnerabilities and Keep yourself safe?
      06:14:38 | What is System Hacking?
      06:19:57 | How to Escalate Privilege's in linux and Windows
      06:29:14 | What is Steganography and How it works?
      06:35:09 | How to clear logs from Windows & Linux machine?
      06:38:56 | What is Malware, Trojan & worms. (Detect malware)
      06:50:53 | How to create Payloads basic to advance?
      07:13:34 | What is Sniffing?
      07:27:12 | How to MAC Spoofing and Flooding?
      07:35:00 | Hacking DHCP and MITM
      07:44:51 | The Power of Social Engineering
      07:51:04 | Tools Used in Social Engineering
      08:00:00 | The Power of DoS/DDoS Attack
      08:10:02 | Performing DoS and DDoS Attack
      08:13:36 | What is Session Hijacking?
      08:23:06 | Performing Session Hijacking
      08:30:35 | Web Servers VS Applications
      08:39:13 | Vulnerability Scanning with Acunetix
      08:43:24 | Introduction to Hacking Wireless Networks
      08:51:54 | Hacking Wireless Networks
      09:05:22 | How Secure Mobile Platform is?
      09:15:56 | Calls, SMS, Email Bombing
      09:23:58 | How to Generate a good Payload
      09:33:04 | Keylogger applications for Android
      09:37:07 | Info Gathering from G-Account.
      09:43:52 | What is Cryptography

  • @batman698-0
    @batman698-0 Год назад +69

    I am CEH certified from EC Council.
    I would highly recommend this course to beginners who start their carrier in Cybersecurity and Ethical hacking. You've done great job sir. Kudos to you

    • @Shubham-zs3oj
      @Shubham-zs3oj Год назад +4

      Bhai spamming krne se kya mil jata h tm logo ko

    • @syedsweety4821
      @syedsweety4821 Год назад

      Bhai mujhy apki help chahiye

    • @batman698-0
      @batman698-0 Год назад

      @@syedsweety4821 kya hua

    • @jaskaranmaan3369
      @jaskaranmaan3369 Год назад

      Cn u help me in cybersecurity like what i need exactly please

    • @pratik7728
      @pratik7728 Год назад +3

      @@jaskaranmaan3369 maybe A Computer 🌚

  • @Game-dd5lm
    @Game-dd5lm 2 года назад +597

    Timestamps:
    00:00 | Introduction, Use, Scope & Laws of Ethical Hacking
    12:52 | What is networking, Types of Networking, IP address, ports
    35:14 | OSI model vs TCP/IP Model
    41:26 | Network Protocols and there working
    49:44 | Introduction of Domain name, DNS and Zone files
    57:48 | Request VS Responses Brief
    01:08:30 | Capturing and Analyzing Network Packets
    01:11:51 | All About Linux
    01:40:28 | Install Kali in Virtual Box
    02:00:16 | Installing hacking Scripts, Tools and Wordlists.
    02:19:59 | Complete Anonymous Settings(Proxy, VPN & MAC Address)
    02:49:20 | Install and Configure Testing machines
    02:56:49 | What is Foot Printing and Reconnaissance
    03:03:26 | How to Foot printing
    03:28:13 | How to Foot printing a Website
    04:07:17 | How to Footprinting a Email
    04:12:03 | DNS, Who is and more footprinting technique
    04:28:45 | What is Network Scanning
    04:42:37 | Basic to Advance network Scanning.
    05:10:55 | What is Enumeration?
    05:21:19 | How to Enumerate NetBIOS?
    05:26:24 | How to Enumerate SNMP?
    05:29:51 | How to Enumerate SMTP?
    05:34:25 | How to Enumerate NFS?
    05:40:58 | How to Enumerate DNS?
    05:42:56 | Brief about Vulnerability Assessment
    05:53:50 | How to test for Vulnerabilities and Keep yourself safe?
    06:14:38 | What is System Hacking?
    06:19:57 | How to Escalate Privilege's in linux and Windows
    06:29:14 | What is Steganography and How it works?
    06:35:09 | How to clear logs from Windows & Linux machine?
    06:38:56 | What is Malware, Trojan & worms. (Detect malware)
    06:50:53 | How to create Payloads basic to advance?
    07:13:34 | What is Sniffing?
    07:27:12 | How to MAC Spoofing and Flooding?
    07:35:00 | Hacking DHCP and MITM
    07:44:51 | The Power of Social Engineering
    07:51:04 | Tools Used in Social Engineering
    08:00:00 | The Power of DoS/DDoS Attack
    08:10:02 | Performing DoS and DDoS Attack
    08:13:36 | What is Session Hijacking?
    08:23:06 | Performing Session Hijacking
    08:30:35 | Web Servers VS Applications
    08:39:13 | Vulnerability Scanning with Acunetix
    08:43:24 | Introduction to Hacking Wireless Networks
    08:51:54 | Hacking Wireless Networks
    09:05:22 | How Secure Mobile Platform is?
    09:15:56 | Calls, SMS, Email Bombing
    09:23:58 | How to Generate a good Payload
    09:33:04 | Keylogger applications for Android
    09:37:07 | Info Gathering from G-Account.
    09:43:52 | What is Cryptography

  • @creationtanishq
    @creationtanishq Год назад +32

    Time stamp :
    00:00 | Introduction, Use, Scope & Laws of Ethical Hacking
    12:52 | What is networking, Types of Networking, IP address, ports
    35:14 | OSI model vs TCP/IP Model
    41:26 | Network Protocols and there working
    49:44 | Introduction of Domain name, DNS and Zone files
    57:48 | Request VS Responses Brief
    01:08:30 | Capturing and Analyzing Network Packets
    01:11:51 | All About Linux
    01:40:28 | Install Kali in Virtual Box
    02:00:16 | Installing hacking Scripts, Tools and Wordlists.
    02:19:59 | Complete Anonymous Settings(Proxy, VPN & MAC Address)
    02:49:20 | Install and Configure Testing machines
    02:56:49 | What is Foot Printing and Reconnaissance
    03:03:26 | How to Foot printing
    03:28:13 | How to Foot printing a Website
    04:07:17 | How to Footprinting a Email
    04:12:03 | DNS, Who is and more footprinting technique
    04:28:45 | What is Network Scanning
    04:42:37 | Basic to Advance network Scanning.
    05:10:55 | What is Enumeration?
    05:21:19 | How to Enumerate NetBIOS?
    05:26:24 | How to Enumerate SNMP?
    05:29:51 | How to Enumerate SMTP?
    05:34:25 | How to Enumerate NFS?
    05:40:58 | How to Enumerate DNS?
    05:42:56 | Brief about Vulnerability Assessment
    05:53:50 | How to test for Vulnerabilities and Keep yourself safe?
    06:14:38 | What is System Hacking?
    06:19:57 | How to Escalate Privilege's in linux and Windows
    06:29:14 | What is Steganography and How it works?
    06:35:09 | How to clear logs from Windows & Linux machine?
    06:38:56 | What is Malware, Trojan & worms. (Detect malware)
    06:50:53 | How to create Payloads basic to advance?
    07:13:34 | What is Sniffing?
    07:27:12 | How to MAC Spoofing and Flooding?
    07:35:00 | Hacking DHCP and MITM
    07:44:51 | The Power of Social Engineering
    07:51:04 | Tools Used in Social Engineering
    08:00:00 | The Power of DoS/DDoS Attack
    08:10:02 | Performing DoS and DDoS Attack
    08:13:36 | What is Session Hijacking?
    08:23:06 | Performing Session Hijacking
    08:30:35 | Web Servers VS Applications
    08:39:13 | Vulnerability Scanning with Acunetix
    08:43:24 | Introduction to Hacking Wireless Networks
    08:51:54 | Hacking Wireless Networks
    09:05:22 | How Secure Mobile Platform is?
    09:15:56 | Calls, SMS, Email Bombing
    09:23:58 | How to Generate a good Payload
    09:33:04 | Keylogger applications for Android
    09:37:07 | Info Gathering from G-Account.
    09:43:52 | What is Cryptography

    • @sandeepkushwaha1105
      @sandeepkushwaha1105 Год назад +2

      Bhai kaise aur kyu?

    • @M_Shami_Janjua
      @M_Shami_Janjua Год назад

      Thanks . You did a great work . It is too helpful

    • @petergamerboysk7956
      @petergamerboysk7956 10 месяцев назад +2

      C language ya python language ye sab sikhna pade ga kya plz bata do

    • @creationtanishq
      @creationtanishq 10 месяцев назад +1

      @@petergamerboysk7956 bas language ki knowledge hona chahiye upar upar se aap ko deep me ho n ho wo matter nhi karta . Aur is video me koi bhi language ko nhi point Kiya gya hai to aap ko tension nhi Lena okay

  • @BTW_BornToWin
    @BTW_BornToWin 5 месяцев назад +3

    Salute to who ever have watched it all...

  • @shahsahab3032
    @shahsahab3032 2 года назад +151

    Sir Allah pak apko kamyabi day ap Ny hmaray Lea itna important time Dia utube video bnanay pr or smjhanay pr😘😘😘Slute boss u are great legend

  • @sanjeevagarasia3658
    @sanjeevagarasia3658 2 года назад +127

    Sir aap boht bada kaam kar rahe h...aajkal free mein esi chize milna boht mushkil hai 😃😍🙌🙏🙏

    • @cgcomicwoman
      @cgcomicwoman 2 года назад +7

      ham apna data de rhe h bhai😅

    • @Pankajdreamii
      @Pankajdreamii 2 года назад +3

      Bhai comment shirf karte ho ya padhte bhi ho

    • @akarshitpanday
      @akarshitpanday 2 года назад +3

      Bhai mai class 12 ka student hu mai kaha se suru karu please help

    • @nabinthapa7100
      @nabinthapa7100 2 года назад +3

      @@akarshitpanday apne laptop par Kali Linux install karo aaur suru karo :)

    • @nabinthapa7100
      @nabinthapa7100 2 года назад

      Paisa hi paisa🤣🤣

  • @AbhijitKathale
    @AbhijitKathale 8 месяцев назад +2

    I am brain tumor पेशंट एंड i am learn ethical haking 😢

  • @devangkvideos8414
    @devangkvideos8414 2 года назад +469

    I don't skip because u deserve revenue ✨💯

  • @Prodbybah
    @Prodbybah 2 года назад +12

    Me jab class 7 me tha toh yegi dhoondh rha tha fir wakt ke bad passion change ho gya ab fir isko dekhke laga lets go thank you sir 💜

    • @NicolasAlvesDias
      @NicolasAlvesDias 6 месяцев назад

      jab ye comment kiya tha tb konse class mee the aap and now what are you doing in cybersec?

  • @ashishkumarrajak4531
    @ashishkumarrajak4531 Год назад +4

    Sir kya gajab ka , dimag me ghusa sir , lajawab 😊, mujhe bahut kuchh , 1.ghante ,30 minut ke under hi bahut achha laga aur ye video, mai pura dekhunga, 😊😊😊😊😊

    • @dhrgaming7160
      @dhrgaming7160 3 месяца назад

      video pura kiya ki adha sod diya bro

  • @DreamRecordz
    @DreamRecordz Год назад +8

    200लाख लोग हैकर बन चुके हैं 😂😂😂😂

  • @aakashpoudel8831
    @aakashpoudel8831 2 года назад +63

    I watched continuously for 2.5 hr and it's worth it

    • @dev.ilgaming3439
      @dev.ilgaming3439 2 года назад +3

      Seriously?

    • @umangsingh3489
      @umangsingh3489 2 года назад

      @@hipiyushpatel tumhare jaise lodu yhhi bol skte

    • @rohanyt4799
      @rohanyt4799 Год назад +1

      @@hipiyushpatel 2.5hr me hacker wow,bro tcp udp sahi se samjhn muskil hai.tum itni jaldi hacker ban gaye

    • @chanchal6
      @chanchal6 9 месяцев назад +1

      Hack kra kiya kisi ka

  • @AA__DJ918
    @AA__DJ918 5 месяцев назад +4

    Kon kon is video ko pura nahi dekha 1din me😊

  • @user-zw2nu9ul4n
    @user-zw2nu9ul4n Год назад +2

    Mujhe ek sal laga bhai haker banne mein thank you bhai bug respect for you ❤

  • @yashwanth7285
    @yashwanth7285 2 года назад +17

    Bro huge respect from India 🔥

  • @sureshnagargoje7819
    @sureshnagargoje7819 2 года назад +19

    This is Helpful video on RUclips of Hacker. Salute to Video maker because your Efforts of 9 Hours and Salute to the learners that they watch 9 Hours Video 🙏🙏

  • @Jhatkastatus
    @Jhatkastatus 10 месяцев назад +2

    02:11:20Installing hacking tools & work

  • @nabidbhuia7249
    @nabidbhuia7249 2 года назад +31

    It is very precious video for learning ethical hacking.I really thanks to all of your team for making this video.

  • @Technologymaster4you
    @Technologymaster4you Год назад +3

    Basics of basics are here which u can could do in just 4-5 10 minutes videos

  • @ayushrawat7498
    @ayushrawat7498 Год назад +1

    i an starting this course on 23 -05-23 after completing i will give my review wait for it

    • @rajput....
      @rajput.... 7 месяцев назад

      Ho gya complete BHi

  • @ankit5408
    @ankit5408 2 года назад +147

    Timestamps are down below for this cyber security course tutorial -
    00:00 | Introduction, Use, Scope & Laws of Ethical Hacking
    12:52 | What is networking, Types of Networking, IP address, ports
    35:14 | OSI model vs TCP/IP Model
    41:26 | Network Protocols and there working
    49:44 | Introduction of Domain name, DNS and Zone files
    57:48 | Request VS Responses Brief
    01:08:30 | Capturing and Analyzing Network Packets
    01:11:51 | All About Linux
    01:40:28 | Install Kali in Virtual Box
    02:00:16 | Installing hacking Scripts, Tools and Wordlists.
    02:19:59 | Complete Anonymous Settings(Proxy, VPN & MAC Address)
    02:49:20 | Install and Configure Testing machines
    02:56:49 | What is Foot Printing and Reconnaissance
    03:03:26 | How to Foot printing
    03:28:13 | How to Foot printing a Website
    04:07:17 | How to Footprinting a Email
    04:12:03 | DNS, Who is and more footprinting technique
    04:28:45 | What is Network Scanning
    04:42:37 | Basic to Advance network Scanning.
    05:10:55 | What is Enumeration?
    05:21:19 | How to Enumerate NetBIOS?
    05:26:24 | How to Enumerate SNMP?
    05:29:51 | How to Enumerate SMTP?
    05:34:25 | How to Enumerate NFS?
    05:40:58 | How to Enumerate DNS?
    05:42:56 | Brief about Vulnerability Assessment
    05:53:50 | How to test for Vulnerabilities and Keep yourself safe?
    06:14:38 | What is System Hacking?
    06:19:57 | How to Escalate Privilege's in linux and Windows
    06:29:14 | What is Steganography and How it works?
    06:35:09 | How to clear logs from Windows & Linux machine?
    06:38:56 | What is Malware, Trojan & worms. (Detect malware)
    06:50:53 | How to create Payloads basic to advance?
    07:13:34 | What is Sniffing?
    07:27:12 | How to MAC Spoofing and Flooding?
    07:35:00 | Hacking DHCP and MITM
    07:44:51 | The Power of Social Engineering
    07:51:04 | Tools Used in Social Engineering
    08:00:00 | The Power of DoS/DDoS Attack
    08:10:02 | Performing DoS and DDoS Attack
    08:13:36 | What is Session Hijacking?
    08:23:06 | Performing Session Hijacking
    08:30:35 | Web Servers VS Applications
    08:39:13 | Vulnerability Scanning with Acunetix
    08:43:24 | Introduction to Hacking Wireless Networks
    08:51:54 | Hacking Wireless Networks
    09:05:22 | How Secure Mobile Platform is?
    09:15:56 | Calls, SMS, Email Bombing
    09:23:58 | How to Generate a good Payload
    09:33:04 | Keylogger applications for Android
    09:37:07 | Info Gathering from G-Account.
    09:43:52 | What is Cryptography

  • @tanishq...
    @tanishq... 2 года назад +71

    Some people pay to learn ethical hacking but still cannot understand that well.
    But I just watched this video 5 times and I have been perfect at it..
    Thank you so much.🙏🙏

    • @prafullajadhav8549
      @prafullajadhav8549 2 года назад +3

      To kya hack tune?

    • @tanishq...
      @tanishq... 2 года назад +1

      @@prafullajadhav8549 Haa

    • @amirsoyalbahleem479
      @amirsoyalbahleem479 2 года назад +1

      If you understand this video can you learn about it?

    • @tanishq...
      @tanishq... 2 года назад +2

      @@amirsoyalbahleem479 Yes very well.

    • @akashsabale8376
      @akashsabale8376 2 года назад +1

      @@tanishq... Mujhe mobile hacking sikhana hai for eg what's up

  • @OmPradhan-zk1jc
    @OmPradhan-zk1jc 3 месяца назад +2

    Information is wealth 😇😇😇

  • @Dragon-Panda73
    @Dragon-Panda73 7 месяцев назад +5

    I am in Class 10th And My Final Exams Are Near But Still I Am Watching This Without Any Reason 😂

  • @nurnobihasan4082
    @nurnobihasan4082 2 года назад +71

    Sir I'm from Bangladesh 🇧🇩🇧🇩❤️
    Honestly, you are a great Teacher ❤️❤️
    Keep it Up Sir, we all love you ❤️❤️❤️❤️

    • @unknownstunt
      @unknownstunt 2 года назад +1

      আমিও বাংলাদেশের নাগরিক

    • @unknownstunt
      @unknownstunt 2 года назад

      বড় ভাই আমাকে হ্যাক শিখাইবেন প্লিজ

    • @nurnobihasan4082
      @nurnobihasan4082 2 года назад +1

      @@unknownstunt বড় ভাই, এই স্যারের ভিডিও টি ভালো করে দেখুন।
      আমি এখান থেকেই সব কিছু বুঝতে পারছি

    • @unknownstunt
      @unknownstunt 2 года назад

      @@nurnobihasan4082 বড় ভাই আমি হালকা কিছু বুঝতে পারছি

    • @unknownstunt
      @unknownstunt 2 года назад

      @@nurnobihasan4082 আমাকে সাহায্য করুন প্লিজ

  • @shibamjha-0279
    @shibamjha-0279 2 года назад +39

    course is really great sir but it would be really nice if you provide a soft copy of this whole course ....

  • @shivi605
    @shivi605 11 месяцев назад +2

    Bhaiya me maine aapki vedio se bahut kuch sikha hai me aapka bahut sukreia ketta hu🙏🙏🙏🙏

  • @tanjimulbhai24
    @tanjimulbhai24 3 месяца назад +2

    Thanks for this course , Love you Ashish sir.💖💖

  • @rlrevengestudio1.1k75
    @rlrevengestudio1.1k75 2 года назад +8

    सोच का ही फर्क होता है वरना, समस्याएं आपको कमजोर नही बल्कि मजबूत बनाने के लिए आती हैं।

  • @rajxx2566
    @rajxx2566 2 года назад +7

    नमस्कार सर, बहुत बढ़िया तरीके से समझाते हैं आप। सच में मज़ा आ रहा है👌👌👏👏

  • @likithffgamer
    @likithffgamer 8 месяцев назад +1

    Thank you so much iam trying from now iam in 6th class why because your class is very interesting thank you for helping me

  • @naturesoul1802
    @naturesoul1802 3 года назад +179

    Thank you so much sir for this wonderful course, I am looking for. I appreciate it. Plz continue this course with some advance topics.

    • @javedempire
      @javedempire 3 года назад +3

      ruclips.net/video/0voTZB1tuDo/видео.html

    • @suniljain614
      @suniljain614 2 года назад

      ruclips.net/video/U7PjeFKUfX0/видео.html

    • @rahulprajapat4169
      @rahulprajapat4169 2 года назад +2

      Have you watched complete video?

    • @bp_gaming3967
      @bp_gaming3967 2 года назад +2

      @@rahulprajapat4169 kisi ki bas ki nahi hai ki puri video dekhe 😂

    • @bp_gaming3967
      @bp_gaming3967 2 года назад

      Maine toh bas 5 min hi dekhi 😂

  • @itzsnake_yt
    @itzsnake_yt 3 года назад +17

    Thanks you sir apne videos hindi me bnyi
    Be proud of Indian🇮🇳.

  • @LearnandFun-zs3jk
    @LearnandFun-zs3jk 9 месяцев назад +4

    Watched full without laptop 💪

  • @non-yp9ny
    @non-yp9ny 2 года назад +21

    Jo full video dek liya wo ultra pro legend hai , big salute to him or her🙋🙋🙋🙋‍♀️🙋‍♂️🙋‍♂️

    • @tzvideos6089
      @tzvideos6089 2 года назад +2

      Man ny daikha subha say

    • @non-yp9ny
      @non-yp9ny 2 года назад

      @@tzvideos6089 tum legend ho

    • @hemantjain1858
      @hemantjain1858 2 года назад

      Done bro 😊

    • @RYFMuzic
      @RYFMuzic 2 года назад +2

      Abbe Koi Legend Vegend Nhi Hai. Apne Daily 2-3 Hours Ka Dhekho. 2-3 Din Me Dhekho Pura Jroori Nhi Ekdum dhekhna Hai

    • @dragon_vs_tiger_mod9890
      @dragon_vs_tiger_mod9890 2 года назад

      @@tzvideos6089 फीर शिक गया भाई हैकिंग😂🙏

  • @Maxxthor
    @Maxxthor Год назад +3

    Jinke paas meri tarah Laptop 💻 ya computer nhi hai wo attendance lagaye 😂😂😂

  • @chandan_kr_yadav
    @chandan_kr_yadav Год назад +9

    Thank You So Much Sir Making This Very Useful Video ❤❤❤

  • @Hemant_khadka
    @Hemant_khadka 2 года назад +83

    Timestamps:
    00:00 | Introduction, Use, Scope & Laws of Ethical Hacking
    12:52 | What is networking, Types of Networking, IP address, ports
    35:14 | OSI model vs TCP/IP Model

  • @opdevanshgaming
    @opdevanshgaming Год назад +259

    Tomorrow is my 10th std. First 80 marks PRELIM!! And I am watching this❤‍🔥😂

  • @piyushsharma7764
    @piyushsharma7764 11 месяцев назад +4

    2:44:53 - if there is an error in cron (like corn service not find or corn service does not exist ) insted using corn use "tor" everywhere where cron is used

  • @sunarkarjahnavi9957
    @sunarkarjahnavi9957 9 месяцев назад +7

    Practical started at 1:41:31

    • @meow_4u
      @meow_4u 7 месяцев назад

      Tqu😊

  • @neeraj1314
    @neeraj1314 Год назад +83

    Timestamps
    00:00 | Introduction, Use, Scope & Laws of Ethical Hacking
    12:52 | What is networking, Types of Networking, IP address, ports
    35:14 | OSI model vs TCP/IP Model
    41:26 | Network Protocols and there working
    49:44 | Introduction of Domain name, DNS and Zone files
    57:48 | Request VS Responses Brief
    01:08:30 | Capturing and Analyzing Network Packets
    01:11:51 | All About Linux
    01:40:28 | Install Kali in Virtual Box
    02:00:16 | Installing hacking Scripts, Tools and Wordlists.
    02:19:59 | Complete Anonymous Settings(Proxy, VPN & MAC Address)
    02:49:20 | Install and Configure Testing machines
    02:56:49 | What is Foot Printing and Reconnaissance
    03:03:26 | How to Foot printing
    03:28:13 | How to Foot printing a Website
    04:07:17 | How to Footprinting a Email
    04:12:03 | DNS, Who is and more footprinting technique
    04:28:45 | What is Network Scanning
    04:42:37 | Basic to Advance network Scanning.
    05:10:55 | What is Enumeration?
    05:21:19 | How to Enumerate NetBIOS?
    05:26:24 | How to Enumerate SNMP?
    05:29:51 | How to Enumerate SMTP?
    05:34:25 | How to Enumerate NFS?
    05:40:58 | How to Enumerate DNS?
    05:42:56 | Brief about Vulnerability Assessment
    05:53:50 | How to test for Vulnerabilities and Keep yourself safe?
    06:14:38 | What is System Hacking?
    06:19:57 | How to Escalate Privilege's in linux and Windows
    06:29:14 | What is Steganography and How it works?
    06:35:09 | How to clear logs from Windows & Linux machine?
    06:38:56 | What is Malware, Trojan & worms. (Detect malware)
    06:50:53 | How to create Payloads basic to advance?
    07:13:34 | What is Sniffing?
    07:27:12 | How to MAC Spoofing and Flooding?
    07:35:00 | Hacking DHCP and MITM
    07:44:51 | The Power of Social Engineering
    07:51:04 | Tools Used in Social Engineering
    08:00:00 | The Power of DoS/DDoS Attack
    08:10:02 | Performing DoS and DDoS Attack
    08:13:36 | What is Session Hijacking?
    08:23:06 | Performing Session Hijacking
    08:30:35 | Web Servers VS Applications
    08:39:13 | Vulnerability Scanning with Acunetix
    08:43:24 | Introduction to Hacking Wireless Networks
    08:51:54 | Hacking Wireless Networks
    09:05:22 | How Secure Mobile Platform is?
    09:15:56 | Calls, SMS, Email Bombing
    09:23:58 | How to Generate a good Payload
    09:33:04 | Keylogger applications for Android
    09:37:07 | Info Gathering from G-Account.
    09:43:52 | What is Cryptography

  • @heart33765
    @heart33765 11 месяцев назад +3

    Mujhe kuchh samajh me nahi aata fir bhi dekhta hu❤️❤️

  • @ATTIQ_OFFICIAL
    @ATTIQ_OFFICIAL Год назад +2

    this channel gets only love from Pakistan

  • @hshsdhdj2871
    @hshsdhdj2871 2 года назад +183

    I really appreciate person who watch full vedio non stop 🤣🤣

  • @Earn_with_Saraiki
    @Earn_with_Saraiki 2 года назад +6

    Good 👍 Sir
    Ap boht Achy tareeky sy btaty hn
    Sir RUclips py Mery favorite ap hn

  • @Storytellervinay532
    @Storytellervinay532 4 месяца назад +3

    Bro salut for your hard work 🎉❤❤

  • @Elixir_naito
    @Elixir_naito 4 дня назад +1

    Kis.kis.ko ye video dekhne.ke.baad haking a gai

  • @volcanicbass1103
    @volcanicbass1103 2 года назад +172

    imestamps:
    00:00 | Introduction, Use, Scope & Laws of Ethical Hacking
    12:52 | What is networking, Types of Networking, IP address, ports
    35:14 | OSI model vs TCP/IP Model
    41:26 | Network Protocols and there working
    49:44 | Introduction of Domain name, DNS and Zone files
    57:48 | Request VS Responses Brief
    01:08:30 | Capturing and Analyzing Network Packets
    01:11:51 | All About Linux
    01:40:28 | Install Kali in Virtual Box
    02:00:16 | Installing hacking Scripts, Tools and Wordlists.
    02:19:59 | Complete Anonymous Settings(Proxy, VPN & MAC Address)
    02:49:20 | Install and Configure Testing machines
    02:56:49 | What is Foot Printing and Reconnaissance
    03:03:26 | How to Foot printing
    03:28:13 | How to Foot printing a Website
    04:07:17 | How to Footprinting a Email
    04:12:03 | DNS, Who is and more footprinting technique
    04:28:45 | What is Network Scanning
    04:42:37 | Basic to Advance network Scanning.
    05:10:55 | What is Enumeration?
    05:21:19 | How to Enumerate NetBIOS?
    05:26:24 | How to Enumerate SNMP?
    05:29:51 | How to Enumerate SMTP?
    05:34:25 | How to Enumerate NFS?
    05:40:58 | How to Enumerate DNS?
    05:42:56 | Brief about Vulnerability Assessment
    05:53:50 | How to test for Vulnerabilities and Keep yourself safe?
    06:14:38 | What is System Hacking?
    06:19:57 | How to Escalate Privilege's in linux and Windows
    06:29:14 | What is Steganography and How it works?
    06:35:09 | How to clear logs from Windows & Linux machine?
    06:38:56 | What is Malware, Trojan & worms. (Detect malware)
    06:50:53 | How to create Payloads basic to advance?
    07:13:34 | What is Sniffing?
    07:27:12 | How to MAC Spoofing and Flooding?
    07:35:00 | Hacking DHCP and MITM
    07:44:51 | The Power of Social Engineering
    07:51:04 | Tools Used in Social Engineering
    08:00:00 | The Power of DoS/DDoS Attack
    08:10:02 | Performing DoS and DDoS Attack
    08:13:36 | What is Session Hijacking?
    08:23:06 | Performing Session Hijacking
    08:30:35 | Web Servers VS Applications
    08:39:13 | Vulnerability Scanning with Acunetix
    08:43:24 | Introduction to Hacking Wireless Networks
    08:51:54 | Hacking Wireless Networks
    09:05:22 | How Secure Mobile Platform is?
    09:15:56 | Calls, SMS, Email Bombing
    09:23:58 | How to Generate a good Payload
    09:33:04 | Keylogger applications for Android
    09:37:07 | Info Gathering from G-Account.
    09:43:52 | What is Cryptography

    • @anand_7542
      @anand_7542 2 года назад +2

      Thank u

    • @stylexmaxyt2617
      @stylexmaxyt2617 2 года назад +1

      Nice 👍

    • @yomadicvinod
      @yomadicvinod 2 года назад +1

      Thanks

    • @ALIHASSAN-en6sc
      @ALIHASSAN-en6sc 2 года назад +1

      mai kali linux intall kar raha tha lakin jab mai power on krta ho virtual machine wali file attached kar ka to error a jata hai
      (1) Verify that the BIOS/firmware settings enable Intel VT-x and disable 'trusted execution.
      koi solve karwa dai ka yah kya masla hai

    • @nandanchandrabehera1464
      @nandanchandrabehera1464 2 года назад

      Sir please help me
      IP changing command not working.
      Please tell me sir how I solve it.

  • @cktrend4072
    @cktrend4072 2 года назад +155

    Timestamps are down below for this cyber security course tutorial -
    00:00 | Introduction, Use, Scope & Laws of Ethical Hacking
    12:52 | What is networking, Types of Networking, IP address, ports
    35:14 | OSI model vs TCP/IP Model
    41:26 | Network Protocols and there working
    49:44 | Introduction of Domain name, DNS and Zone files
    57:48 | Request VS Responses Brief
    01:08:30 | Capturing and Analyzing Network Packets
    01:11:51 | All About Linux
    01:40:28 | Install Kali in Virtual Box
    02:00:16 | Installing hacking Scripts, Tools and Wordlists.
    02:19:59 | Complete Anonymous Settings(Proxy, VPN & MAC Address)
    02:49:20 | Install and Configure Testing machines
    02:56:49 | What is Foot Printing and Reconnaissance
    03:03:26 | How to Foot printing
    03:28:13 | How to Foot printing a Website
    04:07:17 | How to Footprinting a Email
    04:12:03 | DNS, Who is and more footprinting technique
    04:28:45 | What is Network Scanning
    04:42:37 | Basic to Advance network Scanning.
    05:10:55 | What is Enumeration?
    05:21:19 | How to Enumerate NetBIOS?
    05:26:24 | How to Enumerate SNMP?
    05:29:51 | How to Enumerate SMTP?
    05:34:25 | How to Enumerate NFS?
    05:40:58 | How to Enumerate DNS?
    05:42:56 | Brief about Vulnerability Assessment
    05:53:50 | How to test for Vulnerabilities and Keep yourself safe?
    06:14:38 | What is System Hacking?
    06:19:57 | How to Escalate Privilege's in linux and Windows
    06:29:14 | What is Steganography and How it works?
    06:35:09 | How to clear logs from Windows & Linux machine?
    06:38:56 | What is Malware, Trojan & worms. (Detect malware)
    06:50:53 | How to create Payloads basic to advance?
    07:13:34 | What is Sniffing?
    07:27:12 | How to MAC Spoofing and Flooding?
    07:35:00 | Hacking DHCP and MITM
    07:44:51 | The Power of Social Engineering
    07:51:04 | Tools Used in Social Engineering
    08:00:00 | The Power of DoS/DDoS Attack
    08:10:02 | Performing DoS and DDoS Attack
    08:13:36 | What is Session Hijacking?
    08:23:06 | Performing Session Hijacking
    08:30:35 | Web Servers VS Applications
    08:39:13 | Vulnerability Scanning with Acunetix
    08:43:24 | Introduction to Hacking Wireless Networks
    08:51:54 | Hacking Wireless Networks
    09:05:22 | How Secure Mobile Platform is?
    09:15:56 | Calls, SMS, Email Bombing
    09:23:58 | How to Generate a good Payload
    09:33:04 | Keylogger applications for Android
    09:37:07 | Info Gathering from G-Account.
    09:43:52 | What is Cryptography

  • @nbita4961
    @nbita4961 Год назад +12

    I'm CEH certified from EC. I strongly recommend beginners to watch this course. This is the best course for startup. Gr8 work :)

    • @sunshineee1234
      @sunshineee1234 Год назад

      Heyy!! I'm looking forward to do bs in ethical hacking. So do you recommend me this field like is there any scope in this field?

    • @antorsaha4771
      @antorsaha4771 Год назад

      Ok

    • @iamhusain1994
      @iamhusain1994 3 месяца назад

      ​@@sunshineee1234nfsu

  • @arRoman-bb9ht
    @arRoman-bb9ht 8 месяцев назад +1

    take love from Bangladesh 🇧🇩🇧🇩🇧🇩🇧🇩🇮🇳🇮🇳

  • @Xhilabh
    @Xhilabh 5 месяцев назад +3

    Kon kon 2024 me dekh raha hai😂

  • @Bahktioffical
    @Bahktioffical 2 года назад +69

    41:54 LOVED IT!

  • @ALEXANDER147.
    @ALEXANDER147. 6 месяцев назад +2

    I am much more motivated from your video Dedi I like it may Allah pak gives u much more sucess in your whole life ❤🎉

  • @Indianarmy0085
    @Indianarmy0085 5 месяцев назад +4

    Bihar wale like karo ❤

  • @umerdraz4309
    @umerdraz4309 Год назад +5

    Respect teacher from Pakistan

    • @AliHaider-zh5pr
      @AliHaider-zh5pr Год назад

      Can we hack account after this course
      Plz tell 🥺

  • @Nizar-k-facts
    @Nizar-k-facts 3 года назад +35

    Thank you so much sir I appreaciate your work

  • @alooff
    @alooff Год назад +2

    Congratulations now there are 19M more hackers🎉

  • @AnkitKumar-om9be
    @AnkitKumar-om9be 4 месяца назад +4

    Who watch after 12th board exam

  • @Vippraveenshorts
    @Vippraveenshorts Год назад +12

    To much knowledge ✨
    I gained today
    Thank you sir🙇‍♂️

  • @indiancybersoldiers
    @indiancybersoldiers 2 года назад +20

    And thanks bro for creating this video🥰🥰

  • @neil708
    @neil708 Год назад +3

    Congratulations 20M log Hacker ban gaye😂😂😂

  • @user-yy4bt3ek5x
    @user-yy4bt3ek5x Год назад +2

    You are teaching nice sir agree or not boys🚭👩‍💻🤟

  • @codelearning3252
    @codelearning3252 2 года назад +5

    this video is amazing

  • @hiphopayushrock5155
    @hiphopayushrock5155 2 года назад +25

    Legend are those who ran away seeing the video length 😂😂😂😂😂😂😂😂

  • @user-ev3xq4we9r
    @user-ev3xq4we9r 7 месяцев назад +4

    Bro before studying Cyber security what are the basic things we want to know about it like programming or other. I am beginner student i want to start my carrer with cyber security but i have no idea about it.Bro can you explain it or can you make a video with this topic for beginner student

    • @ShortyRiddles2915
      @ShortyRiddles2915 5 месяцев назад

      BRO YOU SHOULD AT LEST LEARN TO USE LINUX AND ALSO LEARN THE BASICS OF PYTHON

  • @Sonusingh34578
    @Sonusingh34578 Год назад +3

    Thank you so much sir for giving me way of ethical hacking ❤❤❤

    • @DjAryanJoshi
      @DjAryanJoshi 11 месяцев назад

      Isse hacking to sikh sakte hai na

  • @NikithsK
    @NikithsK 2 года назад +39

    👍 sir every single minute is worth to watch this video you have done great job for students . understanding the cyber security 👍👍🙏

  • @designerSco
    @designerSco 8 месяцев назад +1

    Only best channel bro, 0-100% knowledge and upskill

  • @CASTY_LOFI
    @CASTY_LOFI 6 месяцев назад +2

    Tommorow is my board exam and still I watching this

  • @sampadarijal5256
    @sampadarijal5256 2 года назад +4

    tomorrow is my math exam 🤣 I don't no anything and. I am here now 😀 enjoying this

  • @infratechz9366
    @infratechz9366 2 года назад +6

    Amazing course for beginners level who want to start Ethical career because this video provide me lots of informationm ...!

  • @user-ej2vk8mr6y
    @user-ej2vk8mr6y 4 месяца назад +1

    day 1 of learning ethical hacking

  • @Islamichain
    @Islamichain 3 месяца назад +2

    Today my English Paper 😅

  • @djsidharth2404
    @djsidharth2404 2 года назад +32

    When u support someone from start and than u see him on this stage. Really feeling proud of u bro ... 😊😊❤❤💕💕...

    • @mohitmaurya9192
      @mohitmaurya9192 2 года назад +1

      and you are watching him first time😅😅😅

    • @kajukatli6
      @kajukatli6 Год назад

      @@mohitmaurya9192 🤣🤣🤣😅

  • @cleanmessengers
    @cleanmessengers Год назад +7

    Kisi ne puri video dekhi hai

  • @MunnaYadav-xh1bs
    @MunnaYadav-xh1bs 10 месяцев назад +1

    Ham is video ko 7 lakh view par Deka tha aaj iska view 2 crore hai thanks

  • @me2me242
    @me2me242 2 месяца назад +1

    is this worth watching as a total beginner?

  • @kamrulalam633
    @kamrulalam633 2 года назад +12

    Learning from you. Really great way of teaching...

    • @Kami_26
      @Kami_26 Год назад

      our name is somewhat similar.

  • @bhuneshsen623
    @bhuneshsen623 Год назад +1

    Any one who complete 9 hour lecture?? 🥺

  • @psfiveclips
    @psfiveclips Год назад +2

    Ethical hacking is hacking ur own system n knowing what u already know

  • @lonelynights_888
    @lonelynights_888 3 года назад +20

    Thank You So Much Sir. Please help Everyone 🙏 in Technically Way. INDIA 🇮🇳

  • @sudosu4071
    @sudosu4071 2 года назад +16

    THANKU TO ALL TEACHERS !!!! 🥺🥺🥺🥺 because they taught us premium courses for free and i watched all of the videos and now I am considering as a master in IT THANKU TO ALL!! 🥺🥺🥺🥺🥺🥺🥺🥺🥺🥺🥰

    • @protech10m71
      @protech10m71 2 года назад

      Hello bhai

    • @protech10m71
      @protech10m71 2 года назад

      Kia hmm teamate kr skte hai hacking me

    • @Chesswalk570
      @Chesswalk570 2 года назад

      Bahi Kaya apney hacking Sikh liya

    • @sudosu4071
      @sudosu4071 2 года назад

      @@protech10m71 ok but what?

    • @sudosu4071
      @sudosu4071 2 года назад

      @@Chesswalk570 yes bro i learnt full hacking course