Hi everyone! I hope you enjoyed this video. Please do consider subscribing so we can continue making awesome hacking content! Below is all of the course info: Full Course: academy.tcm-sec.com/p/practical-ethical-hacking-the-complete-course All Course Resources/Links: github.com/Gr1mmie/Practical-Ethical-Hacking-Resources A shout out to all those involved with helping out on this course: Alek - Creating "Academy", "Dev", and "Black Pearl" Capstone machines and a Discord Admin. Dewalt - The one man Army of a five star support team. Dwight - Discord Admin and awesome hacker. Grimmie - Creation of SumRecon, lover of cookies, and a Discord Admin. Joe Helle - Creating the "Blue" Capstone machine and the PNPT foothold. The OG support staff and a Discord Admin. Lian - The OG Discord Admin with French Bulldogs I'd like to steal. Rumham - Discord Admin, lover of rum and hams, and overall great guy. 0:00 - Introduction/whoami 6:20 - A Day in the Life of an Ethical Hacker 23:14 - Effective Notekeeping 29:58 - Important Tools 35:23 - Networking Refresher: Introduction 36:39 - IP Addresses 49:50 - MAC Addresses 53:07 - TCP, UDP, & the Three-Way Handshake 58:25 - Common Ports & Protocols 1:04:39 - The OSI Model 1:10:14 - Subnetting 1:37:17 - Installing VMWare / VirtualBox 1:43:37 - Installing Kali Linux 1:50:11 - Configuring VirtualBox 1:53:32 - Kali Linux Overview 1:57:05 - Sudo Overview 2:02:22 - Navigating the File System 2:14:26 - Users & Privileges 2:23:54 - Common Network Commands 2:29:50 - Network Commands Update 2:31:49 - Installing & Updating Tools 2:41:01 - Installing gedit 2:42:46 - Viewing, Creating, & Editing Files 2:48:49 - Scripting with Bash 3:11:28 - Intro to Python 3:13:52 - Strings 3:21:25 - Math 3:27:24 - Variables & Methods 3:38:41 - Functions 3:49:40 - Boolean Expressions 3:54:14 - Relational & Boolean Operators 4:01:13 - Conditional Statements 4:10:13 - Lists 4:20:41 - Tuples 4:23:16 - Looping 4:28:18 - Importing Modules 4:34:24 - Advanced Strings 4:47:47 - Dictionaries 4:55:23 - Sockets 5:00:55 - Building a Port Scanner 5:21:09 - The 5 Stages of Ethical Hacking 5:26:31 - Passive Recon Overview 5:34:07 - Identifying Our Target 5:37:46 - Discovering Email Addresses 5:53:38 - Breached Credentials Part 1 6:01:00 - Breached Credentials Part 2 6:13:00 - Hunting Subdomains Part 1 6:18:35 - Hunting Subdomains Part 2 6:23:30 - Identifying Website Technologies 6:30:39 - Gathering Information w/ Burp Suite 6:39:33 - Google Fu 6:45:09 - Utilizing Social Media 6:50:49 - Installing Kioptrix 6:57:12 - Scanning w/ Nmap 7:17:04 - Enumerating HTTP/HTTPS Part 1 7:32:09 - Enumerating HTTP/HTTPS Part 2 7:47:22 - Enumerating SMB 8:01:46 - Enumerating SSH 8:05:59 - Researching Potential Vulnerabilities 8:20:54 - Our Notes So Far 8:24:03 - Scanning w/ Nessus Part 1 8:34:42 - Scanning w/ Nessus Part 2 8:40:57 - Reverse Shells vs Bind Shells 8:48:02 - Staged vs Non-Staged Payloads 8:51:27 - Gaining Root w/ Metasploit 8:59:13 - Manual Exploitation 9:11:57 - Brute Force Attacks 9:19:50 - Credential Stuffing & Password Spraying 9:33:58 - Our Notes, Revisited 9:37:05 - Capstone Introduction 9:42:54 - Setting up Blue 9:46:55 - Blue Walkthrough 10:04:00 - Academy Setup 10:06:28 - Academy Walkthrough 10:50:52 - Dev Walkthrough 11:16:18 - Butler Walkthrough 11:52:41 - Blackpearl Walkthrough 12:16:17 - Conclusion
It seems I need to start really from the beginning because a lot is unclear for me. 1 hour in and I understand nothing (example all the ports) *Does anyone have a place where I can learn all the knowledge that is needed prior to this course? Thank you for your help
Thanks for this! I finished an I.T. degree in 2009. I forgot 99% of it, so this was like a refresher. Networking was always my weak spot, and I struggled through the courses. I remember we were given an ip address for our final project, and had to network a fake company with 5000 pc's. I think I went a week without sleeping.
@@ABMOL36 No dear, this seems like a newbie social engineering trick. The comments section is full of this exact same story of yours. Please stay away from us, or you'll be reported. Thank you, dear.
Hi everyone! Am extremely excited and feel blessed to click on this video. I know it super long, but so far....am loving every single second about it. I always wanted to do something in the IT filed, but with my busy schedule...I was always contemplating on where do I start, what am I going to focus my studies on and how difficult will it be for me with no IT background? However, watching this video have answered to all the questions. Thanks for taking your time to put this together for people like me.
@@KrishPatel-lr8cl ah yes. ok. Bro but if i watch this video will it be wasting my time or what other suggestions will u give me bc i'm interested in hacking & already learned some basic html and python
@@biz20072008 or actually be smart and just get an adblocker. ever since i installed one i have barely seen any advertisements on any website, including youtube, all for the price of 0 dollars compared to something you pay for, monthly, for one website.
I was able to watch the full video. Very detailed descriptions, detailed ways on how to enumerate. 💯 I have learnt ALOT. Going for the next 12 hours now.
Great course, but it would be very great to have the video segmented into chapters. For those of us who are familiar with the basics and looking for specific chapters, it would be amazing!
I'm 4,5 hours into this lesson so far and I'm loving it. It's really well made. Good structure and easy to follow. I especially like how you've divided everything into small sections or videos (that you've also timestamped). It makes learning all this so much more digestible in my opinion. Thank you so much for making this.
@@zaamin8544 Maybe your pip is too small. Jokes aside I don't know how to help with that because you didn't provide any information. You didn't tell me what you tried that didn't work, you didn't write down any error messages. How am I supposed to help you mate?
Thank you for your time, as well as, creating such an "in-depth" layout of what will be expected. It was very informative and easy to follow. Again, thank you for this! Very much appreciated.
What a great guy and even a better mentor!! Added this to my playlist on youtube and look forward to checking back in on your content! Hope all is well, keep up the great content!
I already know how to program through years of doing it but haven't really touched up on ethical hacking. It is very useful to know what is going on when you or someone else is being hacked, and I appreciate that this it is free course you have spent a long time making. Since I just want to learn the basics of ethical hacking to prevent some it, I don't really feel the need to buy paid ethical hacking courses. 💖
Well coding can be applied to any job. It's not needed for every IT job but can be used for most IT jobs. Project managers, network engineers, software engineers, security engineers or cyber security, data analysts and scientists can all use it. I'm not sure how many jobs have to know it but they can all use it and get paid more in their fields if they know how to code.
I have some tasks that I present to whoever can accomplish them, I will give him $500 on a daily basis. Whoever can communicate with me and reach an understanding on this must be an expert in the prohibited sites
Thanks Heath, this has been great and you are very good at simplifying it for those of us who are new to the field. I will likely buy several of your next lessons and look forward to learning more from you. Maybe we will work together in the future.
@@Khan_Adventures im currently in the latter years of my IT degree so I have a little background in the workings on security and IT working. I just reached the 3 hour mark and so far it seems like a good foundation. I havent got super into the nitty gritty of the hacking portion with Metasploit, beef, nmap, etc so I cant say for sure for bug bounties but it seems like a good starting point that could pretty reasonably get to a point to do bug bounties.
I'm a little over 4 hours into the video and I'm loving it. I had taken a basic Python course prior and it's a refresher for me so I appreciate that you are able to keep it short, to the point, and interesting. What drove me to make a comment is this is the first time I have been able to make a note taking platform that worked for me. Thank you so much for teaching me a skill that I can take anywhere I go even outside an education environment. I have never been more effective at note taking. Keep up the good work and I have every intention of going through more of your courses before I begin my Bachelors Program.
@Infamous My bad for a late response I'm not big on checking my YT. I have no professional experience but I have been a big tech guy since early high school (about ten years). This course is great for a complete beginner in cyber security, but it really only has a networking "refresher". I would recommend taking a more in depth entry level networking class if that's what you're looking for. Google offers a course that covers networking pretty well and you get a recognized cert from it.
Subnetting and networking in general has always been a massive pain for me. Thank you for covering network stuff so in-depth before moving into the other areas first. It really has helped me remember a lot of stuff that I have forgotten over the years - I don't use subnetting day-to-day, and it is a very perishable skill. Hard to learn, easy to forget. Thank you for taking the time to explain it. :)
Subnetting is not that hard. Took me about 3 weeks of doing exercises. Once you learn it properly it stays with you. Haven't used for years but can still answer subnet questions quite easily
I have this course and haven't yet planned to open it. Quite busy. Will go in for this video and then to my course. Thank you for giving us this course on TH-cam. God bless. 👍
I really like listening to you man… You’re a really nice guy and cover all the bases. I just jumped into this by accident but I’m so interested that I watched the whole vid and now I’ve started looking into studying this subject … thank you man.
Having only listened to the first 30 mins I must say I’m extremely impressed with how the speaker challenges any individual to have the correct mindset in pursuing ethical hacking and pen-testing.
I've reached the exploitation part and to be honest, this is a very detailed course that people would pay for. I love the way you teach, when we approach certain command line you explain it thoroughly, the concept behind what we doing, the process, terminologies, tools, even the PIMPMYKALI is super useful and mentioned here. You have approached the challenges with your way and not hesitating to teach us here. Godbless you, my man. Looking forward to learn other courses from your channel and your website!
If you do not have the Cyber Mentor's Subnetting Sheet with you, an easy way to know the number of hosts if a CIDR number is given is to: 1. Subtract CIDR value from 32 (Example: /24. 32 - 24 = 8) 2. Take the difference and use it as power to base 2 (Example: 2^8 = 256) 3. Subtract 2 from the result to get your number of hosts (Example: 256 - 2 = 254 number of hosts)
You explained the Subnetting perfectly! I was able to understand it the first time you explained it. It really comes down to the math and some logical thinking.
Thank you for your hard work and dedication poured into making this video. I am deeply grateful to you. Great and informative for a complete newbie like myself. The timestamps helped as well, I work with python a lot so I was glad when I could skip a few hours of the video hahaha. Will also definitely be purchasing your other contents after I finished with this video.
I’m extremely grateful for this information. School has been tough, especially that I’m going online. Watching this video makes everything easier to comprehend for me. I’m forced to purchase the course now. I feel that I need to learn everything that’s presented and get the pen testing cert. mostly important investing into the course will be a way of me saying thank you.
I would advice to be careful You gotta love this team. Anom6000hack There's always so upbeat and genuinely seems happy, I admire his positive outlook. He doesn't make mistakes. He seems to have learned a hard lesson but what better way to grow. More power to him! I wish him all the good fortune I'm sure he'll reap in future Endeavours. He's the best here
I am just starting the 12 hour course. I've always been looking for what I can do and love. I've made 100,000 a year hating my life. I quit that job after 8 years of "lack of stimulation". After listening to darknet diaries and realizing I can be a puzzle solver to help people and get paid to do it...I'm very excited to get started.
I saved up money for the TCM course and cert from a janky network admin contract where I'm really a Desktop Admin who sits on his hands all day. I cant wait to take this course!
This is absolute gold! Very practical and very affordable training. I highly recommend checking out the full course. You will definitely learn a lot! Thank you for all you do for the cybersecurity community!
what a way to start 2022! 🔥🔥 you're the only reason someone like me from an unknown country (Syria) with no good internet connection, no power (electricity) and definitely no online transactions possible since most sites block my country's IPs anyway... really, from the bottom of my heart thank you Heath I wish you and your family a blessed new year and may god aid you in your hardships (since life can't be empty of those)
a message from your brother in Iran : bro ... don't pay your time on the technology yet ... ISIS , Sofiani , these terrorists wants to get your dreamy land .... keep your state , do sport , do military stuff . improve your soul by reading Qoran defend your land ... we will give you whatever you want about technology whatever we have.... both of us ,we're in Islamic empire
@Mauri Font lol what are you smoking? @H G it's the half of that is offered in Udemy. Udemy course is 22.5 hours and has sections not included in this course. I am not sure about the price since my company has an enterprise account. And unfortunately , I haven't been able to finish it yet :( fml
This is absolutely amazing and you are such a great mentor!! I have watched an hour while getting ready for work.... and already absorbed SO MUCH! I will be setting aside a full day this weekend, starting from the beginning with NOTES!!! THANK YOUUU!! ❤️
Super job explaining and laying out the critical specifics. I already installed KALI VIA USB boot. 2 hrs . into course. I am a Control Systems Lead for factory automation. So I had to learn some networking to use Rockwell Automation software.
Just started the course and the neumonic for the OSI model made me laugh. I remember it from 7 to 1, All People Seem To Need Data Protection :) I started out transitioning from my current customer service work a couple months ago into the field of Cyber Security and Ethical Hacking got my attention after meeting with a pentester from the company i work for, already had a bit of IT knowledge but decided to start at the basic stuff. A+ course material, Network+ material, Linux (also done your youtube course), understanding/reading python code (also your course and other) and now i felt confident enough to start this course and see if it is to my liking and purchase the full course and maybe several other courses. Again a really big thank you for making these video's and with that helping me to hopefully get a job in the field!
I would like to thank you sir, I have never been able to. watch a complete course before. Now i am 5 hours through and i did not get bored :). You do not complicate things and very thorough. 👍👍👍
This is a freaking gold mine, thank you very much. Very informative and you sir got an amazing voice to listen to. Where can I get more courses like this that you teach?
As a 16 year old who understood most of the things after you explained them i would like to thank you for making it possible for everyone to learn about this stuff!!! I really enjoy that you can learn whatever you want nowadays!
Mnemonic for OSI I'm using was from one of the CompTIA courses and it's stuck in my head since, it's from layer 7 to 1: A Priest Saw Ten Nuns Doing Pushups. Thanks for the course TCM.
Amazing! Now I need a course on how to use this ethical hacking to hack into banks and transfer money without leaving a paper trail. Looking forward to that!
Wow I rediscovered you again *Metaspyclub* !!!! This was my first cybernetics thing I did after I woke up having my partner’s chats showing on my phone after refreshing but mostly amazing to watch what a human being is able to create from scratch with only few tools coming direct from nature wow I'm so glad I found you ! Can't wait to use more services.
First, thank you for sharing this. I was a NetAdmim for a large hospital for several years, years ago. NT was new and HIPAA was not even a thing then. Some of the books were still a thing.... Wanted to return to IT, Pentesting, etc... For awhile. Just starting the video now. Will update when finished, but i did want to thank you for putting this together. BTW, I have been a locksmith for 12 years now. I love the "legal B&E" I can also hand file keys or determine key from pictures, shadow box, or even just seeing a key for less than 5 seconds with about a 90% accuracy. It is a blast!!!
your subnetting session was very fruitfull. atleast i feel i am 5-6 steps ahead after going through your instructions. I agree i cannot get it very quickly but this was really really helpful
You did a phenomenal job with this series. Thank you for your time and effort to share your knowledge in such a succinct and proficient video. I'm beyond grateful for the technicality of your work and the tools and knowledge I now have to go deeper into this field. Stellar work.
Hey Bro nice Introduction i really think i need to start documanting what i learn , it's great way to deeper understanding and also find your people who are in the same journey thanks for the great free content bro i hope you all the best Thanks a lot 😃🤩
Great course! Thank you so much for posting it! I wanted to say that since most of the machines grab a DHCP address from the start, why not remove those password files and have everyone get used to running their ipsweep script to find the IP? When I was going through this course I wanted to cheat as little as possible so that's what I did, unless the device didn't pull DHCP because I needed to run dhclient on it. It felt great to use a script that "I had written" while following the early part of the course to get the address of a target machine. It really felt like building on something I had already learned to do something new. Obviously you are the expert and this is just the suggestion of someone who is grateful for what knowledge you are sharing freely. But that sense of accomplishment was awesome. Thanks again for this video and all the time you must have put into making it!
Great work to you sir.. I really enjoy following up your courses. Ethical hacking cyber security is something I have a deep passion for, tho I have a lot to learn and am happy to have a tutor like you
How are you dear? I made stupid a mistake of turning on 2 Factor Authentication on Facebook. I used Google Authenticator app. Later, totally forgot about Authenticator and reset my phone. Now, although I know the password, I can no longer log in/I have not been able to login to my facebook for weeks because the Google Authenticator is gone. I tried resetting the password, but 2FA is still there. I still have access to the yahoo account associated with the Facebook. Please help me dear🙏
Python course recalls the basics quicker than anywhere else. Just seeing in text I would not absorb the content as well. It's incredible how I love bash scripting.
I plan to get the course from your website and the Pentest course (and the Pentest cert) but this is amazing while I save up! Thank you for this! Love your voice!
I am a software tester but never ended up getting my first job after graduation, almost 3 years now. so Im now getting into pen testing since there is alot of it. I am excited for this!
@The Cyber Mentor - 2:59:18 - `seq 1 254` Those are called backticks used in the for loop. Also what is the name of the app that you used for the Assessment notes in 'Our Notes So Far' - 8:20:54 ? Keepnote?
Hi The Cyber Mentor I really liked the first impression of your lectures, I believe you are contributing your community value contribution. Thanks alot.
I hope to be able to get that certificate someday! i have 1 year industrial mechanic and 1 year with transportation and logistics. I really think Pentesting or cyber security in general is the job for me. i love learning computers and have been the family nerd since i got my first computer at 14 years old (2009), But my mom was'nt able to pay for school. The jobs back then were few and far apart also (in the IT buisiness) so i didn't dare take up loans for it. that is my lifes biggest regret. But its ever to late i guess :D
right now is one of the best times to be able to learn, cause you can learn anything one, I hope you get a job in IT one day, cause I know you can do it!!!
Thank you so so much. God bless you, I wish you great success and health to you, your family and your company for giving us this knowledge. I was just getting curious about ethical hacking and your introduction is what I need.
Unethical hacker turned to a ethical hacker here,I just want to say that what u are doing is great, I wish I had something like this during my transition.
Just started the course and love it already. I thought I’d share, I’ve been a help desk admin for 10 years and a data center admin/ mdm admin for the past two, The best Powershell command I learned was (get-command verb-command).Parameters 🔥🔥🔥 Or Get-Command -Verb “Get” -Module “ActiveDirectory” This helped me so much when trying to build my syntax in Powershell, I will always choose BASH, but if you must work with Powershell, these are a must to use.
The OSI model is also taught where layer 7 is on top because the applications and software are on the top part of the interface for the user. Layer 1 is the physical layer which is at the bottom of the layers because it is the farthest away from user access. Also remember that routers only route IPs which is easy to remember when working with switches and routers.
Hi everyone! I hope you enjoyed this video. Please do consider subscribing so we can continue making awesome hacking content! Below is all of the course info:
Full Course: academy.tcm-sec.com/p/practical-ethical-hacking-the-complete-course
All Course Resources/Links: github.com/Gr1mmie/Practical-Ethical-Hacking-Resources
A shout out to all those involved with helping out on this course:
Alek - Creating "Academy", "Dev", and "Black Pearl" Capstone machines and a Discord Admin.
Dewalt - The one man Army of a five star support team.
Dwight - Discord Admin and awesome hacker.
Grimmie - Creation of SumRecon, lover of cookies, and a Discord Admin.
Joe Helle - Creating the "Blue" Capstone machine and the PNPT foothold. The OG support staff and a Discord Admin.
Lian - The OG Discord Admin with French Bulldogs I'd like to steal.
Rumham - Discord Admin, lover of rum and hams, and overall great guy.
0:00 - Introduction/whoami
6:20 - A Day in the Life of an Ethical Hacker
23:14 - Effective Notekeeping
29:58 - Important Tools
35:23 - Networking Refresher: Introduction
36:39 - IP Addresses
49:50 - MAC Addresses
53:07 - TCP, UDP, & the Three-Way Handshake
58:25 - Common Ports & Protocols
1:04:39 - The OSI Model
1:10:14 - Subnetting
1:37:17 - Installing VMWare / VirtualBox
1:43:37 - Installing Kali Linux
1:50:11 - Configuring VirtualBox
1:53:32 - Kali Linux Overview
1:57:05 - Sudo Overview
2:02:22 - Navigating the File System
2:14:26 - Users & Privileges
2:23:54 - Common Network Commands
2:29:50 - Network Commands Update
2:31:49 - Installing & Updating Tools
2:41:01 - Installing gedit
2:42:46 - Viewing, Creating, & Editing Files
2:48:49 - Scripting with Bash
3:11:28 - Intro to Python
3:13:52 - Strings
3:21:25 - Math
3:27:24 - Variables & Methods
3:38:41 - Functions
3:49:40 - Boolean Expressions
3:54:14 - Relational & Boolean Operators
4:01:13 - Conditional Statements
4:10:13 - Lists
4:20:41 - Tuples
4:23:16 - Looping
4:28:18 - Importing Modules
4:34:24 - Advanced Strings
4:47:47 - Dictionaries
4:55:23 - Sockets
5:00:55 - Building a Port Scanner
5:21:09 - The 5 Stages of Ethical Hacking
5:26:31 - Passive Recon Overview
5:34:07 - Identifying Our Target
5:37:46 - Discovering Email Addresses
5:53:38 - Breached Credentials Part 1
6:01:00 - Breached Credentials Part 2
6:13:00 - Hunting Subdomains Part 1
6:18:35 - Hunting Subdomains Part 2
6:23:30 - Identifying Website Technologies
6:30:39 - Gathering Information w/ Burp Suite
6:39:33 - Google Fu
6:45:09 - Utilizing Social Media
6:50:49 - Installing Kioptrix
6:57:12 - Scanning w/ Nmap
7:17:04 - Enumerating HTTP/HTTPS Part 1
7:32:09 - Enumerating HTTP/HTTPS Part 2
7:47:22 - Enumerating SMB
8:01:46 - Enumerating SSH
8:05:59 - Researching Potential Vulnerabilities
8:20:54 - Our Notes So Far
8:24:03 - Scanning w/ Nessus Part 1
8:34:42 - Scanning w/ Nessus Part 2
8:40:57 - Reverse Shells vs Bind Shells
8:48:02 - Staged vs Non-Staged Payloads
8:51:27 - Gaining Root w/ Metasploit
8:59:13 - Manual Exploitation
9:11:57 - Brute Force Attacks
9:19:50 - Credential Stuffing & Password Spraying
9:33:58 - Our Notes, Revisited
9:37:05 - Capstone Introduction
9:42:54 - Setting up Blue
9:46:55 - Blue Walkthrough
10:04:00 - Academy Setup
10:06:28 - Academy Walkthrough
10:50:52 - Dev Walkthrough
11:16:18 - Butler Walkthrough
11:52:41 - Blackpearl Walkthrough
12:16:17 - Conclusion
Thank you brother ❤️❤️
Thank you very much Heath
love you from Nepal
It seems I need to start really from the beginning because a lot is unclear for me.
1 hour in and I understand nothing (example all the ports)
*Does anyone have a place where I can learn all the knowledge that is needed prior to this course?
Thank you for your help
@@harald_schubert I know how to feels.
0:00 - Introduction/whoami
6:20 - A Day in the Life of an Ethical Hacker
23:14 - Effective Notekeeping
29:58 - Important Tools
35:23 - Networking Refresher: Introduction
36:39 - IP Addresses
49:50 - MAC Addresses
53:07 - TCP, UDP, & the Three-Way Handshake
58:25 - Common Ports & Protocols
1:04:39 - The OSI Model
1:10:14 - Subnetting
1:37:17 - Installing VMWare / VirtualBox
1:43:37 - Installing Kali Linux
1:50:11 - Configuring VirtualBox
1:53:32 - Kali Linux Overview
1:57:05 - Sudo Overview
2:02:22 - Navigating the File System
2:14:26 - Users & Privileges
2:23:54 - Common Network Commands
2:29:50 - Network Commands Update
2:31:49 - Installing & Updating Tools
2:41:01 - Installing gedit
2:42:46 - Viewing, Creating, & Editing Files
2:48:49 - Scripting with Bash
3:11:28 - Intro to Python
3:13:52 - Strings
3:21:25 - Math
3:27:24 - Variables & Methods
3:38:41 - Functions
3:49:40 - Boolean Expressions
3:54:14 - Relational & Boolean Operators
4:01:13 - Conditional Statements
4:10:13 - Lists
4:20:41 - Tuples
4:23:16 - Looping
4:28:18 - Importing Modules
4:34:24 - Advanced Strings
4:47:47 - Dictionaries
4:55:23 - Sockets
5:00:55 - Building a Port Scanner
5:21:09 - The 5 Stages of Ethical Hacking
5:26:31 - Passive Recon Overview
5:34:07 - Identifying Our Target
5:37:46 - Discovering Email Addresses
5:53:38 - Breached Credentials Part 1
6:01:00 - Breached Credentials Part 2
6:13:00 - Hunting Subdomains Part 1
6:18:35 - Hunting Subdomains Part 2
6:23:30 - Identifying Website Technologies
6:30:39 - Gathering Information w/ Burp Suite
6:39:33 - Google Fu
6:45:09 - Utilizing Social Media
6:50:49 - Installing Kioptrix
6:57:12 - Scanning w/ Nmap
7:17:04 - Enumerating HTTP/HTTPS Part 1
7:32:09 - Enumerating HTTP/HTTPS Part 2
7:47:22 - Enumerating SMB
8:01:46 - Enumerating SSH
8:05:59 - Researching Potential Vulnerabilities
8:20:54 - Our Notes So Far
8:24:03 - Scanning w/ Nessus Part 1
8:34:42 - Scanning w/ Nessus Part 2
8:40:57 - Reverse Shells vs Bind Shells
8:48:02 - Staged vs Non-Staged Payloads
8:51:27 - Gaining Root w/ Metasploit
8:59:13 - Manual Exploitation
9:11:57 - Brute Force Attacks
9:19:50 - Credential Stuffing & Password Spraying
9:33:58 - Our Notes, Revisited
9:37:05 - Capstone Introduction
9:42:54 - Setting up Blue
9:46:55 - Blue Walkthrough
10:04:00 - Academy Setup
10:06:28 - Academy Walkthrough
10:50:52 - Dev Walkthrough
11:16:18 - Butler Walkthrough
11:52:41 - Blackpearl Walkthrough
12:16:17 - Conclusion
It's very helpful man thnk you very much
I'm only 1.5 hours into the course and this was hands down the best explanation I've seen on internet on subnetting so far. Amazing material
same
I’m 30 seconds in and I’m dreading that I read that there’s subnetting involved 😩😩
Kendi memleketimden birilerinin bunlara ilgi duyması iyi hissettiriyor
Agreed
Abla nerden geldin 😄😄
Hardly do training courses like this all the way through, but I'm almost 10 hours in and it's totally worth it!
Thanks for this! I finished an I.T. degree in 2009. I forgot 99% of it, so this was like a refresher. Networking was always my weak spot, and I struggled through the courses. I remember we were given an ip address for our final project, and had to network a fake company with 5000 pc's. I think I went a week without sleeping.
@@ABMOL36 No dear, this seems like a newbie social engineering trick. The comments section is full of this exact same story of yours. Please stay away from us, or you'll be reported. Thank you, dear.
@@ABMOL36 Btw if you're being legit, then it's better to go ask Facebook's support team instead of newbies wanting to become ethical hackers.
@@Dtomper wut
@@S.O.N.E It was my response to a scammer that eventually deleted his comment.
you finished an IT degree and networking is your weak spot?
I must say as a Network Engineer myself, that subnet sheet is very useful!
this video lasted longer than my friends relationship.
🤣💔
xD
@@dystopiaisutopia you wonder why your dad beats you every night
@@bobbyscrelcher Whoa, edgyyy, he was correcting you man. Learn from mistakes.
@@zethcader6478 you wonder why you’re mom left you
Hi everyone! Am extremely excited and feel blessed to click on this video. I know it super long, but so far....am loving every single second about it. I always wanted to do something in the IT filed, but with my busy schedule...I was always contemplating on where do I start, what am I going to focus my studies on and how difficult will it be for me with no IT background? However, watching this video have answered to all the questions. Thanks for taking your time to put this together for people like me.
Ye video sahi me achha h yaa nahi kaam ayega abhi me 1st year me hu engineering complete ho jayega 1st 20 day to me ye prefer kar sakta hu kya ????
@@KrishPatel-lr8cl Engineering and hacking is different bro. So it won't be helpful to u
@@Faker233 bro means IT kar Raha hu information technology ✅
And IT is a part of computer engineering so I called engineering ✅
@@KrishPatel-lr8cl ah yes. ok. Bro but if i watch this video will it be wasting my time or what other suggestions will u give me bc i'm interested in hacking & already learned some basic html and python
You had me at "give back to the community"! Subscribed and will set time aside to watch the full 12 hrs. Thank you!
is this course complete or u need to puchase after watching 12hrs .
12 hours of knowledge in a TH-cam video. Now this is something I will tolerate ads for. Great work 👍
Doesn't if feel great when you give somebody, who deserves it, money by watching a short advertisement?
@@adum2198 people don't understand, they just want everything for free.
Or stop being cheap and get TH-cam premium.
@@biz20072008 or actually be smart and just get an adblocker. ever since i installed one i have barely seen any advertisements on any website, including youtube, all for the price of 0 dollars compared to something you pay for, monthly, for one website.
@@silentwhisper868 and what is that Adblocker ??
I was able to watch the full video. Very detailed descriptions, detailed ways on how to enumerate. 💯 I have learnt ALOT. Going for the next 12 hours now.
I just completed it , He is the best mentor ❤️
where is the link of next 12 hours?
@@udhayathiruna in the video description
Great course, but it would be very great to have the video segmented into chapters. For those of us who are familiar with the basics and looking for specific chapters, it would be amazing!
Check the description
@@johnnysnakes7765 you can’t trick anyone whit something that cheap
@@zhanucong4614 what do you mean
@@iSyre johny snakes sounds like bot
*hacker sniper50 official page*
*Thank you for your guidance, I really appreciate it.* 🇺🇸🇺🇸🇺🇸🇺🇸
I'm 4,5 hours into this lesson so far and I'm loving it. It's really well made. Good structure and easy to follow. I especially like how you've divided everything into small sections or videos (that you've also timestamped). It makes learning all this so much more digestible in my opinion. Thank you so much for making this.
Bro , could you help me my pip doesnt installll.
@@zaamin8544 Maybe your pip is too small.
Jokes aside I don't know how to help with that because you didn't provide any information. You didn't tell me what you tried that didn't work, you didn't write down any error messages. How am I supposed to help you mate?
@@K4113B4113 nah I managed to do it. Thanks anyways.
@@K4113B4113 nerd
@@cIockwis_e 🤓
Thank you for your time, as well as, creating such an "in-depth" layout of what will be expected. It was very informative and easy to follow. Again, thank you for this! Very much appreciated.
where the replies
@@av1871 😂😂😂
*hacker sniper50 official page*
*Thank you for your guidance, I really appreciate it.* 🇺🇸🇺🇸🇺🇸🇺🇸
*hacker sniper50 official page*
*Thank you for your guidance, I really appreciate it.* 🇺🇸🇺🇸🇺🇸🇺🇸
*hacker sniper50 official page*
*Thank you for your guidance, I really appreciate it.* 🇺🇸🇺🇸🇺🇸🇺🇸
You’re really doing a great work helping my journey into computer forensics. Your courses are better than any other
I agree! My dad went to school for that and I have a lot of books on the subject but nobody explains what I needed to know better…
it has been a month and I'm still watching , this course is amazing.
how did it go
What a great guy and even a better mentor!! Added this to my playlist on youtube and look forward to checking back in on your content! Hope all is well, keep up the great content!
I already know how to program through years of doing it but haven't really touched up on ethical hacking. It is very useful to know what is going on when you or someone else is being hacked, and I appreciate that this it is free course you have spent a long time making. Since I just want to learn the basics of ethical hacking to prevent some it, I don't really feel the need to buy paid ethical hacking courses. 💖
Well coding can be applied to any job. It's not needed for every IT job but can be used for most IT jobs. Project managers, network engineers, software engineers, security engineers or cyber security, data analysts and scientists can all use it. I'm not sure how many jobs have to know it but they can all use it and get paid more in their fields if they know how to code.
I have some tasks that I present to whoever can accomplish them, I will give him $500 on a daily basis. Whoever can communicate with me and reach an understanding on this must be an expert in the prohibited sites
What u learnt
Thanks Heath, this has been great and you are very good at simplifying it for those of us who are new to the field. I will likely buy several of your next lessons and look forward to learning more from you. Maybe we will work together in the future.
5 stars are not enough to rate how amazing and how much effort was made to make this. Amazing Course.
Am 3 hours in and I think this course is great! 👍🏻 just wanted to say thank you 🙏 very well explained and ease to understand your a great teacher
Did you complete? Is it enough for bug bounty?
@@Khan_Adventures im currently in the latter years of my IT degree so I have a little background in the workings on security and IT working. I just reached the 3 hour mark and so far it seems like a good foundation. I havent got super into the nitty gritty of the hacking portion with Metasploit, beef, nmap, etc so I cant say for sure for bug bounties but it seems like a good starting point that could pretty reasonably get to a point to do bug bounties.
@@Khan_Adventures sorry I just saw ur message I still haven’t finished so I wouldn’t be able to tell u just yet … but I’ll keep u posted 🤘
@@Khan_Adventures yes and the class is great but in my opinion it’s not enough for big bounty’s
Started the course yesterday just wrapping up. Thank You for giving back 💯💯
I'm a little over 4 hours into the video and I'm loving it. I had taken a basic Python course prior and it's a refresher for me so I appreciate that you are able to keep it short, to the point, and interesting. What drove me to make a comment is this is the first time I have been able to make a note taking platform that worked for me. Thank you so much for teaching me a skill that I can take anywhere I go even outside an education environment. I have never been more effective at note taking. Keep up the good work and I have every intention of going through more of your courses before I begin my Bachelors Program.
Hey bro ...need a help
@@cartoons2865 With?
With Hacking can we talk on instagram can I get your I'd
@Infamous My bad for a late response I'm not big on checking my YT. I have no professional experience but I have been a big tech guy since early high school (about ten years). This course is great for a complete beginner in cyber security, but it really only has a networking "refresher". I would recommend taking a more in depth entry level networking class if that's what you're looking for. Google offers a course that covers networking pretty well and you get a recognized cert from it.
Subnetting and networking in general has always been a massive pain for me. Thank you for covering network stuff so in-depth before moving into the other areas first. It really has helped me remember a lot of stuff that I have forgotten over the years - I don't use subnetting day-to-day, and it is a very perishable skill. Hard to learn, easy to forget. Thank you for taking the time to explain it. :)
your not alone bro
Commong subnetting is easy
Subnetting is not that hard. Took me about 3 weeks of doing exercises. Once you learn it properly it stays with you. Haven't used for years but can still answer subnet questions quite easily
The way you teach i swear it goes straight to the head. Absolutely loved it 😀😀
Thank you very much, man!
I really enjoyed this 12-hour journey (it took much more than that). Learnt lots of stuff about hacking and IT. Thank you!
yeah did take a lot of time but for sure worth it!
I have this course and haven't yet planned to open it. Quite busy. Will go in for this video and then to my course. Thank you for giving us this course on TH-cam. God bless. 👍
I really like listening to you man… You’re a really nice guy and cover all the bases. I just jumped into this by accident but I’m so interested that I watched the whole vid and now I’ve started looking into studying this subject … thank you man.
Having only listened to the first 30 mins I must say I’m extremely impressed with how the speaker challenges any individual to have the correct mindset in pursuing ethical hacking and pen-testing.
Hi sir
I've reached the exploitation part and to be honest, this is a very detailed course that people would pay for. I love the way you teach, when we approach certain command line you explain it thoroughly, the concept behind what we doing, the process, terminologies, tools, even the PIMPMYKALI is super useful and mentioned here. You have approached the challenges with your way and not hesitating to teach us here. Godbless you, my man. Looking forward to learn other courses from your channel and your website!
If you do not have the Cyber Mentor's Subnetting Sheet with you, an easy way to know the number of hosts if a CIDR number is given is to:
1. Subtract CIDR value from 32 (Example: /24. 32 - 24 = 8)
2. Take the difference and use it as power to base 2 (Example: 2^8 = 256)
3. Subtract 2 from the result to get your number of hosts (Example: 256 - 2 = 254 number of hosts)
thank you so much! very helpful
Still didn't understand
You explained the Subnetting perfectly! I was able to understand it the first time you explained it. It really comes down to the math and some logical thinking.
Thank you for your hard work and dedication poured into making this video. I am deeply grateful to you. Great and informative for a complete newbie like myself. The timestamps helped as well, I work with python a lot so I was glad when I could skip a few hours of the video hahaha. Will also definitely be purchasing your other contents after I finished with this video.
Hello again. How do I purchase the materials please?
I bought the course to support you and to have the deeper learning I’ll be needing to look back at as I practice on my own time.
was it any good fam? im planning to buy.
Learnt Soo Much From This Course, Especially The GTFO Bins Was Mind Blowing! Truly Awesome!!
I’m extremely grateful for this information. School has been tough, especially that I’m going online. Watching this video makes everything easier to comprehend for me. I’m forced to purchase the course now. I feel that I need to learn everything that’s presented and get the pen testing cert. mostly important investing into the course will be a way of me saying thank you.
Really have been enjoying this video and your other videos. Excited to keep learning more and more!
I would advice to be careful You gotta love this team. Anom6000hack There's always so upbeat and genuinely seems happy, I admire his positive outlook. He doesn't make mistakes. He seems to have learned a hard lesson but what better way to grow. More power to him! I wish him all the good fortune I'm sure he'll reap in future Endeavours. He's the best here
Hi
I am just starting the 12 hour course. I've always been looking for what I can do and love. I've made 100,000 a year hating my life. I quit that job after 8 years of "lack of stimulation". After listening to darknet diaries and realizing I can be a puzzle solver to help people and get paid to do it...I'm very excited to get started.
Hi, did you finish the course?
Hi are you going to start? Then let's start together.
Are things working out?
@@joyaustin6581 unfortunately I have yet to find a proper onramp
You’re an amazing teacher. I’m so happy I found this video!
Ye video sahi me achha h yaa nahi kaam ayega abhi me 1st year me hu engineering complete ho jayega 1st 20 day to me ye prefer kar sakta hu kya ????
I saved up money for the TCM course and cert from a janky network admin contract where I'm really a Desktop Admin who sits on his hands all day. I cant wait to take this course!
This is absolute gold! Very practical and very affordable training. I highly recommend checking out the full course. You will definitely learn a lot! Thank you for all you do for the cybersecurity community!
Ye video sahi me achha h yaa nahi kaam ayega abhi me 1st year me hu engineering complete ho jayega 1st 20 day to me ye prefer kar sakta hu kya ????
what a way to start 2022! 🔥🔥
you're the only reason someone like me from an unknown country (Syria) with no good internet connection, no power (electricity) and definitely no online transactions possible since most sites block my country's IPs anyway...
really, from the bottom of my heart thank you Heath I wish you and your family a blessed new year and may god aid you in your hardships (since life can't be empty of those)
Mashallah
a message from your brother in Iran :
bro ... don't pay your time on the technology yet ...
ISIS , Sofiani , these terrorists wants to get your dreamy land ....
keep your state , do sport , do military stuff . improve your soul by reading Qoran
defend your land ... we will give you whatever you want about technology whatever we have.... both of us ,we're in Islamic empire
@@spguy7559 what the hell is wrong with you?
@@spguy7559 Then why are you here, go read quoran , bringing up political and religious matters unnecessarly
@@spguy7559 I’m pretty sure following the Koran is what messed up the Middle East, and many other places, to begin with
I haven't finished the full course in udemy :( time is really an enemy. I hope everyone interested in this path sees this video so much value
Is the course on Udemy the same on his website?
it is free?
@@HG-bj6dg this video is just half of the full course
@Mauri Font lol what are you smoking?
@H G it's the half of that is offered in Udemy. Udemy course is 22.5 hours and has sections not included in this course. I am not sure about the price since my company has an enterprise account. And unfortunately , I haven't been able to finish it yet :( fml
@@karasu6182 it's paid, but it is cheap when you get it on sale around $12 I think.
This is absolutely amazing and you are such a great mentor!! I have watched an hour while getting ready for work.... and already absorbed SO MUCH! I will be setting aside a full day this weekend, starting from the beginning with NOTES!!! THANK YOUUU!! ❤️
Ye video sahi me achha h yaa nahi kaam ayega abhi me 1st year me hu engineering complete ho jayega 1st 20 day to me ye prefer kar sakta hu kya ????
@@KrishPatel-lr8cl where are you yapping about anoying indian
Super job explaining and laying out the critical specifics. I already installed KALI VIA USB boot. 2 hrs . into course. I am a Control Systems Lead for factory automation. So I had to learn some networking to use Rockwell Automation software.
Just started the course and the neumonic for the OSI model made me laugh. I remember it from 7 to 1, All People Seem To Need Data Protection :)
I started out transitioning from my current customer service work a couple months ago into the field of Cyber Security and Ethical Hacking got my attention after meeting with a pentester from the company i work for, already had a bit of IT knowledge but decided to start at the basic stuff. A+ course material, Network+ material, Linux (also done your youtube course), understanding/reading python code (also your course and other) and now i felt confident enough to start this course and see if it is to my liking and purchase the full course and maybe several other courses. Again a really big thank you for making these video's and with that helping me to hopefully get a job in the field!
The best guy on the youtube sharing all the necessary info ❤️❤️ appreciate it
I would like to thank you sir, I have never been able to. watch a complete course before. Now i am 5 hours through and i did not get bored :). You do not complicate things and very thorough. 👍👍👍
This is a freaking gold mine, thank you very much.
Very informative and you sir got an amazing voice to listen to.
Where can I get more courses like this that you teach?
Hi, outside of TH-cam, you can find all of our courses at academy.tcm-sec.com
This man Deserves some donation for all this effort. 👏 Thank You for Free Education 🙏
As a 16 year old who understood most of the things after you explained them i would like to thank you for making it possible for everyone to learn about this stuff!!! I really enjoy that you can learn whatever you want nowadays!
im 16 too
@@exo556 same
@@doopie7037 what kind of skills do u have?
@@exo556 nice question
Hey
I love seeing people supporting each other in this messed up world. Thank you.
I have a project that can earn you huge amounts of money... How can we talk privately?
Mnemonic for OSI I'm using was from one of the CompTIA courses and it's stuck in my head since, it's from layer 7 to 1: A Priest Saw Ten Nuns Doing Pushups. Thanks for the course TCM.
Amazing! Now I need a course on how to use this ethical hacking to hack into banks and transfer money without leaving a paper trail. Looking forward to that!
Wow I rediscovered you again *Metaspyclub* !!!! This was my first cybernetics thing I did after I woke up having my partner’s chats showing on my phone after refreshing but mostly amazing to watch what a human being is able to create from scratch with only few tools coming direct from nature wow I'm so glad I found you ! Can't wait to use more services.
First, thank you for sharing this. I was a NetAdmim for a large hospital for several years, years ago. NT was new and HIPAA was not even a thing then. Some of the books were still a thing.... Wanted to return to IT, Pentesting, etc... For awhile. Just starting the video now. Will update when finished, but i did want to thank you for putting this together. BTW, I have been a locksmith for 12 years now. I love the "legal B&E" I can also hand file keys or determine key from pictures, shadow box, or even just seeing a key for less than 5 seconds with about a 90% accuracy. It is a blast!!!
Thats so awesome, the hacker mentality
Thank you for this great piece of content Heath & Team. Its easy to follow and get some ground knowledge on the subject.
Where have you been sir? I was searching all my life for this one.You gained a new fan:)
in the philippines we only have 200 cyber security employee, and this type of videos are very useful to help us!
This was so informative! I am switching careers and what a amazing course! Thank you!
What is your current career?
Just wanted to sy that you are one of a kind man . Keep the holy work . Cheers
After a long time finally I got something worth watching. Thank you TCM.🥰
your subnetting session was very fruitfull. atleast i feel i am 5-6 steps ahead after going through your instructions. I agree i cannot get it very quickly but this was really really helpful
You’re awesome. Your delivery of lectures is very engaging. Thank you really appreciate your dedication.
Man this is insane! No one goes through it like this! Thank you!
You did a phenomenal job with this series. Thank you for your time and effort to share your knowledge in such a succinct and proficient video. I'm beyond grateful for the technicality of your work and the tools and knowledge I now have to go deeper into this field. Stellar work.
please hack pubg uc without ban account
hats off , for such a brilliant man, we are highly thankful to you for giving us your time and skills..
Just found you, and wow. Im a pre noob and very interested now.... Thanks Heath, Great job!
Hey Bro nice Introduction i really think i need to start documanting what i learn , it's great way to deeper understanding and also find your people who are in the same journey thanks for the great free content bro
i hope you all the best
Thanks a lot
😃🤩
Great course! Thank you so much for posting it! I wanted to say that since most of the machines grab a DHCP address from the start, why not remove those password files and have everyone get used to running their ipsweep script to find the IP? When I was going through this course I wanted to cheat as little as possible so that's what I did, unless the device didn't pull DHCP because I needed to run dhclient on it. It felt great to use a script that "I had written" while following the early part of the course to get the address of a target machine. It really felt like building on something I had already learned to do something new. Obviously you are the expert and this is just the suggestion of someone who is grateful for what knowledge you are sharing freely. But that sense of accomplishment was awesome. Thanks again for this video and all the time you must have put into making it!
Great work to you sir.. I really enjoy following up your courses. Ethical hacking cyber security is something I have a deep passion for, tho I have a lot to learn and am happy to have a tutor like you
How are you dear? I made stupid a mistake of turning on 2 Factor Authentication on Facebook. I used Google Authenticator app. Later, totally forgot about Authenticator and reset my phone. Now, although I know the password, I can no longer log in/I have not been able to login to my facebook for weeks because the Google Authenticator is gone. I tried resetting the password, but 2FA is still there. I still have access to the yahoo account associated with the Facebook.
Please help me dear🙏
@@ABMOL36 use your registered numb to recover ,than you will get authentication code on that numb
@@arvlogs505 I dont use my phone number, rather I use my yahoo email
@@ABMOL36 I can help you
Python course recalls the basics quicker than anywhere else. Just seeing in text I would not absorb the content as well. It's incredible how I love bash scripting.
I plan to get the course from your website and the Pentest course (and the Pentest cert) but this is amazing while I save up! Thank you for this! Love your voice!
How is it going?
how did it go
Listing this in the gym>>>>
Bro, you are an awesome teacher
Thank you I learned a lot of things from this video.
I am a software tester but never ended up getting my first job after graduation, almost 3 years now. so Im now getting into pen testing since there is alot of it. I am excited for this!
Best and simpliest explaination of subnets I've ever gotten, Never really understood it until now thanks :)
Anybody else watching this with absolute zero tech background?
I have no experience with using tech in this way. I’m going to learn it
literally same, it's the future . mastering this will bring you great fortune forsure. @@rayzuniga4962
if you have experience with Linux, Network, and Python you can skip to 5:21:06
I have a project that can earn you huge amounts of money... How can we talk privately?
I'm so happy for *Metaspyclub* considering he has come so far ahead, love your professionality the most, keep up the hard work... love from India 🥰❤
I am entirely here because I heard of log 10 awhile back and I was amazed by it
@The Cyber Mentor - 2:59:18 - `seq 1 254` Those are called backticks used in the for loop. Also what is the name of the app that you used for the Assessment notes in 'Our Notes So Far' - 8:20:54 ? Keepnote?
Thanks for this course, extremely helpful.
I really love the way you teach. You are awesome. Love from India ❤️❤️
I have just watch 1.3hours and I really like the subnetting part. It really helpful.
Hi The Cyber Mentor I really liked the first impression of your lectures, I believe you are contributing your community value contribution. Thanks alot.
I hope to be able to get that certificate someday! i have 1 year industrial mechanic and 1 year with transportation and logistics. I really think Pentesting or cyber security in general is the job for me. i love learning computers and have been the family nerd since i got my first computer at 14 years old (2009), But my mom was'nt able to pay for school. The jobs back then were few and far apart also (in the IT buisiness) so i didn't dare take up loans for it. that is my lifes biggest regret.
But its ever to late i guess :D
Keep that good work up!
I‘m sure you can do it
@@0xh04x thanks 😁
right now is one of the best times to be able to learn, cause you can learn anything one, I hope you get a job in IT one day, cause I know you can do it!!!
Thank you sir ,Thank you so much. Really have been enjoying this video . Excited to keep learning more and more!
Amazing explanation on subnet. I used to cast doubt on its existence but now I finally understand.
Great I am 11. A young ethical hacker. This vid was of great help.
Thanks for sharing such amazing content with everyone for free. You are a specimen for everyone who wants to become a cybersecurity specialist.
"dont worry if this doesnt make sence" proceeds to explain ip in a way that i totally understand it for the first time
Heath! is the real MVP. Best course I have taken. Period.
He is such a nice guy and wonderful personality to learn from
I have a project that can earn you huge amounts of money... How can we talk privately?
Thank you for this fabulous educational content, have learned such alot, such a great resource. Have subscribed.
Thank you so so much. God bless you, I wish you great success and health to you, your family and your company for giving us this knowledge. I was just getting curious about ethical hacking and your introduction is what I need.
Thank you so much chief. Really appreciate your effort to share this with us. GOD BLESS your heart. Happy New Year 🎊🎉....
Did he posted full course of ethical hacking?
Unethical hacker turned to a ethical hacker here,I just want to say that what u are doing is great, I wish I had something like this during my transition.
Just started the course and love it already. I thought I’d share, I’ve been a help desk admin for 10 years and a data center admin/ mdm admin for the past two, The best Powershell command I learned was
(get-command verb-command).Parameters
🔥🔥🔥
Or
Get-Command -Verb “Get” -Module “ActiveDirectory”
This helped me so much when trying to build my syntax in Powershell, I will always choose BASH, but if you must work with Powershell, these are a must to use.
I have a project that can earn you huge amounts of money... How can we talk privately?
wheres the unethical course bro
lmao
Demon time 😈
Bro we aren’t black hat hackers
Underrated... easy buddy, this is not the Karl Malone you're looking for.
😂😂
The OSI model is also taught where layer 7 is on top because the applications and software are on the top part of the interface for the user. Layer 1 is the physical layer which is at the bottom of the layers because it is the farthest away from user access. Also remember that routers only route IPs which is easy to remember when working with switches and routers.