- 87
- 14 800
9cesec
เข้าร่วมเมื่อ 13 ม.ค. 2024
Hi, Welcome to 9cesec. I'm using this channel to journal my progress as i dive into the world of cybersecurity.
Most of my content will be from Tryhackme.com, and I will be sharing what I've learnt and learning.
REPETITION IS THE MOTHER OF SUCCESS.
Most of my content will be from Tryhackme.com, and I will be sharing what I've learnt and learning.
REPETITION IS THE MOTHER OF SUCCESS.
CROSS-SITE SCRIPTING(XSS) | METASPLOITABLE 2
In this video, I walked through some penetration testing techniques for exploiting cross-site scripting(XSS) vulnerability using Metasploitable 2 DVWA machine.
This video is a form of journal and a way I practice what I've learnt.
▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬
DISCLAIMER:
This video is for educational purposes only and demonstrates general penetration testing techniques and procedures. I cannot be held responsible for any damage caused to your computer or software by following these steps. Use this information at your own risk. It is always advisable to seek professional assistance if you are not comfortable performing these procedures yourself. Additionally, some software and tools featured in this video may have specific licensing requirements or limitations. Please ensure you are using them in accordance with their respective terms of use.
▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬
#XSS #metasploitable #pentesting #php #linux #tutorial
0:00 Intro
0:50 What is cross-site scripting XSS?
1:37 How does XSS work?
3:05 Reflected XSS
3:40 Stored XSS
4:23 DOM-Based XSS
6:31 Reflected XSS Lab
8:00 Stored XSS Lab
10:28 Preventing XSS Attack
#XSS #XSS #metasploitable #linux •#webexploitation •#secureshell •#linuxtowindows •#browser •#burpsuite •#curls •#web •#cybersecurity •#offensivesecurity •#hacking
- - -
tryhackme ethicalhacking cybersecurity cybersec hacking informationsecurity pentesting ethicalhacking cybersecuritytraining learnhacking tryhackmecommunity tryhackmerooms cyberwarriors cyberattack cyberdefense cyberthreats cybercrime cyberawareness cyberhygiene cybersavvy cybereducation cyberskills linuxcommunity linuxusers linuxenthusiasts linuxmastery cyberninjas ninjaskills linuxsecrets hiddenfiles shellscripting capturetheflag adventofcyber attacksurfacereduction securityposture networksecurity cybersecurityprofessional phishing dosattacks vulnerabilityexploitation firewall intrusiondetection patchmanagement cyberdefence cyberresilience cybercrime informationsecurity cyberthreats cyberattack cyberprotect
kali linux
linux
nmap
ssl
http
https
ssh
telnet
chargen
port
port numbers
wireshark
- - -
This video is a form of journal and a way I practice what I've learnt.
▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬
DISCLAIMER:
This video is for educational purposes only and demonstrates general penetration testing techniques and procedures. I cannot be held responsible for any damage caused to your computer or software by following these steps. Use this information at your own risk. It is always advisable to seek professional assistance if you are not comfortable performing these procedures yourself. Additionally, some software and tools featured in this video may have specific licensing requirements or limitations. Please ensure you are using them in accordance with their respective terms of use.
▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬
#XSS #metasploitable #pentesting #php #linux #tutorial
0:00 Intro
0:50 What is cross-site scripting XSS?
1:37 How does XSS work?
3:05 Reflected XSS
3:40 Stored XSS
4:23 DOM-Based XSS
6:31 Reflected XSS Lab
8:00 Stored XSS Lab
10:28 Preventing XSS Attack
#XSS #XSS #metasploitable #linux •#webexploitation •#secureshell •#linuxtowindows •#browser •#burpsuite •#curls •#web •#cybersecurity •#offensivesecurity •#hacking
- - -
tryhackme ethicalhacking cybersecurity cybersec hacking informationsecurity pentesting ethicalhacking cybersecuritytraining learnhacking tryhackmecommunity tryhackmerooms cyberwarriors cyberattack cyberdefense cyberthreats cybercrime cyberawareness cyberhygiene cybersavvy cybereducation cyberskills linuxcommunity linuxusers linuxenthusiasts linuxmastery cyberninjas ninjaskills linuxsecrets hiddenfiles shellscripting capturetheflag adventofcyber attacksurfacereduction securityposture networksecurity cybersecurityprofessional phishing dosattacks vulnerabilityexploitation firewall intrusiondetection patchmanagement cyberdefence cyberresilience cybercrime informationsecurity cyberthreats cyberattack cyberprotect
kali linux
linux
nmap
ssl
http
https
ssh
telnet
chargen
port
port numbers
wireshark
- - -
มุมมอง: 12
วีดีโอ
Advent of Cyber 2024 | Introduction {Tryhackme}
มุมมอง 38214 ชั่วโมงที่ผ่านมา
Advent of Cyber 2024 - Dive into the wonderful world of cyber security by engaging in festive beginner-friendly exercises every day in the lead-up to Christmas! Here I walkedthrough the introduction room for the upcoming advent of cyber 2024. Sign up on Tryhackme: tryhackme.com/signup?referrer=656cbbd3fafb242fa32c741c Follow along for free at tryhackme.com/r/room/adventofcyber2024 This video is...
SMTP Penetration Testing on Metasploitable 2 | Port 25
มุมมอง 48214 วันที่ผ่านมา
SMTP - Simple Mail Transfer Protocol is a protocol mostly used to send and receive emails in a network via Port 25. Here I walked through some penetration testing techniques for the SMTB protocol port 25 on Metasploitable 2 Vulnerable machine. This video is a form of journal and a way I practice what I've learnt. ▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬ DISCLAIMER:This video is for educational purposes only a...
PICOCTF2024 | VERIFY | SCAN SURPRISE - Challenge Walkthrough
มุมมอง 5214 วันที่ผ่านมา
Verify & Scan Surprise is a PicoCTF2024 CTF challenge from the PICOCTF website play.picoctf.org/ In this video, I walked-through the challenge showing how to get the flag. You can follow through via play.picoctf.org/practice/challenge/450 & play.picoctf.org/practice/challenge/444 This video is a form of journal and a way I practice what I've learnt. ▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬ DISCLAIMER:This vid...
SMB(SAMBA) Penetration Testing on Metasploitable 2 (Port 139 & 445) | PART 2
มุมมอง 14314 วันที่ผ่านมา
SMB - Server Message Block is a protocol mostly used to transfer files between a windows network using TCP/IP connections via Port 139/445. This is a sequel to SMB(SAMBA) Penetration Testing on Metasploitable 2 (Port 139 & 445) video. Here I walked through some penetration testing techniques for the SMB/SAMBA protocol port 139/445 on Metasploitable 2 Vulnerable machine. This video is a form of ...
SMB(SAMBA) Penetration Testing on Metasploitable 2 (Port 139 & 445)
มุมมอง 14221 วันที่ผ่านมา
SMB - Server Message Block is a protocol mostly used to transfer files between a windows network using TCP/IP connections via Port 139/445. Here I walked through some penetration testing techniques for the SMB/SAMBA protocol port 139/445 on Metasploitable 2 Vulnerable machine using metasploit, nmap and searchsploit tools. This video is a form of journal and a way I practice what I've learnt. ▬▬...
PICOCTF | COOKIES & SCAVENGER HUNT - Challenge Walkthrough
มุมมอง 5021 วันที่ผ่านมา
Cookies & Scavenger Hunt are CTF challenges from the PICOCTF website play.picoctf.org/ In this video, I walked-through the challenge showing how to get the flag. You can follow through via play.picoctf.org/practice/challenge/173 & play.picoctf.org/practice/challenge/161 This video is a form of journal and a way I practice what I've learnt. 0:00 Intro 0:10 Cookies 7:01 Scavenger Hunt #burpsuite ...
COMMAND EXECUTION | METASPLOITABLE 2
มุมมอง 147หลายเดือนก่อน
In this video, I walked through some penetration testing techniques for exploiting command execution vulnerability using Metasploitable 2 DVWA machine. This video is a form of journal and a way I practice what I've learnt. ▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬ DISCLAIMER: This video is for educational purposes only and demonstrates general troubleshooting techniques and procedures. I cannot be held respons...
FILE UPLOAD VULNERABILITY | METASPLOITABLE 2
มุมมอง 209หลายเดือนก่อน
In this video, I walked through some penetration testing techniques for exploiting file upload vulnerability using Metasploitable 2 DVWA machine. This video is a form of journal and a way I practice what I've learnt. ▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬ DISCLAIMER: This video is for educational purposes only and demonstrates general troubleshooting techniques and procedures. I cannot be held responsible f...
PICOCTF | RUNME.PY - Challenge Walkthrough
มุมมอง 28หลายเดือนก่อน
Runme.py is a CTF challenge from the PICOCTF website play.picoctf.org/ In this video, I walked-through the challenge showing how to get the flag. You can follow through via play.picoctf.org/practice/challenge/250 This video is a form of journal and a way I practice what I've learnt. #python #pythonscript #wget #CSS #JS #webexploitation #php #burpsuite •#curls •#web •#cybersecurity •#offensivese...
PICOCTF | UNMINIFY - Challenge Walkthrough
มุมมอง 38หลายเดือนก่อน
Unminify is a CTF challenge from the PICOCTF website play.picoctf.org/ In this video, I walked-through the challenge showing how to get the flag. You can follow through via play.picoctf.org/practice/challenge/426 This video is a form of journal and a way I practice what I've learnt. #sourcecode #unminify #HTML #CSS #JS #webexploitation #php #burpsuite •#curls •#web •#cybersecurity •#offensivese...
FTP Penetration Testing on Metasploitable 2 (Port 21)
มุมมอง 300หลายเดือนก่อน
File Transfer Protocol(FTP) is a file transfer protocol, used to transfer files between a network using TCP/IP connections via Port 20/21. This is a sequel to FTP Penetration Testing on Ubuntu (Port 21) video. Here I walked through some penetration testing techniques for the FTP protocol port 21 on Metasploitable 2 Vulnerable machine. This video is a form of journal and a way I practice what I'...
FTP Penetration Testing on Ubuntu (Port 21)
มุมมอง 2132 หลายเดือนก่อน
File Transfer Protocol(FTP) is a file transfer protocol, used to transfer files between a network using TCP/IP connections via Port 20/21. FTP works as just like HTTP and SMB protocols. When the FTP server is configured in a network then a specific folder is defined as a shared folder in order to share files. Users can access this file server via FTP. Here I walked through some penetration test...
PICOCTF | INSP3CT0R - Challenge Walkthrough
มุมมอง 422 หลายเดือนก่อน
Insp3ct0r is a CTF challenge from the PICOCTF website play.picoctf.org/ In this video, I walked-through the challenge showing how to get the flag. You can follow through via play.picoctf.org/practice/challenge/18 This video is a form of journal and a way I practice what I've learnt. #HTML #CSS #JS #webexploitation #php #burpsuite •#curls •#web •#cybersecurity •#offensivesecurity •#hacking ▬▬▬▬▬...
SSH Penetration Testing (Port 22) | Part 2
มุมมอง 3052 หลายเดือนก่อน
Secure Shell (SSH) is a cryptographic protocol, this is a method for securely interacting with a computer over an unsecured network. Here I continued through some penetration testing techniques for the SSH protocol port 22 specifically on key based authentication. This video is a form of journal and a way I practice what I've learnt. ▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬ DISCLAIMER: This video is for educa...
PICOCTF | SOAP - Challenge Walkthrough
มุมมอง 1112 หลายเดือนก่อน
PICOCTF | SOAP - Challenge Walkthrough
PICOCTF | WEBDECODE - Challenge Walkthrough
มุมมอง 852 หลายเดือนก่อน
PICOCTF | WEBDECODE - Challenge Walkthrough
ARTSY COMMANDS | How To Get Creative In The Linux Terminal
มุมมอง 582 หลายเดือนก่อน
ARTSY COMMANDS | How To Get Creative In The Linux Terminal
PICOCTF | INCLUDES - Challenge Walkthrough
มุมมอง 512 หลายเดือนก่อน
PICOCTF | INCLUDES - Challenge Walkthrough
PICOCTF | INSPECT HTML - Challenge Walkthrough
มุมมอง 412 หลายเดือนก่อน
PICOCTF | INSPECT HTML - Challenge Walkthrough
PICOCTF | LOCAL AUTHORITY - Challenge Walkthrough
มุมมอง 883 หลายเดือนก่อน
PICOCTF | LOCAL AUTHORITY - Challenge Walkthrough
PICOCTF2024 | TIME MACHINE - Challenge Walkthrough
มุมมอง 1013 หลายเดือนก่อน
PICOCTF2024 | TIME MACHINE - Challenge Walkthrough
0 - DVWA{DAMN VULNERABLE WEB APPLICATION} | INTRO AND SETUP
มุมมอง 823 หลายเดือนก่อน
0 - DVWA{DAMN VULNERABLE WEB APPLICATION} | INTRO AND SETUP
PICOCTF2024 | TRICKSTER - Challenge Walkthrough
มุมมอง 1.2K3 หลายเดือนก่อน
PICOCTF2024 | TRICKSTER - Challenge Walkthrough
HYDRA - How to Use Hydra to Bruteforce Passwords {TRYHACKME}
มุมมอง 2.6K3 หลายเดือนก่อน
HYDRA - How to Use Hydra to Bruteforce Passwords {TRYHACKME}
PICOCTF2024 | IntroToBurp - Challenge Walkthrough
มุมมอง 1353 หลายเดือนก่อน
PICOCTF2024 | IntroToBurp - Challenge Walkthrough
FILE TRANSFER | How to transfer files from WINDOWS to LINUX | Part 2
มุมมอง 643 หลายเดือนก่อน
FILE TRANSFER | How to transfer files from WINDOWS to LINUX | Part 2
FILE TRANSFER | How to transfer files from WINDOWS to LINUX | Part 1
มุมมอง 2553 หลายเดือนก่อน
FILE TRANSFER | How to transfer files from WINDOWS to LINUX | Part 1
what is the last question answer ?
It will be unlock on December 1st at 16.00 GMT
what was the last answer to submit?
No answer yet until the 1st of December. It will be available to answer by then.
Great video. Lots of good advice. Can you do a video on NMAP / Gobuster / Dirbuster? Using them together and what the thought process is when you find something open? I like the unedited aspect and showing you trying to figure out why something is not working.
Thank you and I appreciate your comment. I will try to make a video on the requested tools much later.
hey i love ur video and its explained really well
Thank you and I appreciate you.
Can you create a video on custom exploit creation
You mean like creating your own exploits for a CTF??
i like your videos!!! keep making those videos for me watch you channel😅
Thank you, I really appreciate your comment😁 And yes I will continue.
what tool pentester use before burpsuite invented?
Not quite sure butt I think it's Nessus.
Thanks man. Love your content, subscribed! Would love to see you do more THM stuff too!
I appreciate you. Yeah more THM coming soonest. Thank you.
clear explanation michael !!! great
Glad it was helpful!
tq
🤝
the discord invite link inside your channel info is invalid
Thank you for that. The link was expired. It's now updated and here is the link as well. discord.gg/wGTJQ3QG
Very Useful 🙌
curl is a nice tool !
Insightful 👍
Thank you🙏
thank you , very helpful <3
You are welcome.
what requirements to run hydra sir, does it need a network adapter for "hacking"?
Did u knew?
No. It doesn’t. It is a tool for online cracking. Adapter is for Wi-Fi. Read more about them
I write cd PicoCFT and its shows ,no such file or directory, what can i do? Please help
That's a folder or directory i created before the video. if you want to follow the exact same steps then create the follow with this command > mkdir PicoCFT
@@9cesec.1 you save me
Thanks man
Good Series, very helpful :)
Thank you
so you are coming in
Hi, i love your videos Very nice explanation, keep it up.
Thank you for your kind words
Nice Video.
Nice video
Awesome man thanks ❤
Thank you
Nice video has been learning a lot
I'm glad to hear that👍
Awesome video. keep it up.
nice
Thank you❤
Nice video❤
Awesome video
Nice video❤
Thank you.
Keep it up.
Thank you. I will.
'Promosm' 😱
nice
Thank you
😔 promo sm