- 94
- 310 467
Daniel Lowrie
United States
เข้าร่วมเมื่อ 1 เม.ย. 2021
Cybersecurity, hacking, certifications, mentoring, programming, red teaming, etc. All these things require you to be constantly learning, but how does one do that effectively? This channel is dedicated to an 'organic' learning style where I will be experimenting with and learning interesting things related to cybersecurity. My hope is that by sharing my curiosity, thoughts, opinions, successes, and failures, we will all grow in our understanding and passion for all things cybersecurity.
Physical Pentest Tools - Favorite Cyber News Sources - CyberCast IRL - Ep. 10
Welcome to CyberCast IRL where we discuss cybersecurity related topics such as certifications, jobs, skills, tools, tactics, news and more. Feel free to ask questions, too!
#cybersecurity #cyberdefense #informationsecurity #infosec #cybersecuritytraining #cyber #hacking #hacker #hackers #ethicalhacking #ethicalhackers #ethicalhacker #computersecurity #networksecurity #redteam #ceh #certifiedethicalhacker #kalilinux #blueteam #digitalforensics #programming #securecoding #bugbounty #bugbountytips #hardwarehacking #iotsecurity
#cybersecurity #cyberdefense #informationsecurity #infosec #cybersecuritytraining #cyber #hacking #hacker #hackers #ethicalhacking #ethicalhackers #ethicalhacker #computersecurity #networksecurity #redteam #ceh #certifiedethicalhacker #kalilinux #blueteam #digitalforensics #programming #securecoding #bugbounty #bugbountytips #hardwarehacking #iotsecurity
มุมมอง: 695
วีดีโอ
Connect to UART with Bus Pirate
มุมมอง 1.6Kหลายเดือนก่อน
A Bus Pirate is a great tool for connecting to UARTs, but understanding how to connect the Bus Pirate to your UART can be a bit confusing for the beginner. In this video, we'll look at how to physically connect the Bus Pirate to your UART, walk through accessing the Bus Pirate command menu, and establishing a serial connection with the embedded OS via the UART of a wireless router. Link to vide...
I Created a Custom Exploit for a CRITICAL VULN in GeoServer
มุมมอง 7854 หลายเดือนก่อน
I Created a Custom Exploit for a CRITICAL VULN in GeoServer
HACKING a CRITICAL VULN in IVANTI VTM! DEMO of AUTH BYPASS to CREATE ROGUE ADMIN account!
มุมมอง 5155 หลายเดือนก่อน
HACKING a CRITICAL VULN in IVANTI VTM! DEMO of AUTH BYPASS to CREATE ROGUE ADMIN account!
HACKING RCE VULN in APACHE OFBiz DEMO
มุมมอง 6546 หลายเดือนก่อน
HACKING RCE VULN in APACHE OFBiz DEMO
Is T-POT The ULTIMATE HONEYPOT Platform?
มุมมอง 6K6 หลายเดือนก่อน
Is T-POT The ULTIMATE HONEYPOT Platform?
The C2 Matrix Lead Me To THIS PENTESTING DISTRO!
มุมมอง 2Kปีที่แล้ว
The C2 Matrix Lead Me To THIS PENTESTING DISTRO!
SQL Injection Login Bypass - PortSwigger Web Security Academy Series
มุมมอง 2Kปีที่แล้ว
SQL Injection Login Bypass - PortSwigger Web Security Academy Series
Basic SQL Injection - PortSwigger Web Security Academy Series
มุมมอง 1.4Kปีที่แล้ว
Basic SQL Injection - PortSwigger Web Security Academy Series
OS Command Injection - PortSwigger Web Security Academy Series
มุมมอง 928ปีที่แล้ว
OS Command Injection - PortSwigger Web Security Academy Series
Content Restriction Upload Bypass - PortSwigger Web Security Academy Series
มุมมอง 655ปีที่แล้ว
Content Restriction Upload Bypass - PortSwigger Web Security Academy Series
RCE via Web-Shell Upload - PortSwigger Web Security Academy Series
มุมมอง 1.4Kปีที่แล้ว
RCE via Web-Shell Upload - PortSwigger Web Security Academy Series
SSRF Against Back-End Server - PortSwigger Web Security Academy Series
มุมมอง 764ปีที่แล้ว
SSRF Against Back-End Server - PortSwigger Web Security Academy Series
SSRF Against Local Server- PortSwigger Web Security Academy Series
มุมมอง 903ปีที่แล้ว
SSRF Against Local Server- PortSwigger Web Security Academy Series
2FA Bypass - PortSwigger Web Security Academy Series
มุมมอง 1.2Kปีที่แล้ว
2FA Bypass - PortSwigger Web Security Academy Series
Hack URL-Controlled User IDs & Reveal Masked Passwords - PortSwigger Web Security Academy Series
มุมมอง 995ปีที่แล้ว
Hack URL-Controlled User IDs & Reveal Masked Passwords - PortSwigger Web Security Academy Series
Brute Force Enumeration of Username & Password - PortSwigger Web Security Academy Series
มุมมอง 1.8Kปีที่แล้ว
Brute Force Enumeration of Username & Password - PortSwigger Web Security Academy Series
IDOR Hacking For Privilege Escalation - PortSwigger Web Security Academy Series
มุมมอง 1.3Kปีที่แล้ว
IDOR Hacking For Privilege Escalation - PortSwigger Web Security Academy Series
Cookie Tamper to Access Admin Portal - PortSwigger Web Security Academy Series
มุมมอง 1.6Kปีที่แล้ว
Cookie Tamper to Access Admin Portal - PortSwigger Web Security Academy Series
Unpredictable Admin URL - PortSwigger Web Security Academy Series
มุมมอง 1.6Kปีที่แล้ว
Unpredictable Admin URL - PortSwigger Web Security Academy Series
Unprotected Admin Portal - PortSwigger Web Security Academy Series
มุมมอง 2.1Kปีที่แล้ว
Unprotected Admin Portal - PortSwigger Web Security Academy Series
Path Traversal Lab Walkthrough using Browser Dev Tools- PortSwigger Web Security Academy Series
มุมมอง 13Kปีที่แล้ว
Path Traversal Lab Walkthrough using Browser Dev Tools- PortSwigger Web Security Academy Series
Path Traversal Lab Walkthrough using Burp Suite CE - PortSwigger Web Security Academy Series
มุมมอง 5Kปีที่แล้ว
Path Traversal Lab Walkthrough using Burp Suite CE - PortSwigger Web Security Academy Series
Super Fun Chat-GPT CTF - "Gandalf" by Lakera.AI
มุมมอง 2.8Kปีที่แล้ว
Super Fun Chat-GPT CTF - "Gandalf" by Lakera.AI
Build A Buffer Overflow Exploit To Learn Golang - Project-Based Learning
มุมมอง 2.1Kปีที่แล้ว
Build A Buffer Overflow Exploit To Learn Golang - Project-Based Learning
#WeeklyCTI - Camaro Dragon: State-Sponsored APT
มุมมอง 526ปีที่แล้ว
#WeeklyCTI - Camaro Dragon: State-Sponsored APT
Which Web Dir Fuzzer Would You Choose? - Gobuster vs. Feroxbuster
มุมมอง 2.4Kปีที่แล้ว
Which Web Dir Fuzzer Would You Choose? - Gobuster vs. Feroxbuster
#WeeklyCTI - XWorm Malware Analysis - Part 2 - What's up with these .EXEs?
มุมมอง 542ปีที่แล้ว
#WeeklyCTI - XWorm Malware Analysis - Part 2 - What's up with these .EXEs?
#WeeklyCTI - XWorm Malware Analysis - Part 1 - Let the obfuscations begin!
มุมมอง 1.4Kปีที่แล้ว
#WeeklyCTI - XWorm Malware Analysis - Part 1 - Let the obfuscations begin!
Thank you for sharing Daniel
Happy to do it and thanks for watching and hanging out with me 😊
#TeamSC
#TeamSC shows up! 💯💪
Yeah I miss the technado talks with Sophia
We will never forget.
Gibson Les Paul in the background, cyber security, Transformers t-shirt. This dude is basically me in 10 years 😳😳
Living the dream 😁👍
For Team Replay main content starts at 18:00 🙂
Thanks for that. I'll make sure to add the timestamps 👍
What if I don't have the port forwarding feature in my router, can I do it using a certain tool ?
@@mobad_life - great point! Some devices don't have this capability. In that case, ngrok is a great tool for accomplishing this task 👍💯
@daniellowrie Appreciate your answer, you're the best!
#TeamSC **You are now listening to the Velveteen Beard**
@@CyberPenguinAI - I like it 😀💯👍
Now that you mention voice, first time i saw your videos I thought I discovered OTW 😅
@@bobanmilisavljevic420 - OTW does have a great voice👍
#TeamSC playing catchup today.
@@terrencebanks8862 - awesome! Thanks for watching 💯👍
its great to see you managed to move on from ITprotv, your TH-cam content is amazing
Much appreciated, David! Glad to hear that you're enjoying the show and thanks for watching 😀💯👍
@Daniel Lowrie jsut got my Alfa Adapter, I have started wifi hackig lab in the house
Awesome, denk! Nothing like spinning up a lab and being able to try all the hacky things! Love it 👍💯💪😎
@ thnx for sharing your thoughts and insights with us 😇😇
I have to catch the replay but I love the energy you bring to your show! Discovered your content over a year ago with your previous job, so I’m stoked you have your own platform!!
Thanks, Ghost_Cypher! Glad to hear you're enjoying the show 💯👍
Did you have a full beard in 10th grade?
🤣 Actually, I wasn't able to grow a full beard until I reached my mid 20s, but I did know a guy in 10th grade that had a full beard. 🧔
@ lol
Drinking 1 monster per week is your "Sometimes" drink is more than fine, you enjoy that Monster
@@networkhaz - it is one of my guilty pleasures in life and I DO enjoy it💯
Dang - Work got in the way - My employees said it was a great show - now its time for coffee and watch the replay - lol
@@WHVglenn - no worries! Sorry you missed it, but awesome hear that your employees enjoyed it! Thanks to all for watching 👍💯🙏
where do I find the update ISO. Everything I tried didn't work
Hey, mrperson! I hope you are well. I don't see an ISO for it either. Looks like this may only make this available as a container. Looking through the 'install.sh' script, I see references to Ansible playbooks and the docker-compose.yml file. I hope that helps and let me know if you ever find an ISO for it. Cheers!
@@daniellowrie thank you! Really valuable video for me.
@@mrperson88 happy to help. Glad to hear you enjoyed the video 🙂
I want to watch online stream! Where and what time by GMT I can do it?
Thanks for watching and to answer your question, the stream is live at 10am ET which I think is 3pm GMT (according to google anyway 😁). Hope to see you there soon!
@@daniellowrie thank you Daniel!
So class very nice nice
Thank you very much for the kind words! And thanks for watching. 💯
I really like your show. Nice job 🦾
Thanks, and thanks for watching!
You rock man! Thanks for keeping doing this.
Thanks! I'm glad to hear that you're enjoying my content and thanks for watching 👍💯
Hi Daniel. Content is awesome. Could you enable subtitles. Could be a plus. You speak awesome English but might benefit some if you could enable sub titles
Hey Mike, thanks for letting me know that the Closed Captioning wasn't enabled. I have enabled them, so they should show up as soon as TH-cam catches up.
@@daniellowrie It's working now.
is this on spotify
@@joshuampere4327 not yet. I am looking into putting these on podcast outlet like Spotify and others, but haven't really had the time yet.
#TeamSC
@@terrencebanks8862 #teamSC much love 💯
Another Must-See Podcast! (or is that Must-Listen?) 😄
I have a face for audio 😁
#TeamSC playing catchup
Thanks for checking in, Terrence! #TeamSC
LAN turtle giveaway would be sick!
Thanks for letting me know 👍💯
Good stuff man. Learned something for sure today. As always! Preciate it.
So glad to hear you're enjoying the show! Thanks for watching 💯
#monster
@@Kerrilyn77 it fuels this cyber machine 😎
Thank you, Daniel.
You're welcome, Calvin.💯
Great video! One question: Is JTAG support equal to version 3.5??
Thanks, George and thanks for watching! Honestly, I'm not sure what kind of JTAG support you get with the Bus Pirate. I feel like I've read somewhere that it can be used to connect/communicate with JTAGs, but I'm just not sure. For JTAG, I would really look into to the JTAGulator. It's a bit pricy, but it is a great piece of kit for the serious hardware enthusiast.
@daniellowrie Thank you very much. I will take your advice, since my research also shows that only lower versions of the most recent firmware allow use of the JTAG protocol, although the specifications mention otherwise. I think I should take your advice and buy the JTAGulator. Thank you very much.
I am totally game for winning a LAN turtle
Thanks for letting me know that you're interested 🙂👍
I have multiple RPIs and a couple arduinos. I love hardware and tools. My new years resolution is to get back to playing with hardware. I started out as a 'maker' and now a 'hacker'. I would love to see more projects from the channel.
Playing with hardware is too much fun for sure! I've got a couple of ideas that I'm hoping to turn into content. Should be a good time 😊👍💯
i love the hardware stuff, i have also a lot of raspberry pi's, omg cable and all the good stuff. what i want to make is a raspberry pi, with a mobile hotspot attached, so i use the hotspot to connect back to me and then plug the raspberry pi to the other network, so i have a connection to the network, without going over the other network. :)
That sounds like a great idea! 👍💯
😃👍.
@@carsonjamesiv2512 🙏💯
I thought you were talking about The one starring Milla Tomdonovic(my spelling errors).😂
@@carsonjamesiv2512 😁💯
Turtles! I love turtles 😉
@@--Morpheus-- I really enjoy those mutant ones that know karate😁
@daniellowrie not the geriatric ones, the teenager ones right?
@@--Morpheus-- nailed it 💯👍😎
Domo!
@@Nameless2k6 Doitashimashte! 😁
I am excited to see what Daniel does for 2025, the giveaways sound great!
@@parisgatsby right on! I think it will be fun 💯
What a great concept, Daniel comments on himself while he watches, Mystery Science Theater!!!
@@waynesrealworld5801 I am a HUGE MST3K fan! 😁
Great stuff, earned my sub. One thought though. Could you use this technique and use a meterpreter/reverse_tcp exploit through METASPLOIT for the same effect except create a meterpreter shell?
Try obfuscation
Thanks for the suggestion! Any specific obfuscation tools/techniques that you'd recommend? (I just did some manual obfuscation for this script, but for the future version I'm thinking about encrypting the payloads or a slice/recombine technique)
Ditto on thanks for the review. I've got a BP v3.6 from 2012. I haven't used it in almost 10 yrs. Somehow I suspect that MOSI and MISO have different meanings these days as opposed to back then. Maybe something like "Main" Output "Subordinate" Input, and "Main" Input "Subordinate" Output?
Since doing this video I've been looking at the latest v5 Bus Pirate. Looks super cool! I've gotta stop looking at gear, before the wallet comes out LOL
Thank you for doing a video on the bus pirate. I've owned mine for over 5 years now, and when ever I go to use it I forget how I used it before and nobody has done a good video on it. The only videos I do have are from high level hardware hackers. Never seen a video from you before, but for doing this this video deserves a subscribe. I originally bought mine to hack one piece of hardware and I've only used it a few times since. I use my Arduino UART writer more when the bus pirate is better for doing the same thing.
I'm so glad to hear that you enjoyed the video and a huge THANKS for the sub! 💪💯
You do such a great job explaining these things you made me make the connection between hardware electronics and cybersecurity
I'm so glad I was able to help you make the connection, Brian! 👍💯
#TeamSC
I can dig it! 💪
Im kinda surprised the manufacturer doesn’t remove those pins when they sell their product.
@@klr607 I think they do remove the UARTs sometimes, but many times there are 4 unmarked holes in the PCB. Sometimes they even have the header pins in them or a molex. 🤷
I also read: If a device’s firmware becomes corrupted or the router is bricked, the UART interface allows recovery by accessing a low-level command-line interface (CLI).
@klr607 can confirm 😅
#TeamSC
#TeamSC
Happy New Year @DanielLowrie! Missing you and Sophia on Technado. I'm currently working thru the CompTIA Security+ and love seeing the banter between you and Sophia on that. Keep up the good work, bro.
@@DamoQuinn me too. Sad to think about how things went down. Technado was really starting to get fun and I worked with Sophia for the better part of 3 years. Glad to hear that you're enjoying the content though. I hope it's a help for you in passing the exam 👍💯
@daniellowrie I'm aiming to get the course passed by the end of the year. Although I hope that it'll be before the year leaves us. If you know what I mean.
is this a two part video? you showed connecting it to a computer over serial but was also expecting to see it being connected to a system board.
@@iblackfeathers there's a link in the description 👍
Nice, I have to try this now.
@@waynesrealworld5801 go for it, Wayne! After a week you'll have taken apart every electronic device in the house 🤣