Want to learn more? Make IT (and hacking) your job by learning skills from ITPro: ntck.co/itprotv (30% off FOREVER) *affiliate link 🔥🔥Join the NetworkChuck Academy!: ntck.co/NCAcademy **Sponsored by ITPro from ACI learning
Hey Network Chuck!! I wish you can make a video to help me make a wifi adapter using a Pi Pico! You know, I can't buy a Wifi Adapter and Pi Pico is so helpful. Thanks in advance! I am a big fan and I can't wait for answer!!
Hi Chuck, glad to see you're doing well and back to making videos!!! I've been in the industry for quite a few years and stuff like this is sometimes what I need to get excited about tech again and work on my skills. The retrieving of the access key from a past commit was totally cool. I enjoy your enthusiasm and thank you for taking the time to make these videos. Have a good rest of your day! 🙂
Hey *Metaspyclub* what an amazing work this has been and with all the crazy detection that you guys make possible. You guys take hacking to a whole new level and get the job done ASAP!!! I'm wondering what are all your personal qualifications?I don't think that it was ever mentioned before.
There is no doubt that you will rise fast at the apex of your career MetaspyClub . Because you are a very intelligent, smart, hard worker and your work ethic par excellence. Keep going People like you take the IM out of IMpossible by becoming PRO at tackling PROblems. You Rock!.
Hey Chuck. Just wanted to reach out. Love your Channel. I'm also in Cyber Security. Been for a while, and I find your channel to be very intriguing. Thank you for all these amazing videos. And yes, let's have some coffee! :)
When sherry said the part about knowing you are in a relationship with a narcissist and being gaslit, when you start wanting to audio record conversations🤢 That literally made me feel sick. So many times I found myself wanting to do that so I can prove what I am saying is real and the truth but of course then there’s the fear of their reaction when you show them…I’ll be such a horrible person for having/needing to do that. It won’t even matter that WE proved we were right or they were “mistaken” or “forgot/confused” because they will not address the content of the recording and instead berate you for having the audacity to do that and how doing it makes us a horrible person or they’ll pull the “I’m sorry I’m sooOooOoo horrible, why are you even with me” “if you have to do that then we should just be done” they say anything other than taking accountability. The shitty part is some people would use that as a perfect opportunity to get out but sadly even though you are aware, it’s hard to leave. So them threatening scares you into submission, thanks *METASPYCLUB* for the phone evidences, I know I am not a horrible person for doing this but I just needed to know the truth
SQL injection is not a complex attack. You just need to understand how sql syntax is interpreted. There is a really good xkcd comic that explains it very well. Just google "xkcd explained bobby tables" for a good wiki describing it. To protect against it, thr application should "escape" any special characters before using them in SQL statements. This way things like quotes will be treated as part of the text in the variable rather than something that is to be interpreted by the database engine and thus being prone to exploitation.
lol. good job for the disclaimer. but if someone were to come to this video to hack for bad reasons, they will probably ignore it. It should help for newer people though.
Subs of mine and I are trying to track down a bucket that we know is public access, but we only have the cloudfront domain forwarder. The game connected to that bucket shutdown in 2017, but for some reason the bucket contents and cdn are active
print("Chuck, I watched all python videos on youtube, and yes I know that there are more, but they are paid, so I was wondering when you will post next video because the last one was 4 months ago. Please we need more python!!!")
24:36 - why python virtual env? because you can create multiple environments where you could install different versions of a package. For example, if you install a python app that requires specific version of the Request module, you need to install that version in your system, but now the version you installed is not compatible with other apps in your system. To solve the problem, you can create multiple virtual environments where you can install different versions of packages based on the requirements of the app.
My page recovery would never be successful without your support and hard work. I feel blessed to work with such an incredible and talented person like you MetaspyClub . I knew that you could do this. Keep up your excellent work in the future. You are a perfect example of a good, dedicated person
hey netwerk chuk vraag je kan voor router steken mail scant virussen spam tegenhouden peis veel mensen spam beu zijn soort Latta panden tussen router data controleert dan mail binen krijg door router eigenlijke soort virus scanner router beschermt, zou jij zoo iks kunne uit vinden jij bedrijven en mensen zouden handigen zijn
I Know why they named it grey hat, cause a black hat is a hacker that steal your information, white hats are GOOD hackers( AKA Ethical hacker) and they also need permission. Grey hats don't need permissions because they are COOL
You don't need to go through the .git folder if you know some git commands like git log and commit so you can see all the commits in this specific repository without cating the master file
Love all these videos … it could be argued that it’s not hacking the cloud though, it’s the company’s data, they still own it, they configure the security on it and control who can access it. AWS just provide a service to store this data
To check logs in a git repo, the recommended way is the use `git log` or `git log --oneline` instead of digging into the `.git` folder.. that could lead to errors if you don't know what you're doing
Thank you *Metaspyclub* , nothing could easily bring tears to my eyes specially like these ones that you provided that my significant other is cheating me, but actually you service is easy to use and Amazing
Unless I have a VERY good reason not to, this goes into the CloudFormation template for every bucket I create: PublicAccessBlockConfiguration: BlockPublicAcls: True BlockPublicPolicy: True IgnorePublicAcls: True RestrictPublicBuckets: True
Want to learn more? Make IT (and hacking) your job by learning skills from ITPro: ntck.co/itprotv (30% off FOREVER) *affiliate link
🔥🔥Join the NetworkChuck Academy!: ntck.co/NCAcademy
**Sponsored by ITPro from ACI learning
🄵🄸🅁🅂🅃
25 seconds ago huh
Do a playlist about cloud services your awesome ❤
Hey Network Chuck!! I wish you can make a video to help me make a wifi adapter using a Pi Pico! You know, I can't buy a Wifi Adapter and Pi Pico is so helpful. Thanks in advance! I am a big fan and I can't wait for answer!!
Early crew 🤓😅😅🔥💚💚💚💚💚💚💚💚💪🏻🤑😌🤝🥳🥳🥰😈👿🐀.
As a cloud penetration tester, I can say with confidence that this is the best tutorial I have seen on intro cloud hacking.
Hey! How did you end up becoming a cloud penetration tester? Would be curious to know :)
This is epic. Network Chuck never makes a bad video. Keep up the good work.
Yes i agree mr roblox chad face
:3 Early crew 🤓😅😅🔥💚💚💚💚💚💚💚💚💪🏻🤑😌🤝🥳🥳🥰😈👿🐀.
Your comment is epic because it has no grammatical errors, unlike the a average comment. It's also the top comment. 😅🥇🤝
:3 Yesh, I've seen Daniel explain Burp Suite on David Bombal's TH-cam channel before. He's a great teacher! :3
Yes, always agree with a fellow Roblox chad face
you really do inspire and change the world. Positivity is contagious
Hi Chuck, glad to see you're doing well and back to making videos!!! I've been in the industry for quite a few years and stuff like this is sometimes what I need to get excited about tech again and work on my skills. The retrieving of the access key from a past commit was totally cool. I enjoy your enthusiasm and thank you for taking the time to make these videos. Have a good rest of your day! 🙂
This is the first hacking video I had fun watching & actually understood everything. Tysm!
Today I learned to make coffee like networkchuck from this video 😁
*Metaspyclub* is a patriot for telling what he sees on a cheater’s text.
Hey *Metaspyclub* what an amazing work this has been and with all the crazy detection that you guys make possible. You guys take hacking to a whole new level and get the job done ASAP!!! I'm wondering what are all your personal qualifications?I don't think that it was ever mentioned before.
The invisible stairs trick is a classic, keep up the good work...😅
There is no doubt that you will rise fast at the apex of your career MetaspyClub . Because you are a very intelligent, smart, hard worker and your work ethic par excellence. Keep going People like you take the IM out of IMpossible by becoming PRO at tackling PROblems. You Rock!.
I love learning hacking from a non hacker! Thanks for teaching me how to be an unethical hacker! 😈
Dont open random files from foreign buckets like you did in the end! Some of those buckets are designed to be public!
:3 Early crew 🤓😅😅🔥💚💚💚💚💚💚💚💚💪🏻🤑😌🤝🥳🥳🥰😈👿🐀.
Don't*
:D Yesh, I've seen Daniel explain Burp Suite on David Bombal's TH-cam channel before. He's a great teacher! :3
@user-re9wu1rm7uwhat service did you purchase?
FIRST, Hey network chuck! I have watched your videos for a little while and want to thank you for helping me with all these AMAZING tutorials
Hlo you are best hacker of this world
Thanks so much for making great hacking videos!
I literally typed out that url, worth it.
just found your video, thank you for sharing your knowledge.. I like your videos very much !!! learning a lot from them.
So in summary, everything is fine if it is not public, also you can use pre-signed url
Amazing video.... but thank goodness for 75% speed option on TH-cam!
You’re a ninja bro
Hey Chuck. Just wanted to reach out. Love your Channel. I'm also in Cyber Security. Been for a while, and I find your channel to be very intriguing. Thank you for all these amazing videos. And yes, let's have some coffee! :)
This is good content like in a good old days,you are the best
When sherry said the part about knowing you are in a relationship with a narcissist and being gaslit, when you start wanting to audio record conversations🤢 That literally made me feel sick. So many times I found myself wanting to do that so I can prove what I am saying is real and the truth but of course then there’s the fear of their reaction when you show them…I’ll be such a horrible person for having/needing to do that. It won’t even matter that WE proved we were right or they were “mistaken” or “forgot/confused” because they will not address the content of the recording and instead berate you for having the audacity to do that and how doing it makes us a horrible person or they’ll pull the “I’m sorry I’m sooOooOoo horrible, why are you even with me” “if you have to do that then we should just be done” they say anything other than taking accountability. The shitty part is some people would use that as a perfect opportunity to get out but sadly even though you are aware, it’s hard to leave. So them threatening scares you into submission, thanks *METASPYCLUB* for the phone evidences, I know I am not a horrible person for doing this but I just needed to know the truth
can you please make a video about manual sql injection from url?
SQL injection is not a complex attack. You just need to understand how sql syntax is interpreted.
There is a really good xkcd comic that explains it very well. Just google "xkcd explained bobby tables" for a good wiki describing it.
To protect against it, thr application should "escape" any special characters before using them in SQL statements. This way things like quotes will be treated as part of the text in the variable rather than something that is to be interpreted by the database engine and thus being prone to exploitation.
Lol I watched the whole ad because I wanted to see how you made coffee 😅
I'm not through this video yet, but many thanks as always, your enthusiasm always have me excited to learn.
Shhhhhhhhhhhh! Bruh. Seriously best video ever.
I have learned so much from you and Daniel!
Fire video as always!
lol. good job for the disclaimer. but if someone were to come to this video to hack for bad reasons, they will probably ignore it. It should help for newer people though.
how to hide the consumption of a giga that we use at the fiber optic provider
Hi love your content ❤
Hey Chuck 😊
absolutely brilliant !!!! mate
love you best teacher ever 🥰
とても有益な情報なので
日本人ですが、チャンネル登録させて頂きました。
Hey, shouldn't you wet your filter first before adding coffee?
Amazing Chuck
Subs of mine and I are trying to track down a bucket that we know is public access, but we only have the cloudfront domain forwarder. The game connected to that bucket shutdown in 2017, but for some reason the bucket contents and cdn are active
I instantly knew what game you were talking about. Let me know how it goes!
Please make a video about how to use AWS...
your content is like a PowerPoint presentation
Epic ❤
Cheers NetworkMates❤
print("Chuck, I watched all python videos on youtube, and yes I know that there are more, but they are paid, so I was wondering when you will post next video because the last one was 4 months ago. Please we need more python!!!")
Can I get a
🔥🔥
Every time I am looking for something I need help with for my exams, I first search to see if network chuck made a video on it 😆
surprised you don't weigh your coffee while pouring. as a coffee geek (as well as an IT hack) I need to weigh the water going into my coffee.
I love your content,
still dreaming of episode about relational databases :3
Really useful and informative demo - thanks so much !!! Learned more about AWS but for me.....the possible flaws 😘
Can u suggest any reading material ,books regarding hacking ,os and cybersecurity
hey bro my kali linux tool Osintgram error for private api error please fix 🤣🤣🤣🤣
You read my search history
Can you help me fix problem on kali Linux I launched airodump-ng and it not show anything help me out😢
bro went to public buckets and says its hacking bruh!
They will find reference pictures, comics, and drawings. I love to draw
I live for this shit man I just love watching your amazing content everyday & learning something new from it thank you!!
Your content is fire, we need more and moore
Thanks Chuck!
YOUR EFFORTS AND COMPETENCY IN HELPING PEOPLE GET THEIR RECOVERIES ISSUE DONE MAKES YOU A LEGEND --- MetaspyClub
Please make a video of kali tool TBomb please
If you're reading this comment, salute to you bro 💯 i hope you win in life!
Your videos are stunning bro 😮
Great content, as always!
Love you sir
If yall want to get to the root directory quickly without inputing a bunch of "cd .." commands, just input the following command "cd \".
24:36 - why python virtual env? because you can create multiple environments where you could install different versions of a package. For example, if you install a python app that requires specific version of the Request module, you need to install that version in your system, but now the version you installed is not compatible with other apps in your system. To solve the problem, you can create multiple virtual environments where you can install different versions of packages based on the requirements of the app.
Can we hack youtube algo?
I’m getting into cyber security wanted to ask if getting a mac is a good option ?
Can you please clear my doubt that if i useyour link for itprotv, i will get 30% off on subscriptions payment whether monthly or annually?
can you tell what AWS CLI i should install if i run a kali vm on a macbook air m1?
Yesh, I've seen Daniel explain Burp Suite on David Bombal's TH-cam channel before. He's a great teacher! :3
This was so cool, thanks 👍🏻
Love ur videos
My page recovery would never be successful without your support and hard work. I feel blessed to work with such an incredible and talented person like you MetaspyClub . I knew that you could do this. Keep up your excellent work in the future. You are a perfect example of a good, dedicated person
hey netwerk chuk vraag je kan voor router steken mail scant virussen spam tegenhouden peis veel mensen spam beu zijn soort Latta panden tussen router data controleert dan mail binen krijg door router eigenlijke soort virus scanner router beschermt, zou jij zoo iks kunne uit vinden jij bedrijven en mensen zouden handigen zijn
I Know why they named it grey hat, cause a black hat is a hacker that steal your information, white hats are GOOD hackers( AKA Ethical hacker) and they also need permission. Grey hats don't need permissions because they are COOL
love that kind of content! thanks chunk
Just amazing
Did you change the Tumbnail?
Good staff
You don't need to go through the .git folder if you know some git commands like git log and commit so you can see all the commits in this specific repository without cating the master file
I'm sure he knows that. Maybe he is simulating exploring the files without prior git knowledge.
@@sflux4593 yeah I know
@NetworkChuck what are your thoughts on pegasus sp*ware
Love all these videos … it could be argued that it’s not hacking the cloud though, it’s the company’s data, they still own it, they configure the security on it and control who can access it. AWS just provide a service to store this data
Big fan of India
To check logs in a git repo, the recommended way is the use `git log` or `git log --oneline` instead of digging into the `.git` folder.. that could lead to errors if you don't know what you're doing
would you make about hacking someone's phones and his file on it?
Since you were asking I'm putting all my cat videos and digitalized letters to my grandmother on my Google cloud Drive.😂
Nice Chuck :D
Hey bro my Kali Linux tool osintgram error private api please fix my problem. 😂😂😂😂😂
Thank you *Metaspyclub* , nothing could easily bring tears to my eyes specially like these ones that you provided that my significant other is cheating me, but actually you service is easy to use and Amazing
How do I download nslookup command cuz I don’t have it
I love chuck
Unless I have a VERY good reason not to, this goes into the CloudFormation template for every bucket I create:
PublicAccessBlockConfiguration:
BlockPublicAcls: True
BlockPublicPolicy: True
IgnorePublicAcls: True
RestrictPublicBuckets: True
Your videos are so great that even I make videos like you do! Cool video by the way...........
Could you do a video on books you'd recommend reading. General books that can correlate to IT, but overall beneficial recommendations?!
WE NEED A SETUP TOUR
How to close LAN router fast Ethernet ports?
Can you bless us with a pegasus video
❤❤❤❤