I have been looking for great content in such areas, and I found out much greater content than I expected. Keep up the good work.
@gjsatru33833 жыл бұрын
Alexis you are rocking your content
@darphaprothon203 жыл бұрын
hey man im new in this world , nice work please keet it going never stop
@poonambisht26973 жыл бұрын
Keep going man ... Content is 🔥
@KA-NV3 жыл бұрын
Very well explained and informative. In the john the ripper part, there are some hashes that are not valid, so l would delete them before trying the cracking.
@Yoyo-qn4mv3 жыл бұрын
you are amazing, and tnq for sharing your knowlage , absolutle better then what I learn in collage XD
@bazcon68913 жыл бұрын
Its very informative content. Thanks a lot brother
@viruldojitha93413 жыл бұрын
Man this serious is awesome...
@simonb89883 жыл бұрын
Love your content. Thanks!
@kadourkadouri3505 Жыл бұрын
I think from win 10, they kinda start to encourage people to use their MSFT or Hotmail credentials in order to login into their machines.
@korovamilkplus Жыл бұрын
As usual, I tested in my lab with the latest updated version of Windows 10. First, it's necessary to make sure to migrate to a 64-bit process with administrator privileges. Initially, I migrated to explorer.exe and nothing worked, then after switching to lsass.exe things changed. In conclusion, I can say that today: Mimikatz, Meterpreter's HashDump command, the Kiwi module, and the credential_collector module work perfectly. The Unattend.xml file is not in the Panther folder. WCE does not work with any parameters. The real problem is creating a payload with MSFvenom that is not detected by Windows Defender to start the attack. Both Shikata Ga Nai and Shellter are immediately detected. Regarding Starkiller, it's easy to evade Windows Defender with Invoke-Obfuscation. The problem is that Windows Defender block the powershell/privesc/bypassuac module. In any case, thank you so much Alexis for this latest fantastic (free) lesson! Your work is invaluable!
@sprBEAST2113 жыл бұрын
Hasn't mimikatz been replaced by or integrated into kiwi?
@HackerSploit3 жыл бұрын
Kiwi is a mterpreter module, Mimikatz is still an independent tool.
@sprBEAST2113 жыл бұрын
@@HackerSploit thank you for the clarification, as well as the great content!
@Derek67653 жыл бұрын
Great content!
@mrniko13403 жыл бұрын
nice work bro
@talib_Bijnori3 жыл бұрын
sir, I'm not able to install metasploitble 2 on my kali Linux , I've been trying for 3 days, I know there is a tutorial on your channel that how to install metasploitble 2, but that was on windows OS, please make a video on installing ms2 on kali Linux, I've stuck on your series (web app penetration testing). Please solve it for me, thank you ❤️
@8080VB3 жыл бұрын
Hey still?? , Contact us on his discord server , we'll help you .
@talib_Bijnori3 жыл бұрын
@@8080VB how ?
@prasantakumar16663 жыл бұрын
Make a video on payload crypters to bypass av detection of Android and windows.
@8080VB3 жыл бұрын
He have already made a vid on that .
@armanagrawal41703 жыл бұрын
Need Part 1 registration link
@talib_Bijnori3 жыл бұрын
Sir you didn't reply Please help me out
@Saint_sheedy2 жыл бұрын
Valuable
@morph25843 жыл бұрын
My soul is mengheker
@mattcargile2 жыл бұрын
Now do it on win server 2019
@biswarupguli62203 жыл бұрын
sir, please make a series on how to successfully hack an Android version 10. Please sir it is humble request to you.