Your channel just became my favorite!! Super amazing content!! :D
@unrealwarriors7758Күн бұрын
You doing very good, keep em up. I mean it.
@mohsenalbo5533Күн бұрын
Keep up the good work, this is amazing, I wish more people were teaching like this on youtube.
@eshenwarawita1228Күн бұрын
Amazing content bro. Do u have any plan to do a web pentesting series apart from the oscp course including advanced techniques?
@hexdump1337Күн бұрын
Yes! It’s in the plans, but it will require so much work that its not gonna see the light of day for a while! In the meantime I plan to bring cool CTF challenges to showcase more advanced techniques
@filmetro6739Күн бұрын
Just finished your OSCP guide, definitely adding some things to my notes from this. Thank you for making this!
@itsm3dud392 күн бұрын
could you make a video on hacking mobile applications? especially smali patching and run time hooking?
@hexdump13372 күн бұрын
Its in the plans, maybe I will start with some CTF/challenges videos on mobile hacking
@itsm3dud39Күн бұрын
@hexdump1337 ok👍
@tea_and_mountains2 күн бұрын
Beautifully explained. Many thanks 🙂
@simontam82312 күн бұрын
Nice video! Looks like my last comment got deleted by youtube, so I'll try to avoid using some words. Regarding your hc issue, see hc github issue 2816. The algorithm in your files is not yet supported by hc.
@hexdump13372 күн бұрын
Sorry for youtube randomly deleting comments, hate it 😢 Thanks so much for the contribution!
@KillaBlaze2 күн бұрын
Finally the full course!!!!❤❤❤❤❤
@Jamaal_Ahmed2 күн бұрын
It's really amazing video thank you so much ❤🎉 , you deserve million of subscribers ❤ .
@Reel-oky3 күн бұрын
bro good work i need this type of content to undersatand logice thx bro
@kundann_n99893 күн бұрын
thanks again very cool stuff.
@dev-null-7w73 күн бұрын
Hello friend, I'm from another country and I don't speak English although I'm learning, KZbin launched a feature that allows you to watch your videos with a translator in real time, anyone in the world can watch your videos without the language barrier, could you enable it when you can in the youtube studios settings. thanks.
@hexdump13373 күн бұрын
Technically it is enabled, I think however it requires some time before it can be used for video this long? not sure, what I know however is the feature itself is enabled
@dogalkaynaksu93853 күн бұрын
Hey there, thank you for hours of hours amazing content! Is there plan to make a video about Prototype Pollution or mXss Vulnerabilities? Most populer js modules have those kind of vulnerability and there are not much of beginner friendly explation videos out there.
@hexdump13373 күн бұрын
For sure! Sadly I do not have much time, but in the future and long term future of the channel more advanced vulns will be treated. First in the form of CTFs walkthroughs, and later on in the form of more structured content like this one, but for more advanced web vulns.
@MdIsmailHasanbasry3 күн бұрын
A hacker from somewhere I always like your contents Thanks for the dedication
@Zachsnotboard3 күн бұрын
🫡
@PetersonKinyanjui3 күн бұрын
this is gold can't wait to dig in. thanks bro
@AZa4sh1r03 күн бұрын
I love you dude 😂
@Alex-vi6iz3 күн бұрын
This is awesome ! Are you going to upload the Windows course as a long video like the linux one too ?
@hexdump13373 күн бұрын
Yah, working on the timestamps and everything
@inopsek3 күн бұрын
Please do not use AI for title translation. English is the way to go for this kind of subject.
@hexdump13373 күн бұрын
Hm, I actually did put the title in english, what title do you see? Provably is some automatic youtube config, I’ll try to understand more
@Nuru0004 күн бұрын
Я попробую обьяснить кратко: Метод показанный в видео работает, но только для PS 5.1 Windows 10, но немного про оптимизировав данный метод можно добиться обхода amsi для PS 5.1 и PS 7.0 для Windows 10 и Windows 11. 1) обойти ограничения ExecutionPolicy 2) Пропатчить память улучшенным методом из видео заполнения массивом из девяти нулей 3) сохранить сессию как новый контекст (обойти менеджер авторизации)
@hexdump13374 күн бұрын
Thank you for your contribution!
@divyaveeresha85624 күн бұрын
Thanks for great course, can you pls share the notes
@hexdump13374 күн бұрын
You can find everything in the github repository: github.com/LeonardoE95/yt-en
@wassimmariamable4 күн бұрын
Hey Buddy Great video course so far. I have installed the SecureBank application, however I can only log in to the admin person - [email protected]. I cannot log into the other users. Is that correct or do I have an issue with my installation process?
@hexdump133719 сағат бұрын
I just tried on couple of setups, and I also have the same behavior, so I believe it is sort of default. You can add those other users yourself I suppose, so yea no worries!
@wassimmariamable17 сағат бұрын
@@hexdump1337 thanks for replying. I have now been able to fix my issue. I can access all 4 users that the GitHUb reporsitroy mentions. I have also documented the entire installation process. I am running my project in VMWare. I am really enjoying the content so far. Well done on creating awesome content 😄
@MdSonu-rc7ty4 күн бұрын
Thanks u so much
@MDAASIF-i6f5 күн бұрын
Are the syllabus of oscp and oscp+ same , and also like toughness level etc
@hexdump13375 күн бұрын
Yes, consider them the same exam/study material. When u obtain the exam u get oscp+, then after 3 months it becomes a normal oscp
@MDAASIF-i6f5 күн бұрын
@hexdump1337 thank you for providing us this level of valuable content. And after 3 years it become normal oscp ✅️
@hexdump13374 күн бұрын
oh yeah sorry, it was 3 years xD 3 months would’ve been crazy short
@MDAASIF-i6f5 күн бұрын
Excellent content
@ДмитрийКузнецов-я4д5 күн бұрын
This exactly that we need ! Thank you so much!
@draggls5 күн бұрын
more web exploration stuff pleaseeeeee
@hexdump13375 күн бұрын
its coming!
@nishantdalvi94705 күн бұрын
Sir are you into bug bounty?
@hexdump13375 күн бұрын
Currently work as a software security consultant, pentest of web and mobile app, secure code review and training activities With the job and the channels don’t have much time for bug bounty, but I’m planning to do more of it in the future, and of course I will bring related material to the channel
@nishantdalvi94705 күн бұрын
Sir I will be very helpful if you reply your opinion on one of my concern (Asking this because I have been learning cybersec, Specially web application penetration testing for now 2 years but I am not able to see myself at even a intermediate level in order to get started with bug bounty) Basically I have a tendency to spend a lot of time understanding how vulnerabilities work under the hood. I don't feel comfortable moving on until I have a crystal-clear understanding of why something happens and what causes it. For example, I recently spent two days thoroughly understanding the CVE related to jQuery's deparam function and how it leads to prototype pollution. While I feel this depth of understanding helps me avoid being a script kiddie who just copies and pastes payloads without understanding them, it also slows me down significantly. I worry that if I continue this approach, I’ll spend so much time on each topic that I won’t be able to cover the breadth of knowledge required to start my bug bounty journey. How can I strike a balance between diving deep into topics and abstracting things so that I can move on to learn other new things as well in order to start my bug bounty journey? How can I determine how much time and effort to invest in understanding a specific vulnerability?
@hexdump13375 күн бұрын
Thats a very precious question, thanks for asking. I’m gonna think about it for a while before answering, but no worries, I am thinking about it!
@nishantdalvi94705 күн бұрын
No worries sir I am glad that you took out some time from your busy schedule in order to read it out and reply me 🙏🏻😇
@hexdump133719 сағат бұрын
Ok, I'll try to answer your question, hope it is somewhat useful. First of all, I would not wait until all the knowledge has been acquired before proceeding to do bug bounty. Truth is, you can start now. Yes, with limited knowledge, and maybe that won't be enough. However, do not fall into the trap of "over-preparation", which is another form of perfectionism. Truth is, not all knowledge is required to get something. Just something is required to get something. Hope that is not confusing. Invest of course maybe not the whole day to it. But you can start small, feel the experience itself, and you will have more understanding on what you need to improve on. As to what to focus on, I would say: start with low hanging fruits. What are these? These are vulnerabilities which are not too difficult to understand or to exploit. Yes, they are also very popular. Key here is to develop good automations to speed up the discovery of such vulnerabilities. In general, try to have a very focused approach, where you don't just study everything because it could be important, but you focus specifically on a technological stack. Like, idk, IDOR authz byass. Or WAF bypass to inject XSS payloads. Focus on 1-2-3 areas like this, and yeah, you can do deep dives in these areas, but with a very well defined focus. What i'm trying to say is: define precise goals. They can be hard, but they must be precise. Do not over-prepare and learn by doing, failing, and doing it again!
@darkraven42075 күн бұрын
Great content ❤
@darkraven42075 күн бұрын
First comment ❤
@abuumar62367 күн бұрын
great video !! How do you think about CPTS ?
@hexdump13376 күн бұрын
Never took it personally, I might do in the future just for the fun of it, but from the looks of it, it sems a very good certification in terms of the knowledge it offers. But yeah, definitely gonna explore more in the future
@muhammadarafat-l4h7 күн бұрын
hey please help us how to set up this local host make a video on it too
@hexdump13377 күн бұрын
You mean the vulnerable application? localhost is an interface that is already enabled in every operating system, and it allows to create a network that is internal to the OS so that application running in the OS can use it even if it is not publicly exposed
@handletodizmantle7 күн бұрын
Ancora l inglese si sente tanto che sei italiano ma molto molto meglio di tanti altri. Bel video
@nostalgicnow60019 күн бұрын
thank you for making this im trying to master linux pri esc every video helps
@TheIgnoredCorner10 күн бұрын
brother, just a curious question. is it possible for your to come live, i have questions on how to learn code, practice, what to learn, career path many more.
@hexdump133710 күн бұрын
Next year I might do some livestreams, just hard to find the time right now. If you have specific questions, feel free to write at [email protected]