- 54
- 27 020
Offensive Hacking
India
เข้าร่วมเมื่อ 9 ส.ค. 2023
Aloha, I am Harshad Shah, Founder & CEO of Hacker Associate known as a Technologist & also a Technology Motivational Speaker, Sr. Information Security Consultant & Corporate Trainer having Expertise in Latest and High-End Technologies like IoT, Machine Learning, Artificial Intelligence, Splunk, Docker, DevSecOps, AWS, Cloud Computing, Big Data Analytics.
📲: Email: harshadciso@hackerassociate.com
International Hacking Conference Speaker, my InfoSec certification in Penetration Testing includes SANS, Offensive Security, RedHat, EC-Council, ISC2, ISACA, etc. I also initiated "SMS based Penetration Testing" using iPhone and Android.
Along with this, I am also working with Government agencies like the Army, Air Force, Navy, and other Intelligence Defence agencies across the globe. I had started the "Offensive Hacking for Defensive Purposes" for Government agencies.
📲: Email: harshadciso@hackerassociate.com
International Hacking Conference Speaker, my InfoSec certification in Penetration Testing includes SANS, Offensive Security, RedHat, EC-Council, ISC2, ISACA, etc. I also initiated "SMS based Penetration Testing" using iPhone and Android.
Along with this, I am also working with Government agencies like the Army, Air Force, Navy, and other Intelligence Defence agencies across the globe. I had started the "Offensive Hacking for Defensive Purposes" for Government agencies.
DCSYNC Attack: Offensive Active Directory Pentesting
DCSYNC Attack // Active Directory Pentesting // attacking active directory
Welcome to our TH-cam video on DCSync Attack: Offensive Active Directory Pentesting!
🎥 In this highly informative session, we dive deep into the world of Active Directory Pentesting and explore the intriguing technique known as DCSync Attack.
🕵️♂️ We'll provide you with a comprehensive understanding of how this attack works and the associated risks it poses to organizations. 🚨
Throughout the video, we cover various aspects of attacking Active Directory, shedding light on the implications and potential vulnerabilities that can be exploited.
💡 Our expert presenter will share valuable insights into identifying weaknesses in security controls and demonstrate effective defensive measures that can be implemented to safeguard against such attacks.
Official Web:
Website: hackerassociate.com 🔗
📱Social Media📱:
_________________________________________
💼 LinkedIn: in.linkedin.com/company/hackerassociate
💬 Discord: discord.gg/TbRWXZE5xR
🔗 Official Website: hackerassociate.com
🐦 Twitter: harshad_hacker
💬 Telegram: t.me/hackerassociate
#hackerassociate #infosec #hackingcourse #mobileapplications #android #ios #cybersecurity #hackingcourse #iot #cloudcomputing
Welcome to our TH-cam video on DCSync Attack: Offensive Active Directory Pentesting!
🎥 In this highly informative session, we dive deep into the world of Active Directory Pentesting and explore the intriguing technique known as DCSync Attack.
🕵️♂️ We'll provide you with a comprehensive understanding of how this attack works and the associated risks it poses to organizations. 🚨
Throughout the video, we cover various aspects of attacking Active Directory, shedding light on the implications and potential vulnerabilities that can be exploited.
💡 Our expert presenter will share valuable insights into identifying weaknesses in security controls and demonstrate effective defensive measures that can be implemented to safeguard against such attacks.
Official Web:
Website: hackerassociate.com 🔗
📱Social Media📱:
_________________________________________
💼 LinkedIn: in.linkedin.com/company/hackerassociate
💬 Discord: discord.gg/TbRWXZE5xR
🔗 Official Website: hackerassociate.com
🐦 Twitter: harshad_hacker
💬 Telegram: t.me/hackerassociate
#hackerassociate #infosec #hackingcourse #mobileapplications #android #ios #cybersecurity #hackingcourse #iot #cloudcomputing
มุมมอง: 347
วีดีโอ
Cyber Crime: New Series Trailer | Understanding Their Tactics and Staying One Step Ahead
มุมมอง 220ปีที่แล้ว
Cyber Crime // Crime // Cyber Fraud // Scam //cyber crime awareness Explore the realm of cyber crime in our captivating new series. Gain invaluable insights into the tactics employed by cyber criminals, and learn how to protect yourself from escalating threats. Delve into the fascinating world of criminology as we uncover the inner workings of these digital scams and cyber fraud. Join us as we ...
Cyber Crime: Dark Side of the internet | Episode 1 | Criminal Mindset #crime #cybersecurity
มุมมอง 908ปีที่แล้ว
Crime | Cyber Crime | Cyber crime awareness | Cyber Fraud In this first episode of Cyber Crime new series, we will decode the Criminal Mindset, we explore the dark side of the internet and the dangers of cyber crime. We explore the psychology of cyber criminals and the strategies they use to commit crimes. #hackerassociate 📺 This series is inclusive for people of all ages and backgrounds, inclu...
Burp Suite Bambdas: Filtering the HTTP history with Bambdas
มุมมอง 363ปีที่แล้ว
Burpsuite Bambdas // Burp Bambdas // bambda // Burp Shorts Bambdas In this video, we'll be learning how to use the Burp Suite's Bambdas feature to filter the HTTP history. This is a handy tool that can be used to track down the source of security issues on your website. Whether you're a web developer or an admin, this video will teach you how to use the Burp Suite's Bambdas feature to filter th...
Automating Bug Bounty: using Gbounty | Live Bug Bounty | Part II
มุมมอง 305ปีที่แล้ว
Automating Bug Bounty // Automate Bug Bounty // Live Bug Bounty // Gbounty In this video, we'll be continuing our discussion on Automating Bug Bounty. We'll be covering how to use Gbounty to automate your bug bounty program. In our first video on Automating Bug Bounty, we covered how to set up your Gbounty account and create your bounty tasks. In this video, we'll be covering how to use Gbounty...
Automate Bug Bounty: using Gbounty Framework | PART 1 [ HINDI ]
มุมมอง 163ปีที่แล้ว
Automating Bug Bounty // Bug Bounty Automation // Automate Bug Bounty In this video, we'll be discussing how to use the Gbounty Framework to automate your Bug Bounty program. This module allows you to track submissions, rewards, and penalties, and provides a reporting system to keep you organised and track your progress. If you're looking to get your Bug Bounty program up and running quickly an...
Is Apple M1/M2 chip good for hacking: Detailed discussion
มุมมอง 1.2Kปีที่แล้ว
Macbook for ethical hacking // Apple M1 M2 for Hacking // M1 M2 chip for Hacking Do you want to know if the Apple M1/M2 chip is good for hacking? In this detailed discussion, we'll answer that question and more. We'll discuss the features of the Apple M1/M2 chip and how it is good for hacking. We'll also share some tips on how to hack on a Macbook using the Apple M1/M2 chip. Finally, we'll give...
Recon Mindmap: How to perform live recon // Live Bug Bounty
มุมมอง 563ปีที่แล้ว
Recon Mindmap: How to perform live recon // Live Bug Bounty
Clickjacking: How to Perform Clickjacking Attack // Live Hacking
มุมมอง 5Kปีที่แล้ว
Clickjacking: How to Perform Clickjacking Attack // Live Hacking
iOS 17 New Features: Top 20 New Features of iOS 17 // iOS 17 Tips & Tricks
มุมมอง 121ปีที่แล้ว
iOS 17 New Features: Top 20 New Features of iOS 17 // iOS 17 Tips & Tricks
What is ICS OT IT cybersecurity? SCADA Hacking
มุมมอง 571ปีที่แล้ว
What is ICS OT IT cybersecurity? SCADA Hacking
Burpsuite Pro Training: Traffic Analysis In Minutes!
มุมมอง 107ปีที่แล้ว
Burpsuite Pro Training: Traffic Analysis In Minutes!
Cloud Hacking Course: How to become Cloud Hacker ?
มุมมอง 190ปีที่แล้ว
Cloud Hacking Course: How to become Cloud Hacker ?
Best Hacking Hardware Gadgets: Hackers Gadgets for Exploitation
มุมมอง 477ปีที่แล้ว
Best Hacking Hardware Gadgets: Hackers Gadgets for Exploitation
Burp Collaborator: How to use and Out of Band Attack
มุมมอง 3.8Kปีที่แล้ว
Burp Collaborator: How to use and Out of Band Attack
Cloud Recon: How to extract information One Liner
มุมมอง 187ปีที่แล้ว
Cloud Recon: How to extract information One Liner
Top Cyber Security skills for modern penetration testing
มุมมอง 152ปีที่แล้ว
Top Cyber Security skills for modern penetration testing
Offensive Cloud Penetration Testing: Hack into the Cloud
มุมมอง 49ปีที่แล้ว
Offensive Cloud Penetration Testing: Hack into the Cloud
Top Cyber Security Certification | High in Demand
มุมมอง 241ปีที่แล้ว
Top Cyber Security Certification | High in Demand
Information ke liye thnks sir
Pls sir share the book
Sir please iskea upar detail video banayea. Kya Aap iska training provide Kar te hain
Sir maine m1 le lia h orr mujhe bohto demotivate ho rha h mujhe kuch smjh hi nhi aa eha h m apni padhai kaise kru kya software download kru mere pass koi resource nhi h sirr ki kaise lab setup kru kaise apni ethical hacking m apna future bnaau sir plss help aap phle insan ho jo supportive lge ho youtube pe plss help sir😢
Sir me ne yeswehack me click jacking report kiya but rtfs aya
thankyou sir
I think it is a server side vulnerability. Correct me if I am wrong
Can i buy M2 for this as a beginner
Thanks
Bhai x frame option ki to bat hi nahi kari
Bhai telegra ya discord me ho kya?? I am beginner in bug bounty kafi sare doubts hai agar..
For hacking, Macbook M1 or Any other powerful windows laptop which will be better
4:45
Official web: hackerassociate.com
Hey Harshad, It was really helpful. The content is clear and simple. 🥰
Thank you for explaining in a simpler way !!
Official web: hackerassociate.com
Video Link: IOS Pentest Lab Setup Full Video th-cam.com/video/x7UU0xihLOo/w-d-xo.htmlsi=bBmMhjaHdWatXqtc
great video sir but i have a question like then what can we do by that
Where can I see the blog?? Link?
On medium, search on google, Hacker Associate Medium OR go to medium and search Harshad shah
they increased price of it
Official Web: hackerassociate.com
Best of luck brother 👍👍
Very excellent. Harshad Shah Sir....
Very Informative !! Thank you for sharing !!
Excited for the next series.. interesting and informative
Very Informative. Awesome video. 👌
agr only dns aya per
Nice vido as search every time❤
Thank you 🙏
Is, utm good for virtual os
UTM is good for virtual os but I am using parallel desktop for virtualization
@@hackerassociate is that paid or free if Paid how much it cost
Hello, which software u use for virtual os
I am using parallel desktop for virtualization
@@offensiveblackhat is that paid or free if paid how much it cost 🤔
@@PIYUSHGUPTA-m5p it’s paid , it’s cost around 10K. Free options are Vmtek pro , utm etc.
@@offensiveblackhat I mean utm pe Sara Kam hoo jayega na Mera laptop MacBook Air m2 16 gb Ram hai me student hu wo nii le skta thanks 🙏
@@PIYUSHGUPTA-m5p ha ho jayega UTM se sara work
Official Web: hackerassociate.com
Well explained.. thanks 👍
Official Web: hackerassociate.com
Thanks for clear explanation in pain English.
Official Web: hackerassociate.com
Bro if you can make a video on your journey and how we can also be a hacker ❤
Sar pineapple Wi-Fi kahan se milega sar sab jagah out of stock hai sar main Pakistan se hun
You can ordered from INDIA or USA
@@offensiveblackhat please sar website name
Official Web: hackerassociate.com
Official Web: hackerassociate.com
Official Web: hackerassociate.com
Official Web: hackerassociate.com
Official Web: hackerassociate.com
Official Web: hackerassociate.com
Windows Privilege Escalation Tools : 1. Winpeas 2. Metasploit PRO 3. Potato Scripts 4. Powershell Scripts 5. Metasploit Post Modules
sir please write here all tools
Hello sir... can you show the reverse engineering of azov malware sample using IDA pro tool..
Here you can find the malware sample...
Awesome content ❤️❤️
Sir, is OHSE available in Hindi?
OHSE ( offensive hacking ) is global certification exam so exam and other things in English but mode of training like delivery/learning can be in Hindi and English. Both mode we provide
Thank you so much.
Thank you for the Hindi.. 👍👍