Your Approach to Hacking is WRONG!!

preview_player
Показать описание
-
// CHAPTERS:
0:00 Intro
1:36 Reconnaissance
2:37 Exploitation
3:20 Privilege Escalation
3:48 Leaving a Backdoor
4:13 Extracting Data
4:30 Covering Tracks
-
// Follow Me:
-
FTC Disclosure: This video was sponsored by Brilliant.
Рекомендации по теме
Комментарии
Автор

Being a cyber-security enthusiast for 10+ years now, you make by far some of the best concise videos on the subject I've ever seen!

irxr
Автор

This is the first video I see online, who is really about hacking and not the BS you see online

MygenteTV
Автор

Im learning it from 20 months every month there's a new topic comes there is no end for hacking your way of explaining is awesome 💯💯

Joy_boy.
Автор

This video, while a bit superficial in terms of content depth, is great. The explanation of the attack phases is a great start for anyone that wants to dive into cybersecurity. So, please don't get this comment the wrong way. I meant that without this kind of video/content, many people disregard the holistic/big picture perspective of the process of an attack. Thanks !!! :)

LucasRC
Автор

Thousand of videos but this one is different from all of them it changed my mind I don't have much words to appreciate your work❤❤❤ keep it up bro

rgtechyt
Автор

ok thanks man but we need some more videos that explain attacks like keyboard emulation attack& other attacks and some free resorces to learn that.

bhag
Автор

Thanks Ali, your video's offer a nice overview for aspiring cyber sec experts. Keep on going 💪

VagueWizzard
Автор

Is there books you recommend reading for pentesting?

manwithaplan
Автор

I think you should add penetration testing before the exploitation, that in my opinion, but a great video. We all should be aware of forensics 😂

sevada
Автор

Any youtubers you recommend for a cybersecurity major?

phoenixwhiler
Автор

Hey Ali! Thanks a million. I have watched all of you videos and they have inspired me a lot to explore more! Keep making the difference.

almahmud
Автор

Finally, someone who remind us the Classic paper by Eric S Raymond.

luisestebanruiz
Автор

What's amazing is how what you explain can also be applied to many things other than hacking

Thank you man!

VOTEZIDIOTUTILE
Автор

Im soo hyped for your videos!!! I have an old pc and I try to mess around with it, so I dont damage others property and can learn how to do thing. And im also not destroying my laptop that I use for work, because Im new to the topic and interested but make tooo much errors😅😅

valentinstrock
Автор

Reconnaissance is more or less the most straightforward phase of hacking. Going further will get more technical

arshadcheng
Автор

Bro From Where Will I Start Learning Hacking?

eshan
Автор

So when you talk about the complexity of hacking don't explain what reconnaissance is, and similarly other definitions of basic term. Just talk about what extra info you know about a particular topic. That will be great 👍

tusharwagh
Автор

i mean youtube doesn't really allow real hacking, so most youtubers put some specific idea or scenarios of how the attack is done.
but this video shows the phases of real ethical hacking, so i like this one good content sir and much love.

etachiochiha
Автор

Well your title is a bit wrong cause I been learning everything you said not in order but still learning on these topics and for me the order was something I figured out easy

GameBangStudios
Автор

It was an informative video Ali..subscribing to your channel to learn more! I have one question for you, are you truly working with the Anonymous? Just curious! 😄

thrch