Full Hands-On Ethical Hacking Course with Kali Linux for Beginners Step-by-Step | Cyber Security

  Рет қаралды 67,067

Sunny Dimalu The Cyborg

Sunny Dimalu The Cyborg

Күн бұрын

Пікірлер: 85
@Marc_Dutroux
@Marc_Dutroux 4 ай бұрын
I love how you break down complex topics for beginners. Your teaching style is excellent. Thanks, Sunny! Love from Belgium!
@Addy.j-q6e
@Addy.j-q6e 2 ай бұрын
Begium?😂😂😂
@Marc_Dutroux
@Marc_Dutroux 2 ай бұрын
@@Addy.j-q6e LoL *Belgium. That was a typo.
@carlosgonzalez-yy2zp
@carlosgonzalez-yy2zp 22 күн бұрын
excellent way of teaching keep up your good work, and GOD bless you.
@samidew5092
@samidew5092 3 ай бұрын
First time tutorial watching without feeling bored😊
@jaspervandework7383
@jaspervandework7383 6 күн бұрын
Not boring at all!!I must say, LOL, normally i hate Chinese accent but this is the first not borring tutotial about kali and the order of presentation of the commands are logicall and easy to remember! Cant wait to see if it stays this good...then i might fjnally learn kali!!!
@Absconsor
@Absconsor 2 күн бұрын
You are an excellent teacher, everything is clear explained, no time waisting, i'm looking forward for more courses on udemy too 🎉
@SunnyDimalu
@SunnyDimalu 2 күн бұрын
Thank you!
@grantco.421
@grantco.421 2 ай бұрын
Hands down the best course on the web. all of your tutorials worked and I learned more about 4 way handshakes and cracking wifi passwords with you than i did in a 3 month bootcamp
@MrJohnsoncomputerscientist
@MrJohnsoncomputerscientist 4 ай бұрын
Great video waiting for part 1.
@MyRescue-r8y
@MyRescue-r8y 3 күн бұрын
The best explanation and practical teacher thank you your free course❤❤❤❤
@IA-xr8de
@IA-xr8de 4 ай бұрын
Thank you Bro for this course. You have amazing content.
@ibnfirnaas5963
@ibnfirnaas5963 4 ай бұрын
Thanks for this course.
@EscoeLetsgo
@EscoeLetsgo Күн бұрын
Heaven sent!!!! Thank you ❤
@alharosh
@alharosh 4 ай бұрын
one world, bless you
@StephensIfeoma
@StephensIfeoma 3 ай бұрын
Well done I really appreciate you I like the way teach hope to see more of your videos
@DanmasaniAbdulrahmanBalarabe
@DanmasaniAbdulrahmanBalarabe 2 ай бұрын
Fantastic ! Really your instructions are excellent and clear to reach the goal . Thank you Sir for the good contribution of the Knowledge .
@InfluenceNg
@InfluenceNg Ай бұрын
Thank you so much for this. God bless you, I'm so happy with this course, it's the best.
@sp-vs5uc
@sp-vs5uc 3 ай бұрын
Great video Boss. From Bangladesh ❤
@studyserenity-f2b
@studyserenity-f2b 3 ай бұрын
well well .. this video is way more helpful then ever .. And the way of teaching is understandable ..i like it and impatiently waiting for the next part 😶‍🌫 Please Sir! don't forget to upload other parts 👍 i want some advance learning after this 👏
@ptahrightknowledge3813
@ptahrightknowledge3813 3 ай бұрын
Go and support his Udemy course then
@MiladWaskout
@MiladWaskout 2 ай бұрын
Thanks mate! I learned a lot
@mingosutu
@mingosutu 3 ай бұрын
Wery wery nice wideo. Keep up the good vork.
@evertondeoliveirasoares2406
@evertondeoliveirasoares2406 Ай бұрын
Subject: Questions about IDOR and Bug Bounty Hi , hope you're doing well! I'm a beginner in pentesting and bug bounty hunting, and I recently started studying IDOR (Insecure Direct Object Reference) and Access Control through PortSwigger's labs. A friend recommended this path as it's often easier to find these vulnerabilities and generate some income. I would like to ask for some practical tips: 1. What is the best approach to finding IDOR vulnerabilities in real-world programs? 2. What mindset or steps should I adopt when analyzing applications? 3. Do you have any recommendations for tools or methods that I could start incorporating right away? Thank you very much for any insights you can share. Your content has been extremely helpful on this journey!
@SunnyDimalu
@SunnyDimalu Ай бұрын
to find IDOR vulnerabilities, explore every feature of the application. Test endpoints, forms, and actions where IDs, parameters are used. Manipulate inputs by changing IDs and values you shouldn't have access to and observe the outcome. The best way to learn is through practice. Cybersecurity and bug bounty hunting are practical fields-the more you practice, the better you become. There are no shortcuts. Use tools like Burp Suite, FFUF, and OWASP ZAP; they are excellent for capturing and manipulating requests. use FFUF . it is an excellent fuzzer. Peform Capture The Flag (CTF) challenges on platforms like Hack The Box, PortSwigger Academy, or TryHackMe, which offer practical exercises on IDOR and other vulnerabilities.
@mashalch
@mashalch 3 ай бұрын
Keep up the good work
@AhmadAhmad-gh5op
@AhmadAhmad-gh5op 2 ай бұрын
gure jee, super way to explaing
@uyoume2227
@uyoume2227 2 ай бұрын
Many thanks fine Sir 🍒
@MichaelOseiAppiah
@MichaelOseiAppiah 3 ай бұрын
Hi Sunny, your teaching style is very cool. Do you have a full course in Application Security engineer. I want to be an Application security engineer
@SunnyDimalu
@SunnyDimalu 3 ай бұрын
Not yet Sorry.
@anvayashakti2374
@anvayashakti2374 2 ай бұрын
Thank you Sir ❤
@DavidDillon-o8z
@DavidDillon-o8z 12 күн бұрын
maybe we should discuss some preliminaries such as: should I be using VPN when setting up the virtual lab?
@SunnyDimalu
@SunnyDimalu 12 күн бұрын
Vpn is not required when you are just starting out . First priority must be to solidify the fundamentals and this video exactly does that.
@ananyadubey1235
@ananyadubey1235 18 күн бұрын
I have confusion before grep command ,plz explain that man command
@pal7481
@pal7481 14 күн бұрын
use chat gpt bro ask it what it is what does it do , how do i use and why is it used and ask it to show you examples of on scenario when it is used. Hope this helps.
@IndustryOfMagic
@IndustryOfMagic 4 ай бұрын
Good work bro
@harrypercyvale123
@harrypercyvale123 Ай бұрын
hi, many thanks for your educational course. i have connected a wireless local area network "tp W-C-D band AC600. the USB light is on and it is connected however no matter what i do Kali "device" shows no USB is connected!? can you help?
@SunnyDimalu
@SunnyDimalu Ай бұрын
To use a wireless adapter in a Kali Linux virtual machine, you first need to add it to Kali. Connect it to your system, then go to Devices -> USB, and select your adapter from the list.
@harrypercyvale123
@harrypercyvale123 Ай бұрын
thanks for your quick response. how do i add it to kali? please elaborate.
@SunnyDimalu
@SunnyDimalu Ай бұрын
Steps) Connect your adaptor to your system, then go to Devices(it is at the top - Menu bar of your Virtual machine) click on USB, and there you will a list of connected devices then select your adapter from the list.
@harrypercyvale123
@harrypercyvale123 Ай бұрын
@SunnyDimalu , sorry mate, this is the issue. I get the message no USB is connected.
@SunnyDimalu
@SunnyDimalu Ай бұрын
Hello dear, it's very difficult for me to diagnose the issue without knowing more details, such as the version of VirtualBox, the operating system, and whether your card is compatible with Kali Linux.
@mbrowne8166
@mbrowne8166 Ай бұрын
Hello, is there a way of removing verification from internet email
@SunnyDimalu
@SunnyDimalu Ай бұрын
Your question is not clear to me. Please be derailed and specific
@7fame_iwon231
@7fame_iwon231 Ай бұрын
good evening boss.i connected my wifi and ip a it and i saw eth0 and eth1....does that mean that its correctly deteected by kali ?
@SunnyDimalu
@SunnyDimalu Ай бұрын
Is it a wireless card? If it is a wireless adapter, it is typically wlan0. Run the airmon-ng command and check what it displays.
@7fame_iwon231
@7fame_iwon231 25 күн бұрын
@@SunnyDimalu sorry for my late response boss.and yes its a wireless adapter.i will try and run the airmon command and see what it says and let you know,however i tried connecting the wireless adapter with a usb to the laptop but it always disconnects the network.don't know why it happens. and also please can you share me the link to your course on Udemy.thanks.
@SunnyDimalu
@SunnyDimalu 25 күн бұрын
The link for the Complete course is provided in the description of this video itself. Check the description . If do you enroll in the course, you can send me personal messages on Udemy about any errors. I can provide detailed answers there. What exact errors are you encountering?
@7fame_iwon231
@7fame_iwon231 25 күн бұрын
@@SunnyDimalu ok will check the description.the error am encountering is the the wireless wifi disconnecting auotmatically when i connect the wireless wifi with a usb cord to my laptop..so i don't why?
@SunnyDimalu
@SunnyDimalu 25 күн бұрын
Run upgrade command then reconnect the adaptor. The most important check whether your wireless adaptor is compatible with kali linux or not .
@BhimjiMapato
@BhimjiMapato Ай бұрын
Wawoh nice
@F-Gamingi
@F-Gamingi Ай бұрын
Sir you said you are a reverse engineer , i request you to make a full fledge video on reveres engineering from beginner to advance level with all levels of crackme using kali linux please sir i hope you will read this and also you will make this thanks in advance
@SunnyDimalu
@SunnyDimalu Ай бұрын
At some point in the near future, that is my top priority. I will definately start teaching Assembly and ReverseE.
@F-Gamingi
@F-Gamingi Ай бұрын
@@SunnyDimalu I am very excited for that time so please do it soon , i cannot wait too long !
@ateebshaikh9334
@ateebshaikh9334 6 күн бұрын
Im not getting and wlan0 response please reply me asap
@SunnyDimalu
@SunnyDimalu 6 күн бұрын
Check if your Adaptor is compatible with Kai linux? Run upgrade command the try reconnecting.
@ateebshaikh9334
@ateebshaikh9334 6 күн бұрын
@SunnyDimalu checked.. what network setting shall I apply NAT OR BRIDGE ADAPTER
@eloncole5702
@eloncole5702 2 ай бұрын
Can we track the lost phone with IMEI number 😢
@SunnyDimalu
@SunnyDimalu 2 ай бұрын
It is technically possible under specific circumstances. The best course of action is to file a police report if you suspect your phone has been stolen. Tracking a device requires resources, but the police may be able to use their tools to locate and potentially recover it.
@Net-Guru
@Net-Guru 3 ай бұрын
Nice video
@shabeel205
@shabeel205 3 ай бұрын
Can I become hacker only use mobile android device ?
@SunnyDimalu
@SunnyDimalu 3 ай бұрын
You can learn a lot about theoretical concepts using a mobile device, but you'll need a computer for practical applications.
@errorgamer-m2j
@errorgamer-m2j 3 ай бұрын
1:35:34
@errorgamer-m2j
@errorgamer-m2j 3 ай бұрын
30:49
@egwuonwunelsononuchukwu
@egwuonwunelsononuchukwu 2 ай бұрын
sir, thanks a lot. could you please mentor me on this carrer path. am just a beginner ?
@SunnyDimalu
@SunnyDimalu 2 ай бұрын
How can I help you?
@mohamedimthiyas7180
@mohamedimthiyas7180 Ай бұрын
">
@TikritiXP
@TikritiXP 4 ай бұрын
Goat
@ramrao2022
@ramrao2022 7 күн бұрын
Hare Krishna
@ravi-k8s7r
@ravi-k8s7r Ай бұрын
Hindi language sir
@SophyTiffany-r7g
@SophyTiffany-r7g 3 ай бұрын
Moore Larry Allen Daniel Anderson Mary
Where People Go When They Want to Hack You
34:40
Cybernews
Рет қаралды 2,4 МЛН
Quilt Challenge, No Skills, Just Luck#Funnyfamily #Partygames #Funny
00:32
Family Games Media
Рет қаралды 55 МЛН
When you have a very capricious child 😂😘👍
00:16
Like Asiya
Рет қаралды 18 МЛН
СИНИЙ ИНЕЙ УЖЕ ВЫШЕЛ!❄️
01:01
DO$HIK
Рет қаралды 3,3 МЛН
Reacting to Theo's Video About Raycast
18:50
Raycast
Рет қаралды 6 М.
Simple Penetration Testing Tutorial for Beginners!
29:41
Loi Liang Yang
Рет қаралды 87 М.
دورة الآمن السيبراني للمبتدئين |Cyber Security Essentials Course
1:19:34
Khaled Haddad | خالد حداد
Рет қаралды 12 М.
Top 10 Hacking Tools In Kali Linux You Must Know.
7:31
Zilox
Рет қаралды 607 М.
The BEST Mechanical Display You've EVER Seen!!!
13:51
Tin Foil Hat
Рет қаралды 465 М.
Scammers PANIC After I Hack Their Live CCTV Cameras!
23:20
NanoBaiter
Рет қаралды 24 МЛН
Cybersecurity Trends for 2025 and Beyond
16:55
IBM Technology
Рет қаралды 127 М.
Best of CES 2025
14:50
The Verge
Рет қаралды 304 М.
Quilt Challenge, No Skills, Just Luck#Funnyfamily #Partygames #Funny
00:32
Family Games Media
Рет қаралды 55 МЛН