Pentesting for n00bs: Episode 10 - Netmon

preview_player
Показать описание
Get my:

In this episode, we cover episode Netmon from Hack the Box!

❓Info❓
___________________________________________

🔹The Cyber Mentor Merch🔹
___________________________________________

📱Social Media📱
___________________________________________

💸Donate💸
___
Like the channel? Please consider supporting me on Patreon:

Hacker Books:

My Build:

My Recording Equipment:

Рекомендации по теме
Комментарии
Автор

I hope you enjoyed this video! If so, please consider dropping a like and subscribing. <3

TCMSecurityAcademy
Автор

Dude please keep making these. The way you explain thought processes and walk through methodologies without just performing them and leaving the rest to the viewer is unprecedented. There is no one else doing this. I’m going to support you however I can as long as you do this. Looking into that udemy course now. THANK you man

the_terrorizer
Автор

From my interactions with your web and this observing your style I think you have a particular talent for teaching "n00bs" ... obviously you have the skills but you're also deliberate and thorough about explaining procedures, move at a reasonable pace (that's rare...lol) and your gentle voice/demeanor is also reassuring. Thanks!!! We need you!

blackthorne-rose
Автор

Thanks Heath, I really appreciate this free course. It is the best starting point that anyone could ask for. I have signed up for your Ethical Hacking and both privesc udemy courses. Your teaching technique is right up there with the best that I have encountered. You do not try to over complicate things just to make yourself sound better than everyone else. Thank you again.

michaelcabz
Автор

i respect your way of Explaining and teaching without missing important stuff like installing app not pre-installed in kali even kali 2020
really hats off

Eplusagency
Автор

i just finished the series till now. hope new vids will come soon. Thanks for the whole series Cyber Mentor.

johnsnow
Автор

Loved the vid keep it up! I was stuck for the longest time as I found the configuration.dat under C:\Windows and was confused as everything was encrypted. looked for hidden directories in all the wrong places lol eventually found it in program data but couldn't get the exploit working even following along with your video it said it created the user pentest but I couldn't get in. Turns out I was giving it all the cookies (my burp captured _ga and _gid alongside OCTOPUS) and for some reason only giving it OCTOPUS was the only way to make it work :shrug: I tested out wmiexec, smbexec and psexec afterwards and learned a lot! I can see why psexec is used more often due to it's fully interactive shell and while smbexec worked I couldn't cd. I didn't have issues with wmiexec though. all in all, awesome vid!

LTTechReviewer
Автор

what a wonderful series of lessons. Thank you so much !!! ...I hope you are coming with somewhat intermediate HTB machines soon.

kaleababdurahman
Автор

I just finished all ten HTB videos, taking detailed notes for each one to try to reinforce the concepts and techniques. I feel like I have some of the skills that you need to be successful for a HTB machine (on the non-VIP machines), but get stuck most of the time when I try because I can't think of what to do next. This series is helping me to think about the steps of the process more logically and to plan out what needs to be done. Can't wait for the next HTB video!

blegism
Автор

This series has been so much fun to watch. Thank you for all this. BTW as you mentioned in the last episode these aren't super realistic, is the harder machines more practical or do you have another suggestions?

amirmesbah
Автор

thank u for all ur efforts, helped me alot
hope u continue this great series

mmdbziz
Автор

You have technical expertise as well as good teaching skills too👍.Thank you so much for your videos.Could you give us intro to cloud pentest ? Just curious.

hemav
Автор

Thanks mate! was looking for an alternative to metasploit. Love your work, very informative especially for someone like me who just got started with N/W Pentesting. Cheers.

localtestinghost
Автор

Sir please continue this series plz sir it helps a lot

joelpeter
Автор

Thanks a lot for your videos! Highly enjoyed the video.
In the future, would love a lot if you do some videos on some intermediate boxes as well. Like a sequel to the Pentesting for Noobs series. But nonetheless, keep up the great work!

kaifahsan
Автор

12:56 Is there no difference between "Data" and "data", shouldn't it be case-sensitive? It is the name of the directory after all

aldiyark
Автор

Please can you send a list of tools and courses to lear before getting into penetration testing?

rosep
Автор

Well explained as usual, however for the credentials created how can we figure out that they must be used for an smb connections. Nothing seems to say if the credentials can be used on the web page or for fttp per exemple. Someone could explain me please ?

paultv
Автор

Hi can tell while accessing directory in ftp why we need to mention in quotes, because I accessed some normal directories without quotes, but some needed quotes to access, just confused hope u clarify, Thanks in advance

ajaidx
Автор

Thank for sharing !!!In my case im unable to login using user pentest and password as What could be the issue?

aviborse
join shbcf.ru