A Cheatsheet and A Methodology
31:53
12 сағат бұрын
AMSI Bypass
42:41
Күн бұрын
Useful Tools
27:02
14 күн бұрын
Critical Registry Paths
26:18
14 күн бұрын
Scheduled Tasks
24:18
14 күн бұрын
Windows Hashes
29:41
21 күн бұрын
Files with Sensitive Data
25:31
28 күн бұрын
How Computers Capture Meaning
33:01
Always Install Elevated
22:47
Ай бұрын
Are You Anxious About OSCP?
20:24
UAC Bypass
31:17
Ай бұрын
DLL Hijacking
40:29
Ай бұрын
Unquoted Service Path
20:53
Ай бұрын
Weak Service Permissions
23:27
2 ай бұрын
Windows Services
34:24
2 ай бұрын
On Cross Compilation
30:03
2 ай бұрын
RomHack 2024
17:31
2 ай бұрын
Reflecting on the CUPS CVEs
30:03
3 ай бұрын
Linux Kernel Exploitation
29:16
3 ай бұрын
Пікірлер
@Jane-e4n2n
@Jane-e4n2n Күн бұрын
Your channel just became my favorite!! Super amazing content!! :D
@unrealwarriors7758
@unrealwarriors7758 Күн бұрын
You doing very good, keep em up. I mean it.
@mohsenalbo5533
@mohsenalbo5533 Күн бұрын
Keep up the good work, this is amazing, I wish more people were teaching like this on youtube.
@eshenwarawita1228
@eshenwarawita1228 Күн бұрын
Amazing content bro. Do u have any plan to do a web pentesting series apart from the oscp course including advanced techniques?
@hexdump1337
@hexdump1337 Күн бұрын
Yes! It’s in the plans, but it will require so much work that its not gonna see the light of day for a while! In the meantime I plan to bring cool CTF challenges to showcase more advanced techniques
@filmetro6739
@filmetro6739 Күн бұрын
Just finished your OSCP guide, definitely adding some things to my notes from this. Thank you for making this!
@itsm3dud39
@itsm3dud39 2 күн бұрын
could you make a video on hacking mobile applications? especially smali patching and run time hooking?
@hexdump1337
@hexdump1337 2 күн бұрын
Its in the plans, maybe I will start with some CTF/challenges videos on mobile hacking
@itsm3dud39
@itsm3dud39 Күн бұрын
@hexdump1337 ok👍
@tea_and_mountains
@tea_and_mountains 2 күн бұрын
Beautifully explained. Many thanks 🙂
@simontam8231
@simontam8231 2 күн бұрын
Nice video! Looks like my last comment got deleted by youtube, so I'll try to avoid using some words. Regarding your hc issue, see hc github issue 2816. The algorithm in your files is not yet supported by hc.
@hexdump1337
@hexdump1337 2 күн бұрын
Sorry for youtube randomly deleting comments, hate it 😢 Thanks so much for the contribution!
@KillaBlaze
@KillaBlaze 2 күн бұрын
Finally the full course!!!!❤❤❤❤❤
@Jamaal_Ahmed
@Jamaal_Ahmed 2 күн бұрын
It's really amazing video thank you so much ❤🎉 , you deserve million of subscribers ❤ .
@Reel-oky
@Reel-oky 3 күн бұрын
bro good work i need this type of content to undersatand logice thx bro
@kundann_n9989
@kundann_n9989 3 күн бұрын
thanks again very cool stuff.
@dev-null-7w7
@dev-null-7w7 3 күн бұрын
Hello friend, I'm from another country and I don't speak English although I'm learning, KZbin launched a feature that allows you to watch your videos with a translator in real time, anyone in the world can watch your videos without the language barrier, could you enable it when you can in the youtube studios settings. thanks.
@hexdump1337
@hexdump1337 3 күн бұрын
Technically it is enabled, I think however it requires some time before it can be used for video this long? not sure, what I know however is the feature itself is enabled
@dogalkaynaksu9385
@dogalkaynaksu9385 3 күн бұрын
Hey there, thank you for hours of hours amazing content! Is there plan to make a video about Prototype Pollution or mXss Vulnerabilities? Most populer js modules have those kind of vulnerability and there are not much of beginner friendly explation videos out there.
@hexdump1337
@hexdump1337 3 күн бұрын
For sure! Sadly I do not have much time, but in the future and long term future of the channel more advanced vulns will be treated. First in the form of CTFs walkthroughs, and later on in the form of more structured content like this one, but for more advanced web vulns.
@MdIsmailHasanbasry
@MdIsmailHasanbasry 3 күн бұрын
A hacker from somewhere I always like your contents Thanks for the dedication
@Zachsnotboard
@Zachsnotboard 3 күн бұрын
🫡
@PetersonKinyanjui
@PetersonKinyanjui 3 күн бұрын
this is gold can't wait to dig in. thanks bro
@AZa4sh1r0
@AZa4sh1r0 3 күн бұрын
I love you dude 😂
@Alex-vi6iz
@Alex-vi6iz 3 күн бұрын
This is awesome ! Are you going to upload the Windows course as a long video like the linux one too ?
@hexdump1337
@hexdump1337 3 күн бұрын
Yah, working on the timestamps and everything
@inopsek
@inopsek 3 күн бұрын
Please do not use AI for title translation. English is the way to go for this kind of subject.
@hexdump1337
@hexdump1337 3 күн бұрын
Hm, I actually did put the title in english, what title do you see? Provably is some automatic youtube config, I’ll try to understand more
@Nuru000
@Nuru000 4 күн бұрын
Я попробую обьяснить кратко: Метод показанный в видео работает, но только для PS 5.1 Windows 10, но немного про оптимизировав данный метод можно добиться обхода amsi для PS 5.1 и PS 7.0 для Windows 10 и Windows 11. 1) обойти ограничения ExecutionPolicy 2) Пропатчить память улучшенным методом из видео заполнения массивом из девяти нулей 3) сохранить сессию как новый контекст (обойти менеджер авторизации)
@hexdump1337
@hexdump1337 4 күн бұрын
Thank you for your contribution!
@divyaveeresha8562
@divyaveeresha8562 4 күн бұрын
Thanks for great course, can you pls share the notes
@hexdump1337
@hexdump1337 4 күн бұрын
You can find everything in the github repository: github.com/LeonardoE95/yt-en
@wassimmariamable
@wassimmariamable 4 күн бұрын
Hey Buddy Great video course so far. I have installed the SecureBank application, however I can only log in to the admin person - [email protected]. I cannot log into the other users. Is that correct or do I have an issue with my installation process?
@hexdump1337
@hexdump1337 19 сағат бұрын
I just tried on couple of setups, and I also have the same behavior, so I believe it is sort of default. You can add those other users yourself I suppose, so yea no worries!
@wassimmariamable
@wassimmariamable 17 сағат бұрын
@@hexdump1337 thanks for replying. I have now been able to fix my issue. I can access all 4 users that the GitHUb reporsitroy mentions. I have also documented the entire installation process. I am running my project in VMWare. I am really enjoying the content so far. Well done on creating awesome content 😄
@MdSonu-rc7ty
@MdSonu-rc7ty 4 күн бұрын
Thanks u so much
@MDAASIF-i6f
@MDAASIF-i6f 5 күн бұрын
Are the syllabus of oscp and oscp+ same , and also like toughness level etc
@hexdump1337
@hexdump1337 5 күн бұрын
Yes, consider them the same exam/study material. When u obtain the exam u get oscp+, then after 3 months it becomes a normal oscp
@MDAASIF-i6f
@MDAASIF-i6f 5 күн бұрын
@hexdump1337 thank you for providing us this level of valuable content. And after 3 years it become normal oscp ✅️
@hexdump1337
@hexdump1337 4 күн бұрын
oh yeah sorry, it was 3 years xD 3 months would’ve been crazy short
@MDAASIF-i6f
@MDAASIF-i6f 5 күн бұрын
Excellent content
@ДмитрийКузнецов-я4д
@ДмитрийКузнецов-я4д 5 күн бұрын
This exactly that we need ! Thank you so much!
@draggls
@draggls 5 күн бұрын
more web exploration stuff pleaseeeeee
@hexdump1337
@hexdump1337 5 күн бұрын
its coming!
@nishantdalvi9470
@nishantdalvi9470 5 күн бұрын
Sir are you into bug bounty?
@hexdump1337
@hexdump1337 5 күн бұрын
Currently work as a software security consultant, pentest of web and mobile app, secure code review and training activities With the job and the channels don’t have much time for bug bounty, but I’m planning to do more of it in the future, and of course I will bring related material to the channel
@nishantdalvi9470
@nishantdalvi9470 5 күн бұрын
Sir I will be very helpful if you reply your opinion on one of my concern (Asking this because I have been learning cybersec, Specially web application penetration testing for now 2 years but I am not able to see myself at even a intermediate level in order to get started with bug bounty) Basically I have a tendency to spend a lot of time understanding how vulnerabilities work under the hood. I don't feel comfortable moving on until I have a crystal-clear understanding of why something happens and what causes it. For example, I recently spent two days thoroughly understanding the CVE related to jQuery's deparam function and how it leads to prototype pollution. While I feel this depth of understanding helps me avoid being a script kiddie who just copies and pastes payloads without understanding them, it also slows me down significantly. I worry that if I continue this approach, I’ll spend so much time on each topic that I won’t be able to cover the breadth of knowledge required to start my bug bounty journey. How can I strike a balance between diving deep into topics and abstracting things so that I can move on to learn other new things as well in order to start my bug bounty journey? How can I determine how much time and effort to invest in understanding a specific vulnerability?
@hexdump1337
@hexdump1337 5 күн бұрын
Thats a very precious question, thanks for asking. I’m gonna think about it for a while before answering, but no worries, I am thinking about it!
@nishantdalvi9470
@nishantdalvi9470 5 күн бұрын
No worries sir I am glad that you took out some time from your busy schedule in order to read it out and reply me 🙏🏻😇
@hexdump1337
@hexdump1337 19 сағат бұрын
Ok, I'll try to answer your question, hope it is somewhat useful. First of all, I would not wait until all the knowledge has been acquired before proceeding to do bug bounty. Truth is, you can start now. Yes, with limited knowledge, and maybe that won't be enough. However, do not fall into the trap of "over-preparation", which is another form of perfectionism. Truth is, not all knowledge is required to get something. Just something is required to get something. Hope that is not confusing. Invest of course maybe not the whole day to it. But you can start small, feel the experience itself, and you will have more understanding on what you need to improve on. As to what to focus on, I would say: start with low hanging fruits. What are these? These are vulnerabilities which are not too difficult to understand or to exploit. Yes, they are also very popular. Key here is to develop good automations to speed up the discovery of such vulnerabilities. In general, try to have a very focused approach, where you don't just study everything because it could be important, but you focus specifically on a technological stack. Like, idk, IDOR authz byass. Or WAF bypass to inject XSS payloads. Focus on 1-2-3 areas like this, and yeah, you can do deep dives in these areas, but with a very well defined focus. What i'm trying to say is: define precise goals. They can be hard, but they must be precise. Do not over-prepare and learn by doing, failing, and doing it again!
@darkraven4207
@darkraven4207 5 күн бұрын
Great content ❤
@darkraven4207
@darkraven4207 5 күн бұрын
First comment ❤
@abuumar6236
@abuumar6236 7 күн бұрын
great video !! How do you think about CPTS ?
@hexdump1337
@hexdump1337 6 күн бұрын
Never took it personally, I might do in the future just for the fun of it, but from the looks of it, it sems a very good certification in terms of the knowledge it offers. But yeah, definitely gonna explore more in the future
@muhammadarafat-l4h
@muhammadarafat-l4h 7 күн бұрын
hey please help us how to set up this local host make a video on it too
@hexdump1337
@hexdump1337 7 күн бұрын
You mean the vulnerable application? localhost is an interface that is already enabled in every operating system, and it allows to create a network that is internal to the OS so that application running in the OS can use it even if it is not publicly exposed
@handletodizmantle
@handletodizmantle 7 күн бұрын
Ancora l inglese si sente tanto che sei italiano ma molto molto meglio di tanti altri. Bel video
@nostalgicnow6001
@nostalgicnow6001 9 күн бұрын
thank you for making this im trying to master linux pri esc every video helps
@TheIgnoredCorner
@TheIgnoredCorner 10 күн бұрын
brother, just a curious question. is it possible for your to come live, i have questions on how to learn code, practice, what to learn, career path many more.
@hexdump1337
@hexdump1337 10 күн бұрын
Next year I might do some livestreams, just hard to find the time right now. If you have specific questions, feel free to write at [email protected]