![HackerSploit](/img/default-banner.jpg)
- Видео 469
- Просмотров 40 858 144
HackerSploit
Кения
Добавлен 2 ноя 2015
HackerSploit is the leading provider of free Infosec and cybersecurity training. Our goal is to make cybersecurity training more effective and accessible to students and professionals. We achieve this by providing essential training on how to attack and defend systems with virtual labs and real-world scenarios. We offer individual and corporate training packages in Penetration Testing & Red Team Operations, Web application penetration testing, and cybersecurity awareness training.
Introduction To Red Teaming
Hey guys, HackerSploit here back again with another video. This video will introduce you to red teaming, and explain its origins and adoption in offensive cybersecurity. You will also learn about the key differences between Red Teaming and Penetration Testing. You will also be introduced to the various roles and responsibilities within a red team, including the red team operator and red team lead. Whether you're a beginner or looking to deepen your knowledge, this video provides a comprehensive overview to get you started on your red teaming journey.
//PLATFORMS
BLOG ►► bit.ly/3qjvSjK
FORUM ►► bit.ly/39r2kcY
ACADEMY ►► bit.ly/39CuORr
//SOCIAL NETWORKS
TWITTER ►► bit.ly/3sNKXfq
DISCORD ►► bit.ly/...
//PLATFORMS
BLOG ►► bit.ly/3qjvSjK
FORUM ►► bit.ly/39r2kcY
ACADEMY ►► bit.ly/39CuORr
//SOCIAL NETWORKS
TWITTER ►► bit.ly/3sNKXfq
DISCORD ►► bit.ly/...
Просмотров: 16 624
Видео
Pentesting Diaries 0x1 - SQL Injection 101
Просмотров 25 тыс.14 дней назад
Hey guys, HackerSploit here back again with another video, Welcome to the all-new pentesting diaries series. Pentesting Diaries is a weekly video series, where I will be exploring various pentesting techniques and tools, with the primary objective of demystifying them to provide you with a deeper, more holistic understanding of how specific attack techniques work, what tools to use and how to c...
HackerSploit Channel Update 2024
Просмотров 16 тыс.Месяц назад
Hey guys, HackerSploit here back again with another video. Just wanted to provide you with an update on where I have been and what the content plan is for the channel. Lots of exciting content ahead, and I look forward to continuing the journey we started. I would also like to thank everyone for their support during my absence and for checking in on me. It is greatly appreciated. //PLATFORMS BL...
3 Year Cybersecurity Career Roadmap
Просмотров 156 тыс.Год назад
In this video, I outline a concise 3-year Cybersecurity career roadmap designed for students or professionals looking to get started with a career in Cybersecurity in 2023 and beyond. Slides: bit.ly/3HlM3aw Black Hills 5-Year InfoSec Plan: www.blackhillsinfosec.com/webcast-5-year-plan-infosec/ //PLATFORMS BLOG ►► bit.ly/3qjvSjK FORUM ►► bit.ly/39r2kcY ACADEMY ►► bit.ly/39CuORr //SOCIAL NETWORKS...
Linux Red Team Defense Evasion Techniques - Hiding Linux Processes
Просмотров 20 тыс.Год назад
In this video, I explore the process of evading defenses on Linux by hiding Linux processes with libprocesshider. Defense Evasion consists of techniques that adversaries use to avoid detection throughout their compromise. Techniques used for defense evasion include uninstalling/disabling security software or obfuscating/encrypting data and scripts. Adversaries also leverage and abuse trusted pr...
Linux Red Team Persistence Techniques - SSH Keys, Web Shells & Cron Jobs
Просмотров 21 тыс.Год назад
In this video, I explore the process of establishing persistence on Linux via SSH keys, local accounts, web shells, and Cron Jobs. Persistence consists of techniques that adversaries use to keep access to systems across restarts, changed credentials, and other interruptions that could cut off their access. Techniques used for persistence include any access, action, or configuration changes that...
ChatGPT For Cybersecurity
Просмотров 468 тыс.Год назад
In this video, I go over the process of how to use ChatGPT and cover various examples of how to use ChatGPT for Cybersecurity. ChatGPT is an AI-driven chatbot launched by OpenAI in November 2022. It is trained using Reinforcement Learning from Human Feedback (RLHF). It is built on top of OpenAI's GPT-3.5 family of large language models and is fine-tuned with both supervised and reinforcement le...
Linux Red Team Privilege Escalation Techniques - Kernel Exploits & SUDO Permissions
Просмотров 30 тыс.Год назад
In this video, I explore the process of elevating privileges on Linux by leveraging kernel exploits, local accounts, and misconfigured SUDO permissions. Privilege Escalation consists of techniques adversaries use to gain higher-level permissions on a system or network. Adversaries can often enter and explore a network with unprivileged access but require elevated permissions to follow through o...
LastPass Data Breach - Password Security 101
Просмотров 44 тыс.Год назад
In this episode of CyberTalk, I discuss the latest LastPass data breach (December 2022) and outline a failsafe password management policy for you, your family, and or your business. The following is a set of password security and management guidelines you should follow: 1. Generate secure, random, and complex passwords. 2. Use a new and unique password for every account. 3. Store your passwords...
Windows Red Team Lateral Movement Techniques - PsExec & RDP
Просмотров 27 тыс.Год назад
In this video, I will be exploring the process of performing lateral movement on Windows by leveraging PsExec and RDP. Lateral Movement consists of techniques that adversaries use to enter and control remote systems on a network. Following through on their primary objective often requires exploring the network to find their target and subsequently gaining access to it. Reaching their objective ...
Windows Red Team Privilege Escalation Techniques - Bypassing UAC & Kernel Exploits
Просмотров 22 тыс.Год назад
In this video, I will be exploring the process of privilege escalation on Windows by leveraging various privilege escalation techniques. Privilege Escalation consists of techniques that adversaries use to gain higher-level permissions on a system or network. Adversaries can often enter and explore a network with unprivileged access but require elevated permissions to follow through on their obj...
Windows Red Team - Dynamic Shellcode Injection & PowerShell Obfuscation
Просмотров 26 тыс.Год назад
In this video, I will be exploring the process of dynamically injecting Shellcode into portable executables and PowerShell obfuscation for the purpose of defense evasion on Windows. Defense Evasion consists of techniques that adversaries use to avoid detection throughout their compromise. Techniques used for defense evasion include uninstalling/disabling security software or obfuscating/encrypt...
Updates & Content Schedule - Q4 2022 - Q2 2023
Просмотров 9 тыс.Год назад
Updates & Content Schedule - Q4 2022 - Q2 2023
How To Write A Penetration Testing Report
Просмотров 60 тыс.Год назад
How To Write A Penetration Testing Report
Performing Web Searches From Your Terminal
Просмотров 36 тыс.2 года назад
Performing Web Searches From Your Terminal
Integrating Suricata With Wazuh For Log Processing
Просмотров 36 тыс.2 года назад
Integrating Suricata With Wazuh For Log Processing
Threat Detection & Active Response With Wazuh
Просмотров 95 тыс.2 года назад
Threat Detection & Active Response With Wazuh
Introduction To Intrusion Detection Systems (IDS)
Просмотров 33 тыс.2 года назад
Introduction To Intrusion Detection Systems (IDS)
Please add the pdf also it helps in refreshing the matter taught
Part 2 link is not working, can you please check..?
Can't wait for the new labs :D
Quick question, what payload are you using? I’m being a bit curious
is it safe to play bandit game on Mac terminal? or we should have it play on virtual machine?
Your discord invite has expired, please I will like to join the discord server
Is there any way to make a simple script like echo hello world run on startup and display its contents on the terminal?
Hackersploit back 🔥🔥❤️
1:02:11 bro what is your terminal theme? Is it public? It looks so good
Alexis, thank you so much for the video.
The hacker man is here
Love it❤
except its now nftables
Passed
Passed
Passed.
Passed.
Passed.
Passed.
Passed.
5:38
can you make the series about assembly x64 and reverse engineering...
Passed.
Passed
How to use cookies
I did the nslookup for pornhub but nothing when I did the nslookup + ip nothing popped up. ? ima move on to the next video I want to learn to use nmap
Can I request any video?
Hyy cyberranges openvpn has serious issues it doesn't connect and with openvpn you cannot to your rev shell fix it
Hacksploit this is 2024, things has changed with new and recent update, can you help us do a revised editions of your videos to help keep us up to date
is there certificate of complition ??
thank you so much! loved the documentation :)
all theoretical lol
hey hackersploit, we are your viewers here back again.
Nice voice
I Think Cyber security is Getting Low Cause Of AI And Other Technologies... What should i Learn ? Please Tell me Alexis Bro 😐
Oh yeah. Now we are talking.
Welcome back 1337 !! Waiting for more videos on the Red Team !
Welcome back bro
Passed.
Passed.
Passed.
Hello future person, yes a legend was born. You're right, the channel has come a long way since posting this video. Indeed, people are still watching in *[insert date here]* Take care and have a lovely day!
is your python course still relevant?
When i log out i cant enter xfce with same username and pswd help
welcome back!
He has returned!
Nice video. Can't wait to watch the next one. Great job!
Thanks for wasting my time. It Bad error tryng your Methode and You wasted my time. Just Read the Bloodhound Artikel from StationX
This will work in local network only
OpenVPN error message: "Unsupported cipher in --data-ciphers: BF-CBC". What can be done to support this deprecated cipher, but also to be able to continue connecting to THM and HTB vpn networks?