Thank you so much for watching. Please consider subscribing. It's as easy as clicking this link: th-cam.com/users/thecybermentor Part 1: th-cam.com/video/3FNYvj2U0HM/w-d-xo.html Full Course: academy.tcm-sec.com/p/practical-ethical-hacking-the-complete-course All Course Resources/Links: github.com/Gr1mmie/Practical-Ethical-Hacking-Resources Wireless Adapter: amzn.to/3WdyJLc
Completed the course already and also got the other courses. Very informational courses. Passing the PNPT and the OSCP seems to become more and more achievable for me. Thank you, Heath
@@keccak32 It is similar but the PEH course covers even more stuff such as active directory attacks or testing the OWASP Top 10 vulnerabilities on a web app.
i have watched part1 and i have watched 3 hours of part2 , this is by far the best step by step video i have seen for ethical hacking, thank you for making it available here on youtube
Haha, the legend has dropped another epic video 😍. Thanks for the free videos you post here HEATH. Your channel has always been a support to me since I can't afford most paid courses😚
Oh no sir 7:16:15 you don't get to retire!!! : D haha now really, thank you SOOO much for your hard work, I'm doing the PEH on your web and loving it for real, the way that you explain and show man I know I am repeating myself but I'm afraid I can't help it, I love it, you make it so clear and easy to follow and actually I feel encourage to keep going, thank you so much. Currently working on the Dev machine from your PEH course. And you are showing me at least how cool and amazing all this part of the IT is. By the way I am amazed you are share all this much on youtube, I think this is brilliant, so people can access to this knowledge. By the way, love it so much that you start with Kali from the start, loving the OS so much. You and your team do amazing work, lots of praise to Dewalt for that pimpmykali! Bravo!! (I of course, confess I don't understand the 0,1% of it but still I am thankful for someone to help fix stuff for the rest of us who are clueless like me).
A note to anyone tackling Academy with Dirbuster -- I actually managed to fill / on the VM via overfilling the access logs. If you run into this, you'll have to log in and clear out the apache access & error logs and reboot it.
@@leysledge438 it's like you go for cooking lessons and you ask if they teach how to cook beef wellington. fam this is a beginner overview about hacking, cryptography is it's own course in +6 hours. same with networking.
Amazing, thank you so much for the content! I've been searching the past decade for the right career field. I've worn many hats across multiple industries. But I now know that this is it for me. It's fun to solve these puzzles. Looking forward to the other courses.
This is one of the best videos for anyone trying to start ethical hacking. I just have one doubt in the manual buffer overflow, if the vuln server and the immunity debugger both are running on the target system then how to get the EIP value for finding the offset. You just picked it up from the immunity debugger but we wouldnt actually have access to it as its on the target system.
No need to follow the Cisco path with many CXYZ certificates. All the dpkg wrapped smouthly in that valuable video. Thanks !. You are the Super Cyber Mentor.
For anyone fighting with the shellcode section - continue on to the python3 and more, immediately my shellcode started working. Definitely was an encoding issue. This is amazing, thank you so much for the time and effort putting this up. Will 100% be getting the full courses.
If you can't get the badchars portion to work and you have Python3, here's the cheat code - You already know that you have to add 'b' infront of certain things in Python3, but you can't do that with 'badchars' since it'll already be a string and think you're trying to do "bbadchars". You need to: bytes(badchars, encoding = "utf-8")
Python-Venom Windows machine, which says minimum requirements are Windows 7, 8, 10 or newer (At around 3.26Hrs) only needs to go as far as 11, as Co-Spylot will be able to tell us what we were thinking of, in the future, removing the need for any pesky little things like tools, or curiosity, Cheers Adam, great course, as usual. Thanks for making them, all of them.
Im here to thank you very much for this course, i've learned a lot with you, im from cape verd🇨🇻 and i am in this journey to be a ethical hacker...god bless u man and keep up with a good work
I'm running both Kali and Kioptrix as virtual machines, at the same time. In VirtualBox, you can make your own NAT network. In the network settings of each machine, make sure you have chosen "NAT network", then choose the NAT network you have just made. Doing this meant that the arp-scan in the Kali VM was able to see the IP of the Kioptrix VM.
Ipv6 will never be mainstream on internal networks. Maybe for iot devices but it’s easier to maintain access list for ipv4 subnets. Maybe in 2070 when every firewall has a Jarvis AI
Fuzzing script will not work if you have Python3. If you have issues with it crashing at 100 bytes, I suggest looking online for Python3 specific scripts. Here is one I found that may or may not work for my after I tweak it a little. It may work for you or you may find a better one. The important thing to know is that Python3 did not work with this script.
Is anyone running into issues with sublist3r? Any suggestions on how to fix it? I got rid off the virustotal error but sublist3r does not give me any output.
I was trying to brute force this machine (kioptrix.level 1) using hydra and received an error saying: could not connect to ssh://:22 - kex error : no match for method kex algos: I used the same command as shown in this video, can someone help me on this?
helo sir , i really really liked this course , but i am a bit confused by how u started this course with hacking tesla and and suddenly bring kioptrix , and after some time u again bring tesla course , and then again the continuation of the similar course was denied ... , it would really mean alot if u can answer my comment
so glad to watch a step by step for noob like me. and I've been watching through part 1&2, does anyone know whatshould I do next? give me some advice plz
This is something I am VERY good at and will love to do as a job. If I was a consultant and was to have a business to do Ethical Hacking. How much would a small company pay for a 32-40 hours pen test or for what you did in these videos.
Hey! might not get an answer, but nothing came up online so I've got nothing to lose since apparently my google skills are weak: around 2:43:00-2:44:00 you've spoken about 4444 as default being too obvious, any substitute works? Tried looking for recommended ports, nothing came up, so just a random port is better?
Hey, thanks for the super awesome video. I'm just about to sign up for the monthly The All-Access Membership. I have a question about hardware. Which notebook would you recommend as a pro? A MacBook or a Windows/Linux notebook? Thank you
Thanks again for those videos, just a quick question when you were using nessus and running those scan's, are you getting detected from the site administrator?
Awesome! Went through everything..well except the buffer overflow manual method - that would probably need another 15 hrs alone :D Otherwise managed to follow all the rooting walkthroughs successfully.
I have been stuck at 2:42:16 for 3 days as my brute force attack halts after 2 lines and says exploit failed and no access. I ask the chat GPT it says you have samba 2.2 which is an old version. How do I resolve this problem
@tcmsecurityacademy Thanks for a great video course, i have a question regarding the buffer overflow payload. I dont understand the position of the payload. You put the pointer to JMP ESP in the EIP. So we jump to the ESP to execute the shellcode, but you position the shellcode after the EIP at a higher memoryaddress. When looking at the anatomy slide, is the lowest address on top or bottom? Please explain.
thanks so much Heath. Learned so much. please, when i did the pinging on kioptrix level 1, it returned "network is unrecheable". What could be the problrm please?
In brazil the government and the police allow cybercrime since the hacker don't stole any money, but when they do nobody want the fault, so for cyber security it have been a very good country for cyber security to act because the population don't have lots of protection
👋Thank you so much for such a greate course, I just finished the course and 100% I need more 🤟. Which course/s at TCM you recommend to start with?, any discounts if possible. Thank you so much again🙏.
This course is awesome but i have a question. In all the course, each time we attack something, we already have the ip address of the target and we are in the same network. IRL we probably need to find the ip address of the target and even perhaps break into the network to use all the tools like nmap, msf... How can we do that ?
Hi! I'm not using VM. I'm with Parrot OS directly installed on my laptop. Everything is going perfect but i can't install kioptrix. Is there any alternative to it?
Hi, thanks for your awesome tutorial. In fuzzing section of course when when execute 1.py script ,denied try part and just except part of script execute and return crashed at 100bytes.how i can resolve this?
The problem is in the python version, in python2 by default all the values are considered as bytes and in python 3 it is string. Add the .encode('utf-8') in the send line and it should work (at least worked for me). s.send(('TRUN /:./' + buffer).encode('utf-8'))
@@GalaXYZe further in the video he explains it, but you need to change this line s.send(('TRUN /:./' + buffer).encode('utf-8')) python 2 uses bytes as default, but in python 3 the default is string, so you have to encode it.
Thanks for this. I really appreciate this information. However i have a question: how did you get the python script to print a string without parentheses, it keeps giving me errors and also i had to encode that trun string(i went online) before it could work. But im stuck at the offset(encoding isnt working and it doesn't connect)
Update: it took me 3 hrs to find a solution for the offset. It just had to put a "b" before the string quotes both for TRUN and the offset variable, then remove the forward slashes in the trun So it was like: Offset = b"AA0AA1AA2..." s.send(b"TRUN ." + offset) Those are the only things that needed to be changed. I hope it was helpful to whoever came across such problems
Hello, I installed kioptrix, but i can't change the settings as it automatically send me a 'VMWare unrecoverable error" if the vm has not started. I can run it , then access the settings, but can't change the Network to LAN as it is automacally in bridged and greyed when it is running. Can anyone help?
run the xioptrix and from inside it in the up left you will see something called "player" click on it then mange and from manage virtual machine setting.
How long should take every section, for a normal person, to grasp the most? How long is good/wise? Cause I realize that I forget a lot of things, cause too fast me.
do you recommend using a vm of windows or just use my host windows machine? i just don't know how risky it is and don't have enough ram to run 2 windows and kali at the same time? what do you think?
Thank you so much for watching. Please consider subscribing. It's as easy as clicking this link: th-cam.com/users/thecybermentor
Part 1: th-cam.com/video/3FNYvj2U0HM/w-d-xo.html
Full Course: academy.tcm-sec.com/p/practical-ethical-hacking-the-complete-course
All Course Resources/Links: github.com/Gr1mmie/Practical-Ethical-Hacking-Resources
Wireless Adapter: amzn.to/3WdyJLc
As a PNPT holder, I am curious as to of what is differences between the 2023 version and previous versions are. Is there a changelog somewhere?
The update log can be found in the Discord server.
TH-camr Jay Williams "Lets live life" recently has his channel hacked, any tips on getting it back?
Awesome... 14hrs... Subscribed and add for watch later... Thanks bro
How to hack wifi using fluxion. 👇
th-cam.com/video/AQ578zLAnDQ/w-d-xo.html
Completed the course already and also got the other courses. Very informational courses. Passing the PNPT and the OSCP seems to become more and more achievable for me.
Thank you, Heath
It this same as the PEH course on the site?
@@keccak32 It is similar but the PEH course covers even more stuff such as active directory attacks or testing the OWASP Top 10 vulnerabilities on a web app.
u bought the course?
@@breakdance6989 I bought the PEH course when it was 0 dollars because of the pandemic
@@FMisicould you possibly share it
i have watched part1 and i have watched 3 hours of part2 , this is by far the best step by step video i have seen for ethical hacking, thank you for making it available here on youtube
Haha, the legend has dropped another epic video 😍. Thanks for the free videos you post here HEATH. Your channel has always been a support to me since I can't afford most paid courses😚
Oh no sir 7:16:15 you don't get to retire!!! : D haha now really, thank you SOOO much for your hard work, I'm doing the PEH on your web and loving it for real, the way that you explain and show man I know I am repeating myself but I'm afraid I can't help it, I love it, you make it so clear and easy to follow and actually I feel encourage to keep going, thank you so much.
Currently working on the Dev machine from your PEH course. And you are showing me at least how cool and amazing all this part of the IT is.
By the way I am amazed you are share all this much on youtube, I think this is brilliant, so people can access to this knowledge.
By the way, love it so much that you start with Kali from the start, loving the OS so much. You and your team do amazing work, lots of praise to Dewalt for that pimpmykali! Bravo!! (I of course, confess I don't understand the 0,1% of it but still I am thankful for someone to help fix stuff for the rest of us who are clueless like me).
You are a legend people from THM! Proud of taking your courses.
The guy named Joe Schmo living on Fake Street 123 be like 🤨
🤣
🤣😂
I am FINALLY getting around to start watching this video. Part-One is GOOD!
Just finished the series. Thanks Heath, learned a lot from you.
did he teach cryptography?
going back to the roots and updated tutorials !! thx TCM this is what we want!
Super insightful, Thanks for creating such videos for free
Thank you so much Heath, I'll will have to buy the full course. It is amazing 👏
Thank you Heath!!! I just finished 15 hours course and it was so fun and informative!!!!
Is this part 1 part 2 is enough forcomplete course
This was so awesome. Going back and watching it again to see if I can break these boxes in a different method.
just popped my first shell! i can't express my happiness!!!
A note to anyone tackling Academy with Dirbuster -- I actually managed to fill / on the VM via overfilling the access logs. If you run into this, you'll have to log in and clear out the apache access & error logs and reboot it.
Best and beginner guide to Ethical Hacking
One of the fantastic ethical hacking course. Everything is well explained. Thank you so much for this fantastic course love it, keep it up.
Is this part 1 part 2 complete course for Ethical hacking and not more than that
Thanks again. I am enjoying this course!
thanks heath, hope you are doing great , i guess i'll check this course if there is new stuff
nah man after completing this course i can say that IT WORTH EVERY FKN SECOND. great explications and overall great experience. 👍👏
did he teach cryptography?
@@leysledge438 it's like you go for cooking lessons and you ask if they teach how to cook beef wellington. fam this is a beginner overview about hacking, cryptography is it's own course in +6 hours. same with networking.
Thank you so much. You work has done wonders in life.
You're very welcome!
did he teach cryptography?
Amazing, thank you so much for the content! I've been searching the past decade for the right career field. I've worn many hats across multiple industries. But I now know that this is it for me. It's fun to solve these puzzles. Looking forward to the other courses.
Thank you, Heath. It is really a great course. Learnt a lot .❤❤
After this i will be qualified?
Really really helpful for beginners, I learned so much from this🎉
Excellent Video
This is one of the best videos for anyone trying to start ethical hacking. I just have one doubt in the manual buffer overflow, if the vuln server and the immunity debugger both are running on the target system then how to get the EIP value for finding the offset. You just picked it up from the immunity debugger but we wouldnt actually have access to it as its on the target system.
this is a gold mine of information god bless you.
Glad it was helpful!
No need to follow the Cisco path with many CXYZ certificates. All the dpkg wrapped smouthly in that valuable video. Thanks !. You are the Super Cyber Mentor.
For anyone fighting with the shellcode section - continue on to the python3 and more, immediately my shellcode started working. Definitely was an encoding issue.
This is amazing, thank you so much for the time and effort putting this up. Will 100% be getting the full courses.
Awesome course man!
Thank you for everything Heath
This dude is the real fucking top G
I ma getting an error of "Error: Virustotal probably now is blocking our requests" this while running sublist3r.... anyone who knows how to fix it?
it's an older tool, switch to subfinder instead. almost identical in terms of use.
2:55:41
If you can't get the badchars portion to work and you have Python3, here's the cheat code - You already know that you have to add 'b' infront of certain things in Python3, but you can't do that with 'badchars' since it'll already be a string and think you're trying to do "bbadchars". You need to: bytes(badchars, encoding = "utf-8")
i dont understand where do you put this bytes(badchars, encoding = "utf-8") ? cuz i have the same problem
I watched Part 1 and this Part 2. cool!
Is this part 1 part 2 complete for Ethical hacking
it was cool 🥰..tanks for this video man !!
During the reverse shell of the windows vulnserver, if you are encountering problems, try to change the connection of the vm from NAT to bridge
4:22:04 I FINISHED THE COURSE!!! OMGGG
Python-Venom Windows machine, which says minimum requirements are Windows 7, 8, 10 or newer (At around 3.26Hrs) only needs to go as far as 11, as Co-Spylot will be able to tell us what we were thinking of, in the future, removing the need for any pesky little things like tools, or curiosity, Cheers Adam, great course, as usual. Thanks for making them, all of them.
woooo ROOTED MY FIRST MACHINE!! hahaha
Im here to thank you very much for this course, i've learned a lot with you, im from cape verd🇨🇻 and i am in this journey to be a ethical hacker...god bless u man and keep up with a good work
Kioptrix IP will not show up in the arp scan with the NAT config on both machines.
Other than that great tutorial, too bad it can't be followed
I'm running both Kali and Kioptrix as virtual machines, at the same time. In VirtualBox, you can make your own NAT network. In the network settings of each machine, make sure you have chosen "NAT network", then choose the NAT network you have just made. Doing this meant that the arp-scan in the Kali VM was able to see the IP of the Kioptrix VM.
Is reconnaissance, penetration testing and hacking in general going to be a lot more challenging when IPv6 goes mainstream?
Ipv6 will never be mainstream on internal networks. Maybe for iot devices but it’s easier to maintain access list for ipv4 subnets. Maybe in 2070 when every firewall has a Jarvis AI
Fuzzing script will not work if you have Python3. If you have issues with it crashing at 100 bytes, I suggest looking online for Python3 specific scripts. Here is one I found that may or may not work for my after I tweak it a little. It may work for you or you may find a better one. The important thing to know is that Python3 did not work with this script.
I have the same issue. Then I used another script and it's working.
@@anummalik7563 can you give the script that worked please ?
Uhhh which script ru referrin to?
indeed, was just testing and doesn't work, try this one:
#!/usr/bin/python3
import sys
import socket
from time import sleep
buffer = b"A" * 100
HOST = ''
PORT = 9999
while True:
try:
sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
sock.connect(('HOST, PORT))
payload = b'shitstorm /.:/' + buffer
sock.send(payload)
sock.close()
sleep(1)
buffer += b"A" * 100
except:
print("Fuzzing crash at %s bytes" % str(len(buffer)))
sys.exit()
When sending the payload convert the string to utf-8 with .encode('utf-8') like this:
payload = ("TRUN /.:/"+"buffer").encode('utf-8')
s.send(payload)
great videos man exactly what i needed
did he teach cryptography?
dont think so@@leysledge438
Thank you for your efforts
Luv your vids!!
super informative!
Glad it was helpful!
Legend ❤
Best video on youtube on hacking
Just finished these videos, going to buy the certification exam next :D
Happy to hear it!
How did you go about the buffer overflow part?
@@lukuwazzow9553 good question lol. this part was most confusing, i had to go through the videos thrice
Thank you for the upload. Should I use a VPN when practicing the bug crowd bug bounties? How crucial is it to protect your public IP in this field?
I made it. I signed up with your monthly TCM courses.
After this course i will be qualified ?
what is that assessment notes program you use for taking notes? I love the organization
It's called cherrytree. Available on most OSes.
Is anyone running into issues with sublist3r? Any suggestions on how to fix it? I got rid off the virustotal error but sublist3r does not give me any output.
My favourite part fo the video 2:13:48
Thank you sir ❤️
Most welcome
good course. where can i get the VMs used in this course like blue, blackpearl, dev, academy etc.
Why is the https not working when I try and go too the web address? http is working but not 443
I was trying to brute force this machine (kioptrix.level 1) using hydra and received an error saying: could not connect to ssh://:22 - kex error : no match for method kex algos:
I used the same command as shown in this video, can someone help me on this?
me too
helo sir , i really really liked this course , but i am a bit confused by how u started this course with hacking tesla and and suddenly bring kioptrix , and after some time u again bring tesla course , and then again the continuation of the similar course was denied ... , it would really mean alot if u can answer my comment
so glad to watch a step by step for noob like me. and I've been watching through part 1&2, does anyone know whatshould I do next? give me some advice plz
Hi, do you have a deep knowledge in IT?
@@mirshodoripov1035im afraid no
How I can get the dev machine?
Please help me it is not in the provided links.
Amazing sir 👍
Thanks a lot!!
What application are you using for your notes? I am not sure if I caught that.
He introduces the note-taking software in the previous part
I believe he is using keepnote although there are better options
This is something I am VERY good at and will love to do as a job. If I was a consultant and was to have a business to do Ethical Hacking. How much would a small company pay for a 32-40 hours pen test or for what you did in these videos.
Thank you i learned a lot
from you
did he teach cryptography?
@@leysledge438 No this video was all about pen-testing but i really don't know if he has a tutorial for cryptography
Nice video 👍🏾
Thank you too for the teaching us.😁
Hey! might not get an answer, but nothing came up online so I've got nothing to lose since apparently my google skills are weak: around 2:43:00-2:44:00 you've spoken about 4444 as default being too obvious, any substitute works?
Tried looking for recommended ports, nothing came up, so just a random port is better?
Hello, is this course is same one on the TCM academy? Or what is the difference between them
Hey,
thanks for the super awesome video.
I'm just about to sign up for the monthly The All-Access Membership. I have a question about hardware. Which notebook would you recommend as a pro? A MacBook or a Windows/Linux notebook?
Thank you
Thanks again for those videos, just a quick question when you were using nessus and running those scan's, are you getting detected from the site administrator?
Awesome!
Went through everything..well except the buffer overflow manual method - that would probably need another 15 hrs alone :D
Otherwise managed to follow all the rooting walkthroughs successfully.
@The Cyber Mentor Can you explain 3:58:09 part please? I really cant understand
I have been stuck at 2:42:16 for 3 days as my brute force attack halts after 2 lines and says exploit failed and no access. I ask the chat GPT it says you have samba 2.2 which is an old version. How do I resolve this problem
Did you resolve it eventually? Are you using the kioptrix machine that he requested to download?
@tcmsecurityacademy
Thanks for a great video course, i have a question regarding the buffer overflow payload.
I dont understand the position of the payload. You put the pointer to JMP ESP in the EIP. So we jump to the ESP to execute the shellcode, but you position the shellcode after the EIP at a higher memoryaddress. When looking at the anatomy slide, is the lowest address on top or bottom? Please explain.
thanks so much Heath. Learned so much. please, when i did the pinging on kioptrix level 1, it returned "network is unrecheable". What could be the problrm please?
Hey Health , after completing your practical ethical hacking . Do I receive a certificate ?
In brazil the government and the police allow cybercrime since the hacker don't stole any money, but when they do nobody want the fault, so for cyber security it have been a very good country for cyber security to act because the population don't have lots of protection
Nice Sir :D
3:50:57 finding the offset and trying to catch eip.
👋Thank you so much for such a greate course, I just finished the course and 100% I need more 🤟. Which course/s at TCM you recommend to start with?, any discounts if possible. Thank you so much again🙏.
This course is awesome but i have a question. In all the course, each time we attack something, we already have the ip address of the target and we are in the same network. IRL we probably need to find the ip address of the target and even perhaps break into the network to use all the tools like nmap, msf... How can we do that ?
It's ethical hacking so it means that the victim gives you the consent so you are already in their network I guess
@@NnGgnT y but for exemple when you do red team u have to break into the network
@@theobdr599 If you know the hostname you can find the ip
@@theobdr599 But you can get easily the ip of an hostname
Hi! I'm not using VM. I'm with Parrot OS directly installed on my laptop. Everything is going perfect but i can't install kioptrix. Is there any alternative to it?
Hi, thanks for your awesome tutorial. In fuzzing section of course when when execute 1.py script ,denied try part and just except part of script execute and return crashed at 100bytes.how i can resolve this?
The problem is in the python version, in python2 by default all the values are considered as bytes and in python 3 it is string.
Add the .encode('utf-8') in the send line and it should work (at least worked for me).
s.send(('TRUN /:./' + buffer).encode('utf-8'))
I am running into the same, have you found a solution? The comment below this one doesn't seem to open for me
@@GalaXYZe further in the video he explains it, but you need to change this line
s.send(('TRUN /:./' + buffer).encode('utf-8'))
python 2 uses bytes as default, but in python 3 the default is string, so you have to encode it.
Thanks for this. I really appreciate this information. However i have a question: how did you get the python script to print a string without parentheses, it keeps giving me errors and also i had to encode that trun string(i went online) before it could work. But im stuck at the offset(encoding isnt working and it doesn't connect)
Update: it took me 3 hrs to find a solution for the offset. It just had to put a "b" before the string quotes both for TRUN and the offset variable, then remove the forward slashes in the trun
So it was like:
Offset = b"AA0AA1AA2..."
s.send(b"TRUN ." + offset)
Those are the only things that needed to be changed. I hope it was helpful to whoever came across such problems
Hello,
I installed kioptrix, but i can't change the settings as it automatically send me a 'VMWare unrecoverable error" if the vm has not started.
I can run it , then access the settings, but can't change the Network to LAN as it is automacally in bridged and greyed when it is running.
Can anyone help?
run the xioptrix and from inside it in the up left you will see something called "player" click on it then mange and from manage virtual machine setting.
Can I use c++ instead of python in this course??
This is BRILLIANT! thank you so much for sharing
Nice 💯💯💯😎😎
What disto are you using?
Which Linux version and desktop environment you are using?
How long should take every section, for a normal person, to grasp the most? How long is good/wise? Cause I realize that I forget a lot of things, cause too fast me.
Which software are you using?
Love you
you are the best best and the besttt
what software are you using at 2h10m?
do you recommend using a vm of windows or just use my host windows machine? i just don't know how risky it is and don't have enough ram to run 2 windows and kali at the same time? what do you think?
for context: 3:24:27 in the video the part of: downloading our material