In going to buy your md collection but is the full course going to be in that collection? And i assume its not complete yet right?
@Lsecqt9 күн бұрын
Yes if you aim for the course, take a little bit patience since its in development phase
@Tactical_Ara8 күн бұрын
@Lsecqt yes im waiting i found one collection of 30 with 17 video i will buy it later as now working on some other certificates
@Lsecqt8 күн бұрын
@@Tactical_Ara Good luck my man
@Tactical_Ara7 күн бұрын
@@Lsecqt thanks i bought the collection anyway
@LEKIPE112 күн бұрын
Does someone know how to automatically run a powershell command on Havoc once the PC is infected?
@Lsecqt12 күн бұрын
A lot of ways but havoc do not support powershell you need to use powershell to stage the download and execution phase
@nOneimportant11192a19 күн бұрын
Awesome as always!
@thanatosdeathgod20 күн бұрын
Raghhh keep it up!
@abyssal765322 күн бұрын
Great vid man, more about infra would be really cool, not much about it out there on YT imo.
@franks.933822 күн бұрын
hi... whats that for an application? which can be seen on the intro and so on?
@Lsecqt20 күн бұрын
Obisidan with custom theme and settings.
@franks.933820 күн бұрын
@ thx! Nice! I know obsidian but looks different on my system.
@richardghani545822 күн бұрын
Is sharp redirector also for your patreons? hopefully a lot of us can support your work in the future.
@richardghani545822 күн бұрын
it is a very useful development for real life pentest as a lot of devices in an internal network are set to avoid outbound traffic. With sharpredirector, so far as there is a pc in the network that allows outbound traffic, we can set it as our host redirector. hopefully it remains stealth even without packer before it goes bust. Is it open source?
@Lsecqt22 күн бұрын
As I told in the video, it is open source, check my GitHub
@Theancientworlds.22 күн бұрын
I will like to get a video on redirects
@hadzah_fr22 күн бұрын
Im not really good to setup infrastructure with pfsense, if you can do a video like "How to setup quick lab" (just to POC pfsense or smthing like that) that can be really cool, by practicing a lot of hackthebox and vulnlab machine, we can easily forgot some basics knowledge !
@proxynet652022 күн бұрын
More videos like this
@MateusSilveira-m1y23 күн бұрын
hey one year later ive this has been more than juz detected but you can work around it with some C coding :> thx for the video !
@Fnugg012 күн бұрын
How? I have tried everything, such as using multiple encoders on top of each other in msfvenom. I have tried different payloads and used TheFatRat with options like backdoor-factory, FUDWin, avoid, etc. Lastly, I tried using the Python Meterpreter compiled with py2exe, which has been the most undetected so far, with only 4 out of 71 vendors flagging it. I'd really appreciate the help.
@bya-s9w25 күн бұрын
Beast
@thanatosdeathgodАй бұрын
Beast!
@thefunnychannel6640Ай бұрын
But microsoft will patch this if is too public😢. Same thing happened to PyCrypter of machine1337
@Nitin-xf4byАй бұрын
Amazing video
@SolitaryEliteАй бұрын
great vid man
@Kingdd1osАй бұрын
Absolutly amazing ❤
@johnymnemonick2559Ай бұрын
Nice stuff
@Tactical_AraАй бұрын
Thanks , although im more interested in md but would like to see advanced real life nmap
@muhammadraad6354Ай бұрын
Display of great quality but the code should be zoomed in all of your future videos
@LsecqtАй бұрын
Appreciate your feedback
@richardghani5458Ай бұрын
Nice video, I like your obsidian illustrations ❤️💥
@LsecqtАй бұрын
Thanks, these are from draw.io but still the idea is important.
@HackRoninАй бұрын
Keep going man, I appreciate high quality content!😊
@angkanchanda1801Ай бұрын
Oh yeah gonna looveeeeee itt
@ytg6663Ай бұрын
Sir your content is really great. But i can not patreon using paypal.. other way ???
@richardghani5458Ай бұрын
So sql server and dc both use static IPs, beebox is dynamic and pfsense is dynamic but since the server is static it will always assign it same ip address. Internal IPs have been configured within pfsense with corresponding device MAC addresses and then a custom bridged network has been created to route traffic for and from any of the internal hosts through pfsense there by using pfsense public ip to interface with other hosts on the network.
@LsecqtАй бұрын
pfsense is also static and it has 2 adapters. Wan is bridged vm adapter and lan is internal network 172.16.16.0/24. Then you allow outbound traffic and each machine from 172.16.16.0/24 can access anything the bridged network can.
@richardghani5458Ай бұрын
@ thank got it
@richardghani5458Ай бұрын
One of the best videos so far. Just bought a new hp z640 workstation and I’m about to setup my hacking lab
@palevelmodeАй бұрын
can you make a red team infra course?
@LsecqtАй бұрын
Yes, after I finish the maldev one
@palevelmodeАй бұрын
@@Lsecqt that will be great, I can pay for a decent end to end red team infra training but the scarcity of it.
@tanveeraalam3271Ай бұрын
I wanted this
@Tactical_AraАй бұрын
Keep going please , waiting for the full course
@richardghani5458Ай бұрын
Nice thumbnail
@ytg6663Ай бұрын
Hi sir, how can i subscribe to your creative red teaming private videos and methodology? Can you teach how an APT approach to website or web app exploitation please
@LsecqtАй бұрын
Hello, of course you can subscribe. Prepare your video ideas and share them there.
@MdSubhan-ku4gj2 ай бұрын
i did this 2 days ago and found you uploaded the same tutorial Haha xD
@RemainZStudio2 ай бұрын
All SCCM accounts are monitored by AAD and Identity management which run " Behavior AI " if you going to use it to do this type of hacking it will detect the user is doing something it is not suppose to and will lock the account for MFA release, cool clip tho, if you want to know more about why we do it reach out to me, ill give you a enviroment you can run test in... HEAVY SECURITY policy's we use for red teaming
@AhmedDridi-fz4sw2 ай бұрын
Bro ,can you help me in reverse engineering for exe file , i lost the installer and the program from 2000 , it's difficult because he ask password in some dll file , i think he look for password in same path , if he didn't find this path he exit without any message
@Lsecqt2 ай бұрын
Sorry man I am bad at reversing
@AhmedDridi-fz4sw2 ай бұрын
@Lsecqt Thank you anyway 🥰❤️
@detective52532 ай бұрын
learned something new today, thanks 4 this video!
@richardghani54582 ай бұрын
What remote client do you use to connect your server running the vms please?
@Lsecqt2 ай бұрын
Yep I have a server with VMs and I use rdp most of the time
@calldrive94562 ай бұрын
Great video.
@SolitaryElite2 ай бұрын
great tutorial:)
@kristiyanbaltov29662 ай бұрын
Goood 👍
@aminhasni-o7x2 ай бұрын
you are the best broo ❤❤❤❤
@Tactical_Ara2 ай бұрын
Damn i was working missed that
@thefunnychannel66402 ай бұрын
how to do it without cmd pop up beacuse i dont want other party to see it
@Lsecqt2 ай бұрын
You can use the ShowWindow() API as demonstrated here: github.com/lsecqt/OffensiveCpp/blob/main/Shellcode%20Execution/FileMap/directPointerToFileMap.cpp
@harryuzezi39952 ай бұрын
you dont have these videos available in your paetron
@Lsecqt2 ай бұрын
They are here, they are publicly available, why do they need to also be there?
@calldrive94562 ай бұрын
Very use full session.
@tingootango49272 ай бұрын
Huge respect for sticking with it. Coming to terms with that skill being the most important in this field! Just keep trying.