動画検索
関連広告
検索結果
Introduction/whoami
Effective Notekeeping
Networking Refresher: Introduction
MAC Addresses
Common Ports & Protocols
Subnetting, Part 1
Installing VMWare / VirtualBox
Configuring VirtualBox
Sudo Overview
Users & Privileges
Viewing, Creating, & Editing Files
Installing and Updating Tools
Intro to Python
Math
Functions
Conditional Statements
Tuples
Advanced Strings
Importing Modules
Building a Port Scanner
Reading and Writing Files
Building a Shoe Budget Tool
Passive Recon Overview
Discovering Email Addresses
End Part 1
Introduction/whoami
Important Tools
MAC Addresses
The OSI Model
Installing Kali Linux
Navigating the File System
Network Commands Update
Viewing, Creating, & Editing Files
Strings
Functions
Lists
Importing Modules
Sockets
Passive Recon Overview
Breached Credentials Part 1
Identifying Website Technologies
Utilizing Social Media
Enumerating HTTP/HTTPS Part 1
Enumerating SSH
Scanning w/ Nessus Part 1
Gaining Root w/ Metasploit
Credential Stuffing & Password Spraying
Setting up Blue
Academy Walkthrough
Conclusion
Introduction
Hunting Subdomains Part 1
Identifying Website Technologies
Google Fu
Installing Kioptrix
Scanning w/ Nmap
Enumerating HTTP/HTTPS Part 2
Enumerating SSH
Our Notes So Far
Scanning w/ Nessus Part 1
Reverse Shells vs Bind Shells
Gaining Root w/ Metasploit
Brute Force Attacks
Credential Stuffing & Password Spraying
Downloading Our Materials
Spiking
Finding the Offset
Overwriting the EIP
Finding the Right Module
Python3 and More
Setting up Blue
Blue Walkthrough
Academy Walkthrough
Butler Walkthrough
Conclusion
Coming up
Linux Basics For Hackers book // OTW books
Understanding EternalBlue
The story of EternalBlue
How exploits are created legally
White hat vs black hat
The story of EternalBlue continued
How ransomware works
How ransomware gets into a system // Social engineering
The Marcus Hutchins story
EternalBlue demo
The origins of the name "EternalBlue"
EternalBlue demo continued // EternalBlue using Metasploit
Contractors working for spy agencies // The Edward Snowden story
How Avast is selling user data
EternalBlue demo continued
How Mimikatz works // Using Mimikatz to get passwords
EternalBlue shown in Wireshark
Exploits cause billions in damage // Governments developing malware
Shadow Brokers and EternalBlue
EthernalBlue in Wireshark continued
EternalBlue Python script
Learning from the past
Conclusion