Пікірлер
@Tactical_Ara
@Tactical_Ara 10 күн бұрын
In going to buy your md collection but is the full course going to be in that collection? And i assume its not complete yet right?
@Lsecqt
@Lsecqt 9 күн бұрын
Yes if you aim for the course, take a little bit patience since its in development phase
@Tactical_Ara
@Tactical_Ara 8 күн бұрын
@Lsecqt yes im waiting i found one collection of 30 with 17 video i will buy it later as now working on some other certificates
@Lsecqt
@Lsecqt 8 күн бұрын
@@Tactical_Ara Good luck my man
@Tactical_Ara
@Tactical_Ara 7 күн бұрын
@@Lsecqt thanks i bought the collection anyway
@LEKIPE1
@LEKIPE1 12 күн бұрын
Does someone know how to automatically run a powershell command on Havoc once the PC is infected?
@Lsecqt
@Lsecqt 12 күн бұрын
A lot of ways but havoc do not support powershell you need to use powershell to stage the download and execution phase
@nOneimportant11192a
@nOneimportant11192a 19 күн бұрын
Awesome as always!
@thanatosdeathgod
@thanatosdeathgod 20 күн бұрын
Raghhh keep it up!
@abyssal7653
@abyssal7653 22 күн бұрын
Great vid man, more about infra would be really cool, not much about it out there on YT imo.
@franks.9338
@franks.9338 22 күн бұрын
hi... whats that for an application? which can be seen on the intro and so on?
@Lsecqt
@Lsecqt 20 күн бұрын
Obisidan with custom theme and settings.
@franks.9338
@franks.9338 20 күн бұрын
@ thx! Nice! I know obsidian but looks different on my system.
@richardghani5458
@richardghani5458 22 күн бұрын
Is sharp redirector also for your patreons? hopefully a lot of us can support your work in the future.
@richardghani5458
@richardghani5458 22 күн бұрын
it is a very useful development for real life pentest as a lot of devices in an internal network are set to avoid outbound traffic. With sharpredirector, so far as there is a pc in the network that allows outbound traffic, we can set it as our host redirector. hopefully it remains stealth even without packer before it goes bust. Is it open source?
@Lsecqt
@Lsecqt 22 күн бұрын
As I told in the video, it is open source, check my GitHub
@Theancientworlds.
@Theancientworlds. 22 күн бұрын
I will like to get a video on redirects
@hadzah_fr
@hadzah_fr 22 күн бұрын
Im not really good to setup infrastructure with pfsense, if you can do a video like "How to setup quick lab" (just to POC pfsense or smthing like that) that can be really cool, by practicing a lot of hackthebox and vulnlab machine, we can easily forgot some basics knowledge !
@proxynet6520
@proxynet6520 22 күн бұрын
More videos like this
@MateusSilveira-m1y
@MateusSilveira-m1y 23 күн бұрын
hey one year later ive this has been more than juz detected but you can work around it with some C coding :> thx for the video !
@Fnugg0
@Fnugg0 12 күн бұрын
How? I have tried everything, such as using multiple encoders on top of each other in msfvenom. I have tried different payloads and used TheFatRat with options like backdoor-factory, FUDWin, avoid, etc. Lastly, I tried using the Python Meterpreter compiled with py2exe, which has been the most undetected so far, with only 4 out of 71 vendors flagging it. I'd really appreciate the help.
@bya-s9w
@bya-s9w 25 күн бұрын
Beast
@thanatosdeathgod
@thanatosdeathgod Ай бұрын
Beast!
@thefunnychannel6640
@thefunnychannel6640 Ай бұрын
But microsoft will patch this if is too public😢. Same thing happened to PyCrypter of machine1337
@Nitin-xf4by
@Nitin-xf4by Ай бұрын
Amazing video
@SolitaryElite
@SolitaryElite Ай бұрын
great vid man
@Kingdd1os
@Kingdd1os Ай бұрын
Absolutly amazing ❤
@johnymnemonick2559
@johnymnemonick2559 Ай бұрын
Nice stuff
@Tactical_Ara
@Tactical_Ara Ай бұрын
Thanks , although im more interested in md but would like to see advanced real life nmap
@muhammadraad6354
@muhammadraad6354 Ай бұрын
Display of great quality but the code should be zoomed in all of your future videos
@Lsecqt
@Lsecqt Ай бұрын
Appreciate your feedback
@richardghani5458
@richardghani5458 Ай бұрын
Nice video, I like your obsidian illustrations ❤️💥
@Lsecqt
@Lsecqt Ай бұрын
Thanks, these are from draw.io but still the idea is important.
@HackRonin
@HackRonin Ай бұрын
Keep going man, I appreciate high quality content!😊
@angkanchanda1801
@angkanchanda1801 Ай бұрын
Oh yeah gonna looveeeeee itt
@ytg6663
@ytg6663 Ай бұрын
Sir your content is really great. But i can not patreon using paypal.. other way ???
@richardghani5458
@richardghani5458 Ай бұрын
So sql server and dc both use static IPs, beebox is dynamic and pfsense is dynamic but since the server is static it will always assign it same ip address. Internal IPs have been configured within pfsense with corresponding device MAC addresses and then a custom bridged network has been created to route traffic for and from any of the internal hosts through pfsense there by using pfsense public ip to interface with other hosts on the network.
@Lsecqt
@Lsecqt Ай бұрын
pfsense is also static and it has 2 adapters. Wan is bridged vm adapter and lan is internal network 172.16.16.0/24. Then you allow outbound traffic and each machine from 172.16.16.0/24 can access anything the bridged network can.
@richardghani5458
@richardghani5458 Ай бұрын
@ thank got it
@richardghani5458
@richardghani5458 Ай бұрын
One of the best videos so far. Just bought a new hp z640 workstation and I’m about to setup my hacking lab
@palevelmode
@palevelmode Ай бұрын
can you make a red team infra course?
@Lsecqt
@Lsecqt Ай бұрын
Yes, after I finish the maldev one
@palevelmode
@palevelmode Ай бұрын
@@Lsecqt that will be great, I can pay for a decent end to end red team infra training but the scarcity of it.
@tanveeraalam3271
@tanveeraalam3271 Ай бұрын
I wanted this
@Tactical_Ara
@Tactical_Ara Ай бұрын
Keep going please , waiting for the full course
@richardghani5458
@richardghani5458 Ай бұрын
Nice thumbnail
@ytg6663
@ytg6663 Ай бұрын
Hi sir, how can i subscribe to your creative red teaming private videos and methodology? Can you teach how an APT approach to website or web app exploitation please
@Lsecqt
@Lsecqt Ай бұрын
Hello, of course you can subscribe. Prepare your video ideas and share them there.
@MdSubhan-ku4gj
@MdSubhan-ku4gj 2 ай бұрын
i did this 2 days ago and found you uploaded the same tutorial Haha xD
@RemainZStudio
@RemainZStudio 2 ай бұрын
All SCCM accounts are monitored by AAD and Identity management which run " Behavior AI " if you going to use it to do this type of hacking it will detect the user is doing something it is not suppose to and will lock the account for MFA release, cool clip tho, if you want to know more about why we do it reach out to me, ill give you a enviroment you can run test in... HEAVY SECURITY policy's we use for red teaming
@AhmedDridi-fz4sw
@AhmedDridi-fz4sw 2 ай бұрын
Bro ,can you help me in reverse engineering for exe file , i lost the installer and the program from 2000 , it's difficult because he ask password in some dll file , i think he look for password in same path , if he didn't find this path he exit without any message
@Lsecqt
@Lsecqt 2 ай бұрын
Sorry man I am bad at reversing
@AhmedDridi-fz4sw
@AhmedDridi-fz4sw 2 ай бұрын
@Lsecqt Thank you anyway 🥰❤️
@detective5253
@detective5253 2 ай бұрын
learned something new today, thanks 4 this video!
@richardghani5458
@richardghani5458 2 ай бұрын
What remote client do you use to connect your server running the vms please?
@Lsecqt
@Lsecqt 2 ай бұрын
Yep I have a server with VMs and I use rdp most of the time
@calldrive9456
@calldrive9456 2 ай бұрын
Great video.
@SolitaryElite
@SolitaryElite 2 ай бұрын
great tutorial:)
@kristiyanbaltov2966
@kristiyanbaltov2966 2 ай бұрын
Goood 👍
@aminhasni-o7x
@aminhasni-o7x 2 ай бұрын
you are the best broo ❤❤❤❤
@Tactical_Ara
@Tactical_Ara 2 ай бұрын
Damn i was working missed that
@thefunnychannel6640
@thefunnychannel6640 2 ай бұрын
how to do it without cmd pop up beacuse i dont want other party to see it
@Lsecqt
@Lsecqt 2 ай бұрын
You can use the ShowWindow() API as demonstrated here: github.com/lsecqt/OffensiveCpp/blob/main/Shellcode%20Execution/FileMap/directPointerToFileMap.cpp
@harryuzezi3995
@harryuzezi3995 2 ай бұрын
you dont have these videos available in your paetron
@Lsecqt
@Lsecqt 2 ай бұрын
They are here, they are publicly available, why do they need to also be there?
@calldrive9456
@calldrive9456 2 ай бұрын
Very use full session.
@tingootango4927
@tingootango4927 2 ай бұрын
Huge respect for sticking with it. Coming to terms with that skill being the most important in this field! Just keep trying.