All-Army CyberStakes! Decrypting LUKS

preview_player
Показать описание
Рекомендации по теме
Комментарии
Автор

Just to be sure:
luksOpen will normally put things to /dev/mapper/<name you choose> and not to /media/<user>. The thing shown under /media/<user> is handled by the OS and will not happen in a headless terminal.

somebodystealsmyname
Автор

Loving the videos John. Very informative keep it up :)

ripmeep
Автор

You probably already know this but if you forget to run a command as sudo, you can type sudo !! And it runs the previous command as sudo 😁

Laflamablanca
Автор

Of course you were about to name the file "lucky"

karmanyaahm
Автор

Got a little heart attack by the title
Would be a hussle to reencrypt all my devices

Phillip
Автор

binwalk did not detect any luks in the "image.bin" showing only the 0 entry: linux ext4 but not the entry: luks (using wsl2 kali) ... I don't know why ?

jackstrider
Автор

John, Awesome tutorials. I’ve learnt a lot from your videos. Thank you.
Would you be making video for Cookie Monster?

mamagarmiza
Автор

Dude! Love your videos!!! Keep at it, you're freaking amazing!!

reaperkilledyou
Автор

How do you implement / work around proxy bans when using gobuster or other similar tools? I have a web scrapper and after I hit a site X amount of times rapidly my request get temporarily banned. Any suggestions?

tannercampbell
Автор

You well done it, and that's cool to share again. I work on fedora and i almost compile each application you use from sources. And my question is, do you do so on your ubuntu, or you just apt install each softs ?

maxali
Автор

I have sent you an email regarding Caesar Ciphers in Python. Any response would be greatly appreciated 😊.

Shawn-onej