you're killing it with this content Hackersploit, please upload more!! I've only seen a few of the red team videos but will def be watching more
@ilbona872 жыл бұрын
I recently finished the PTSv2 course, you're a phenomenal teacher!
@Nikita-sj8og2 жыл бұрын
Can you please give the link of same ?
@ilbona872 жыл бұрын
@@Nikita-sj8og It's hosted on the INE platform, you need to purchase at least a monthly subscription to take the course.
@ragnarok552 жыл бұрын
Where can you finish that course He is ine platform instructor or not
@fabricenade99822 жыл бұрын
The videos of HackerSploit are always Masterclass 💪. The Explanations are perfectly clear. Just MASTERCLASS.
@korovamilkplus Жыл бұрын
Alexis, first of all I want to thank you for this fantastic Red Team Fundamentals course! I've done some testing, and unfortunately, despite the video being recent, almost none of the AV evasion techniques work: 1) Invoke-Obfuscation is the only technique that works. 2) Shellter is immediately detected, both with new versions of WinRar (32bit) and with older versions. 3) Shikata Ga Nai is not detected by Windows Defender using 45 iterations, but the listener does not receive the reverse connection. I tried Shikata Ga Nai with different payloads created with MSFVenom, and with different iterations, but either it is detected or it does not make the reverse connection. 4) In no case was I able to obscure a reverse shell created with MSFVenom. The tests were all conducted with Windows Defender on Windows 10 (64bit) in my laboratory. If you have time and desire, you could update the obfuscation techniques by perhaps deepening the topic. In any case, thanks as always, you're the best cybersecurity teacher. See you soon.
@korovamilkplus Жыл бұрын
UPDATE: Invoke-Obfuscation also works with PowerShell Empire (the CSharp payload is not detected). Unfortunately, the /powershell/privesc/bypassuac module does not work with PowerShell Empire (it is detected, both with obfuscation and without), despite working perfectly with Metasploit.
@parkour.11parkour582 жыл бұрын
Gonna watch all your videos and comment after watching them
@zarandija2 жыл бұрын
15'56'' You are fantestic....great video!!!!!
@mynealways5092 жыл бұрын
Pretty hard to keep a good man down... Welcome Back HS...
@baidysall95912 жыл бұрын
Awesome video. Always providing great content…. Merry Christmas 🎉
@torsec60482 жыл бұрын
happy too see you after a long time
@DopeForJesus Жыл бұрын
This is top notch material.
@kmengkomsot1479 Жыл бұрын
thank you hackersploit 😍😍
@arupsen1212 жыл бұрын
After a long time came with the video.alex my favourite mentor . Can I request any video topics?
@Tathamet Жыл бұрын
awesome thanks! but most EDR's today are really good at stopping shellter from my experience
@gianlucasanfilippo4669 Жыл бұрын
Great video. But I have a question: following all the steps, I get the infected executable file of winrar, but in my case then windows defender detects it , I just pass it on the victim target. How can I avoid it?Thanks
@NightMaRe-xl9tr2 жыл бұрын
best hacking content ever 👍💯 , keep up the good work
@hackproof12 жыл бұрын
Finally… welcome back
@GliddingHippo2 жыл бұрын
can you help me .I cant install powershell it says "Package 'powershell' has no installation candidate"
@xsTaoo Жыл бұрын
Input "sudo wine shellter.exe" prompt "wine: could not load kernel32.dll, status c0000135", what should I do?
@daljeetbhati83532 жыл бұрын
Is this part of red teaming fundamental series part
@Funnnnboyy2 жыл бұрын
Welcome back 🎉
@netstreamer Жыл бұрын
These videos are great! One question though. Even if you evade the av won't the continuously running command prompt window in the background tip the blue team off?
@priiv182 жыл бұрын
Hello Hackersploit. Can You Help Me ?. I Am interesting in Cybersecuirty. Which Books Can You Recommend To Me ?. Which Books Should l Read ?
@rishabhrana37732 жыл бұрын
As usual great video. How many videos will come in this series
@HackerSploit2 жыл бұрын
Will share the outline in a separate video/live stream.
@rishabhrana37732 жыл бұрын
Welcome back sir
@HackerSploit2 жыл бұрын
Return of the Mack! good to be back.
@rishabhrana37732 жыл бұрын
@@HackerSploit yes sir today i was watching your video thinking for new video
@passaronegro3492 жыл бұрын
We follow your channel here in Brazil,,🇧🇷✨ if possible put subtitles in your videos !!!!
@jamesparker57762 жыл бұрын
good to see you sir
@Josepp4Martinezpp4 Жыл бұрын
My regards, brother! Is it possible to recover some photos that I had sent via messenger on a Facebook account that I deleted at the beginning of the year. The person I sent them to was automatically deleted from their inbox when my account was deleted?
@RAZERKRYPTO Жыл бұрын
I am a big fan of youuuuuu
@byronshepherd84152 жыл бұрын
Welcome back!
@torsec60482 жыл бұрын
long time no see alexis
@16saalkanigga2 жыл бұрын
**Video idea** Show some offensive example of chatgpt How pentester can use it? How will it affect cybersecurity field? Will ai take cybersecurity job in near future?
@alwan77772 жыл бұрын
pleseee review HavocFramework
@ragnarok552 жыл бұрын
My request please kindly explain ISO 27001 because every cyber security job asking this
@ajoyjohn14872 жыл бұрын
best vdo
@RealCyberCrime2 жыл бұрын
I work as a blue teamer at my job, but love seeing on the other side of the fence. You will not evade my defenses >:)
@HackerSploit2 жыл бұрын
I can try :)
@harshgupta19112 жыл бұрын
Hlo sir i am from India 🙏🏻 Plz would u help me how would i start my journey in cybersec field
@greyhatsecurity2 жыл бұрын
yaaaay!!!!! its been a while
@onlinewebsites34762 жыл бұрын
Yo finally !
@dameonjensen2 жыл бұрын
Where in the hell is the link my man
@PetritK102 жыл бұрын
Where are Web Pentesting videos :D
@sureshk92972 жыл бұрын
Hi bro, my laptop hacked plz help me
@ahmedsahaladamhassan85082 жыл бұрын
Did you stop the WebApp series Sir
@YoutubePremiumBot2 жыл бұрын
let me come in top10
@firosiam77862 жыл бұрын
Guess the webapp series got pushed back
@kasta8519842 жыл бұрын
Great video. I've tried to do the same, but my Antivirus detected this and blocked it.
@PolrisTired Жыл бұрын
Yeah, it seems to work on windows defender but many modern AVs are sophisticated enough to pick up on simple cases like these