Heath, thank you for sticking through the tough times to continue leading this industry by example. You know this but you make a huge impact on thousands of lives. You have a wonderful team too.
Omg, Kamran Bilgrami was my professor last semester in college, he said he has a Medium page and does technical write-ups but I never got the chance to check it out. Big shout out to my professor and to you too.
These are the best vids with the best voice that doesn't put u to sleep the cmd hashcat blew my mind didn't no cmd was so handy still thank you for the vid
Thanks for everything you do for the community. Can't wait to finish the PEH course, been sidetracked by other commitments, but this helps motivate me to get back into it.
Hey! New fan here.... Just wanted to drop a line expressing my gratitude for your hard work in keeping us all on top of our games. Thank you! Thank you...... May The Lord keep blessing you and your family! 🙏
A little tip for setting up windows 10 machines (for workstation only): Once you are done with the first one, right click on the windows 10 tab then: VM -> Manage -> Clone. Make sure that you do this before setting up users, and domain settings. Happy hacking! o7
Great stuff. I am learning a lot. 2:16:47 SMB Relay. Do you have to trick the one machine user to go to a share on your machine? Is this just using a broadcast capture similar to LLMNR you showed earlier?
You don’t have to trick the user. In the video he pointed to his own machine IP but in general if a user mistypes while connecting to a different share, it’ll capture and point it to attackers machine
@@kaiadkins Might be. But trust me it’s way more common. What we basically do is. We run a tmux session and there we start responder and leave it. Sometimes it takes a lot of time. But sometimes it doesn’t take more than a day
The only bad thing about PNPT and the others certs here is the financial side. The price is super affordable but still got no payment plan or financial arrangement whatsoever. Not everyone has the money ready to go. But a short monthly plan. 3 to 6 months would bring me in
You have so much important content, it is discouraging for an absolute beginner because they do not know where to start and how to measure their progress and most important how they can match their current progress with real life demands in the security industry. I am sure it will take a full video just to help put followers on a study/progress path, overall your videos are ablolute bangers 100% tumbs up
Hey one tip from me is . i am currently running on 8 gb of total system ram with i3 5005 cpu. its really old but the way i set up is i installed backbox and as it is ubuntu with hacking tools i just do a distro upgrade and then now i have given 1.5gib to 2 windows respectivels and 2 gib to windows server having a ubuntu with hacking tools . NOT ALL TOOLS BUT it will be fine for low end users>>. one more thing is download a 32 bit of windows 10 as they are low>
I just tried to run responder with the flag “-rdwv” but it gives the error “no such option: -r” I checked the help page and apparently the -r option doesn’t exist anymore?
I am having difficulties in getting the Firefox esr to run on my kali 32bit on virtual box . Wonder if you happen to encounter the same from other people
Got stuck installing Kali linux . I am on macbook air m1 chip . i downloaded the virtual box software . and i dont know what exactly we are to do with 7z
For some reason I get an error when trying to join the workstations to the domain "That domain could not be found" I followed the video exactly. I also ensured on the server that DNS was running and could be reached. Any thoughts?
I had the same issue, turns out for all machines Windows Defender has to be manually disabled and IPv6 turned off in Network properties. I found YT video that actually helped me after 8 hours of trying to solve this -> Made by Kindson The Tech Pro "How to Setup Active Directory Domain With VirtualBox and Join Computers - 2020". I hope that helps!
Hi TCM , currently I'm doing PEH , but I have one doubt from where I need to start to get into cloud security. Like product based or multi cloud . Can u give me a suggestion
Great video! From a Pentester perspective, what are the requirements to ask to a client in order to do an effective Active Directory pentest? Thank you
Hello Heath, Thank you for this video. Question, what is the difference between joining in your Attack AD Defend from PEH training? I can see almost the same topics?
A good chunk of the material can be found in the AD sections of the Practical Ethical Hacking course, which is part of our Academy. There are a few topics we'll be covering that aren't covered there, but the big benefit of the live class would be for those that prefer to learn in a classroom setting, would prefer not setting up their own labs, prefer direct instructor interaction, etc. So it just depends on your learning style.
@@TCMSecurityAcademy Thank you Heath, I love what you do for the community and helping me in my career. Almost taking all your training in TCM academy. Hoping for more training in the future. More power to you and your team!
Hi Heath, Thanks for This video, i have a installed windows 10 and made it as Marvel/thePunisher and also have windows 7 installed in my vmware wondering if i can make my windows 7 machine to join as a Spiderman 2nd machine or do i have to make a windows 10 clone in order for everything to be working smoothly.
Hi there, i am curiouse how you are running the Oracle VirtualBox on M1 MacBook, is it already available in a live stable version. Last time i tryed to manage VMs with VBox it was in beta version and not really usable.
hi, my ipv6 attack is not working it says connection reset by peer. and is the authentication of the punisher was done because we provided the credentials or it captured the credentials and did the authentication in the ipv6 attack.?
@@avichiii I think the problem was due to the sudden closing of vm . I have 16 gb of ram and i was running 4 vm kali 4gb, windows server 2gb and 2 windows 10 with 2gb each and windows as the base operating system. I think due to lack of ram not all 4 stays one suddenly shuts down after some time. SO, that was interrupting I think. But if you have something I'd be happy to listen, problems arise everytime so, your solution may be helpful next time. Thank You.
@@ienabellamy Thank you for your answer. Then I have to check what I'm doing wrong. Somehow my mitm6 script doesn't spoof any request. So literally nothing happens.
When will You make malware development course so we can be as real as possible when it comes to testing real enviroment? Meterpreter is triggering AV and in real scenario You wouldn't get shell with simple meterpreter payload if AV was running. We (at least I 🙂) want to learn the part where we are crypting our payload but we can't do that without specific pre-knowledge, and we don't know how to get there. I hope You will at least read my comment.
Heath, thank you for sticking through the tough times to continue leading this industry by example. You know this but you make a huge impact on thousands of lives. You have a wonderful team too.
finally finished the course, learned a lot.
Omg, Kamran Bilgrami was my professor last semester in college, he said he has a Medium page and does technical write-ups but I never got the chance to check it out. Big shout out to my professor and to you too.
For anyone stuck at 1:23:50, Windows Defender Antivirus has been renamed Microsoft Defender Antivirus in Server 2022.
nice one
lol i was confused for a second, then i realised i'm still using server 2019
Thanks alot, it save my time
THAKS FOR INFO
These are the best vids with the best voice that doesn't put u to sleep the cmd hashcat blew my mind didn't no cmd was so handy still thank you for the vid
Thanks for everything you do for the community. Can't wait to finish the PEH course, been sidetracked by other commitments, but this helps motivate me to get back into it.
Hey!
New fan here....
Just wanted to drop a line expressing my gratitude for your hard work in keeping us all on top of our games.
Thank you!
Thank you......
May The Lord keep blessing you and your family! 🙏
Thank you sifu 🙏 This is exactly what I'm getting into at the moment. Synchronicity or what 🤯
I’m joining the courses then moving to get started with certs thank you for all the work you put into this
On a serious note, thanks for sharing and thanks for everything you do for the community 🎉🎉
TCM you're the best! You forever have my respect. And thank you for your service, Heath!
As always the greatest content ever
My advise to students
Love and cherish every second of this lecture it some ones life's work
Thank you for the awesome pentest series.
15 mins in and already amazing
A little tip for setting up windows 10 machines (for workstation only): Once you are done with the first one, right click on the windows 10 tab then: VM -> Manage -> Clone. Make sure that you do this before setting up users, and domain settings. Happy hacking! o7
shared with my co-workers (work for a managed security company). one of my co-workers with working towards PJPT, so this will be helpful
Great video!
Amazing course for sure!!
Amazing video, I learned a lot. Thanks!
Thank you TCM
Thanks for making this course available! I’ll definitely check out your courses in the website.
Thank you ❤❤❤❤
Thank you for this great video.
Thank u for share this, i have no money sign up at tcm, so i enjoy watch on youtube
Thank You! This helps a lot with getting data! 😊
thanks tcm for this valuable free content
TCM you are awesome a gift to rising pentesters............. GODSPEED..
Working out Heath? Looking fitter! Hahaha Thanks for the great content as always!
I love it 🥰
Great stuff. I am learning a lot. 2:16:47 SMB Relay. Do you have to trick the one machine user to go to a share on your machine? Is this just using a broadcast capture similar to LLMNR you showed earlier?
Same question here, did you get it solved?
I did not manage to reproduce what he did, is it the same for you ?
You don’t have to trick the user. In the video he pointed to his own machine IP but in general if a user mistypes while connecting to a different share, it’ll capture and point it to attackers machine
@@the_sandman00there’s got to be some other methods I feel like the chances of a user pointing to an incorrect UNC path is slim to none
@@kaiadkins Might be. But trust me it’s way more common. What we basically do is. We run a tmux session and there we start responder and leave it. Sometimes it takes a lot of time. But sometimes it doesn’t take more than a day
2:13:16 Do I have to disable the firewall in my "Punisher" windows so I can get the nmap results (It is showing filtered ports) ?
Last video before bed 😊
Wow amazing thank you
The only bad thing about PNPT and the others certs here is the financial side. The price is super affordable but still got no payment plan or financial arrangement whatsoever. Not everyone has the money ready to go. But a short monthly plan. 3 to 6 months would bring me in
True bro
I am just waiting for this tutorials Thanks a lot...
Thanx so much for publishing this material. I would love to connect.
I am not able to get hashes captured by responder. It only shows that poisoned answer sent to the ip address.
Thank you for your kind share
2:42:39 would it be the same if we use ip address for a normal user, or should we use the domain controller ip?
Thanks amazing course
You have so much important content, it is discouraging for an absolute beginner because they do not know where to start and how to measure their progress and most important how they can match their current progress with real life demands in the security industry. I am sure it will take a full video just to help put followers on a study/progress path, overall your videos are ablolute bangers 100% tumbs up
Hey one tip from me is . i am currently running on 8 gb of total system ram with i3 5005 cpu. its really old but the way i set up is i installed backbox and as it is ubuntu with hacking tools i just do a distro upgrade and then now i have given 1.5gib to 2 windows respectivels and 2 gib to windows server having a ubuntu with hacking tools . NOT ALL TOOLS BUT it will be fine for low end users>>. one more thing is download a 32 bit of windows 10 as they are low>
Thank you so much TCM Sec.
Good review for the PJPT!
just made a active directory lab in virtualbox too
Muchas gracias!
Большое спасибо !
thank you
This came in at the right time
My ntlmrelayx doesn't work. Do u know if the problem is about my version of python (3.11) ?
Are there any CPU requirements for this many VMs?
Unbelieveable ❤️
Thanks Dear
I just tried to run responder with the flag “-rdwv” but it gives the error “no such option: -r”
I checked the help page and apparently the -r option doesn’t exist anymore?
yes -r is not used in the updated versions, you need to exclude r, just go with -dwv
I am having difficulties in getting the Firefox esr to run on my kali 32bit on virtual box . Wonder if you happen to encounter the same from other people
Does the new course cover azure ?
Thanks you sir, much appreciated.
Awesome course. Thanks!!
getting error when downloading PMK darklab is allegedly infected.. researched and they are supposed to be updating to remove it
i cant see the computers in my network tab why is that even after enabling network sharing
Does anyone know if this video helps getting passed the wall you hit in the pjpt?
Can i Follow trough the course if I go with windows 11 Enterprise
New virtual machine and open new window in file menu is disabled in vmware workstation 17, any suggestions,?
At 02:44:00 when I run ntlmrelayx I get the error saying Errorno 104 connection reset by peer can someone help me resolve it pls
were you able to sort the issue? I have a similar problem
@@UserMS101 yes I was able to sort it
@@josephalan31how?
Got stuck installing Kali linux . I am on macbook air m1 chip . i downloaded the virtual box software . and i dont know what exactly we are to do with 7z
ruclips.net/video/U09soewiu18/видео.html
Windows server&Enterprise on ARM?
Hi it seems that I have some difficulties in running Virtual Box on MacBook for 64 bits just wonder if anyone has encountered the same situation
hey i cant download workstation. it shows me error over and over again.
1:49:04 why the hashes are different?
wondering about the same thing, did you find out why?
@@somebody3014not yet actually
For some reason I get an error when trying to join the workstations to the domain "That domain could not be found" I followed the video exactly. I also ensured on the server that DNS was running and could be reached. Any thoughts?
having the same issue here. I also noticed that my ipv4 address is the same for all 3 of my machines....
@@Eric-ey7rm if you use virtualbox change the NAT to the NATnetwork,your ip's will be different(I wrote it because,if anybody will face this problem)
I had the same issue, turns out for all machines Windows Defender has to be manually disabled and IPv6 turned off in Network properties. I found YT video that actually helped me after 8 hours of trying to solve this -> Made by Kindson The Tech Pro "How to Setup Active Directory Domain With VirtualBox and Join Computers - 2020". I hope that helps!
Thanks for this great course please make one advance active DIRECTORY hacking ❤❤❤❤
Hi. I couldn't join the Domain of one vm to the local administrator. Can anyone help or guide me?
I have the same issue, trying to research that. If I find anything I will let you know.
thank you 👍👋👋
Hi TCM , currently I'm doing PEH , but I have one doubt from where I need to start to get into cloud security. Like product based or multi cloud . Can u give me a suggestion
Heath Adams aka the beyonder
does anyone have problem like mine, error while powering on: this host does not support intel vt-x. what should i do?
I guess turn on hypervisor...did you try BIOS..
Big fan
Great video! From a Pentester perspective, what are the requirements to ask to a client in order to do an effective Active Directory pentest? Thank you
Awesome! Thank youuuuu
Could I detonate ransomware on this lab?
Hello Heath, Thank you for this video. Question, what is the difference between joining in your Attack AD Defend from PEH training? I can see almost the same topics?
A good chunk of the material can be found in the AD sections of the Practical Ethical Hacking course, which is part of our Academy.
There are a few topics we'll be covering that aren't covered there, but the big benefit of the live class would be for those that prefer to learn in a classroom setting, would prefer not setting up their own labs, prefer direct instructor interaction, etc. So it just depends on your learning style.
@@TCMSecurityAcademy Thank you Heath, I love what you do for the community and helping me in my career. Almost taking all your training in TCM academy. Hoping for more training in the future. More power to you and your team!
@@TCMSecurityAcademysir I would like to know how to have access to your academy for paid course if there are any
Pls, I love your course on RUclips but I cant subscribe for the paid material. I'm in Nigeria
windows hacking world is big, like the cloud stuff
For beginners… das me!
1:25:00
welp, I had nothing better to do this weekend
What brand of glasses do you wear?
hey i have a question. what if your vm machine runs slow? is there an alterntive? also kali linux is false postive for me
Hi Heath, Thanks for This video, i have a installed windows 10 and made it as Marvel/thePunisher and also have windows 7 installed in my vmware wondering if i can make my windows 7 machine to join as a Spiderman 2nd machine or do i have to make a windows 10 clone in order for everything to be working smoothly.
4:07:35
Is there any student discount on All access membership?
thank you is verry cool
Hi there, i am curiouse how you are running the Oracle VirtualBox on M1 MacBook, is it already available in a live stable version. Last time i tryed to manage VMs with VBox it was in beta version and not really usable.
yes sir
hi, my ipv6 attack is not working it says connection reset by peer. and is the authentication of the punisher was done because we provided the credentials or it captured the credentials and did the authentication in the ipv6 attack.?
is your problem solved, if not i can help!
@@avichiii I think the problem was due to the sudden closing of vm . I have 16 gb of ram and i was running 4 vm kali 4gb, windows server 2gb and 2 windows 10 with 2gb each and windows as the base operating system. I think due to lack of ram not all 4 stays one suddenly shuts down after some time. SO, that was interrupting I think.
But if you have something I'd be happy to listen, problems arise everytime so, your solution may be helpful next time. Thank You.
@@avichiii I think I need your help. Can you help me out? Its really not working the ipv6 attack.
@@johnbeal6592 ya sure, tell me!
Did you manage to solve this ? I'm encountering the same problem.
I see that the current version of VirtualBox does not support Mac OS. Any alternatives?
vmware workstation player
Someone here tried the MITM6 attack using Windows Server 2022 and workstation Windows 11?
yes, it works. I tried win server 2019 and 2022 with windows 11 arm machines, worked flawlessy.
@@ienabellamy Thank you for your answer. Then I have to check what I'm doing wrong. Somehow my mitm6 script doesn't spoof any request. So literally nothing happens.
Woow dude!
First? 😅
When will You make malware development course so we can be as real as possible when it comes to testing real enviroment? Meterpreter is triggering AV and in real scenario You wouldn't get shell with simple meterpreter payload if AV was running. We (at least I 🙂) want to learn the part where we are crypting our payload but we can't do that without specific pre-knowledge, and we don't know how to get there. I hope You will at least read my comment.