Just in time im preparing for the OSCP and i gain so much information from ur videos .. thanks alot
@juul2163 жыл бұрын
same, thanks alot!
@johnfawcettiii18073 жыл бұрын
Same working on the OSCP as well
@agents_of_hydra18593 жыл бұрын
Your explanation style is awesome
@cy_wareye73952 жыл бұрын
Thank You. You always keep me up-to-date with "know-how" things. When i got few sources to study with same content and one of them Your tutorial - I choose Your's coz it clean and easy to understand.
@djmeezymeez9403 жыл бұрын
Keep them coming my guy 🔥🔥🔥
@rudrasalaria34313 жыл бұрын
Thank you for this kind of video. Your videos are always amazing. I learn a lot from your video.
@морс-ф3д3 жыл бұрын
BIG THANK YOU for YOUR INTENSIVE WORK FOR US!!!!!
@cyvorsec Жыл бұрын
TY for great videos! 😃
@yamunaudayanthi32663 жыл бұрын
Amazing video....❤️🤩 Thank you so much....😍😘
@sathishganapathy8022 жыл бұрын
Hi HackerSploit, thanks for the tutorial. It's very helpful. How to identify the version of PowerView in use? Because, some of the commands in the cheatsheet such as 'Get-DomainUser' is not working in this version in THM.
@agents_of_hydra18593 жыл бұрын
Very interesting video bro
@MaxDzdz3 жыл бұрын
Tnks for all video !! ❤️
@init_64153 жыл бұрын
WOW, U r teaching at us 4:38 AM, is it kali time error or ... .
@mub1n Жыл бұрын
plz keep doing these videos
@abdelghfarahmed7 ай бұрын
You are an angel
@accrevoke3 жыл бұрын
I think the regular windows defender would block the script, and basically any antivirus product. I wish THM would add the basics on disabling EDR / antivirus and applockers rule in their challenge, or demo some of the common in-memory iex techniques
@HackerSploit3 жыл бұрын
We will cover AD evasion as we progress.
@marcellogambetti94582 жыл бұрын
very good video, BUT as caveat remember most of those commands REQUIRE to be ALREADY administrator...
@alexeysolovyev11073 жыл бұрын
Love you videos buddy
@PandaandSparrow3 жыл бұрын
Nice Video
@Marc-td7nn3 жыл бұрын
Great job. Can u post a document of the commands? Thanks
@HackerSploit3 жыл бұрын
Working on a GitHub repo that will highlight all the commands used.
@sabyasachisahoo89753 жыл бұрын
keep posting about acitve directory
@aziz59013 жыл бұрын
I have one question sir, hope you answer this .. im sorry if it can be silly you say active directory network what do you mean by that ?
@8080VB3 жыл бұрын
Its a domain who is developed by ms , which is only found in winserver systems , where in an enterprise many computer connected into a single domain , so they can communicate each other n do stuff remotely , also admins can create group policy and manage permissions. Eg for a college or an big enterprises most likely have an Active directory.
@jakobro17943 жыл бұрын
A computer registered in a Domain. Some computers have a local account, if it's not local it's AD. With AD theirs others PAssword policies, etc.
@aziz59013 жыл бұрын
@@8080VB I understand that but what I mean is when he used AD network words . I was thinking is there any networking technology in AD apart from literal networking we do to connect devices ?
@8080VB3 жыл бұрын
@@aziz5901 whats your goal?
@shivasijwali67793 жыл бұрын
Please make video on bufferoverflow pls?
@HackerSploit3 жыл бұрын
Working on it.
@dyes80823 жыл бұрын
Great video, im really enjoying this series and it couldnt of happened at a better time. I'm currently studying for my CRTP exam - 1st chapter of the study material provided covers powerview. In the test lab environment I have normal user privileges and i cant run powerview as windows defender blocks it for being malicious content. Do you have any tips or references on how to gain rights to run such scripts like powerview? I did set the execution policy to bypass, this gets access denied to registry key but can be bypassed by doing what you displayed in the video - running it from cmd(thanks!).
@HackerSploit3 жыл бұрын
We will cover IDS and AV evasion.
@socat93112 жыл бұрын
There are AMSI bypass strings if you look it up. I believe CRTP labs material cover it
@dyes80822 жыл бұрын
@@socat9311 Yep, it is covered - i felt the content for the crtp was a bit all over the place but in saying that i was able to pass the crtp first try
@sathishganapathy8022 жыл бұрын
It's covered in the lab manual how to use invisi shell and bypass AMSI
@wildaceds3 жыл бұрын
a little comment for the algo
@rkvideos40913 жыл бұрын
Nice
@jerryasagba73523 жыл бұрын
Please Someone answer this Is shell scripting the same as bash scripting or if I learn shell scripting do I have to learn bash scripting like it’s a new language or they are the same
@damonlee70553 жыл бұрын
Shell scripting is a broad term that bash scripting falls under. Bash is just 1 shell among many other shells like ksh, zsh. Each shell will have its own peculiarities but most should support original sh commands / syntax. So to answer your last question, it's mostly like learning 1 language.
@jerryasagba73523 жыл бұрын
@@damonlee7055 Thank You So Much
@VoteOne-vw4eb Жыл бұрын
AND IT'S FREE🥺
@shauncremen73783 жыл бұрын
What's the point of power view if it will more than likely be blocked by windows firewall immediately
@HackerSploit3 жыл бұрын
This video highlights the enumeration process. We will cover AD and IDS evasion as we progress.
@ppetrix3 жыл бұрын
Ok ok . But all of this is not cough by AV? or for this what we have to do to mitigate ? Tnx
@shauncremen73783 жыл бұрын
@@HackerSploit awesome can't wait!
@shauncremen73783 жыл бұрын
@ppetrix caught by AV immediately. To mitigate it you need to use bypassing AV techniques or turn of the firewall off.
@__sidharth__3 жыл бұрын
👍👍👍
@Viren09official3 жыл бұрын
superd
@netbin3 жыл бұрын
while hackersploit giving a salute to guys, ippsec already made nmap scan and have changed the hosts file.