![HackerSploit](/img/default-banner.jpg)
- 468
- 40 767 666
HackerSploit
Kenya
Registrace 2. 11. 2015
HackerSploit is the leading provider of free Infosec and cybersecurity training. Our goal is to make cybersecurity training more effective and accessible to students and professionals. We achieve this by providing essential training on how to attack and defend systems with virtual labs and real-world scenarios. We offer individual and corporate training packages in Penetration Testing & Red Team Operations, Web application penetration testing, and cybersecurity awareness training.
Pentesting Diaries 0x1 - SQL Injection 101
Hey guys, HackerSploit here back again with another video, Welcome to the all-new pentesting diaries series. Pentesting Diaries is a weekly video series, where I will be exploring various pentesting techniques and tools, with the primary objective of demystifying them to provide you with a deeper, more holistic understanding of how specific attack techniques work, what tools to use and how to correctly use these tools to optimize your efficiency.
The lab used in this video can be accessed for free on the CYBER RANGES platform. The links to the platform and lab are listed below:
// CYBER RANGES
CYBER RANGES: app.cyberranges.com
SQL Injection Lab: app.cyberranges.com/scenario/59bb8cec8b68ef17d2962512
//PLATFORMS
BLOG ►► bit.ly/3qjvSjK
FORUM ►► bit.ly/39r2kcY
ACADEMY ►► bit.ly/39CuORr
//SOCIAL NETWORKS
TWITTER ►► bit.ly/3sNKXfq
DISCORD ►► bit.ly/3hkIDsK
INSTAGRAM ►► bit.ly/3sP1Syh
LINKEDIN ►► bit.ly/360qwlN
PATREON ►► bit.ly/365iDLK
MERCHANDISE ►► bit.ly/3c2jDEn
//BOOKS
Privilege Escalation Techniques ►► amzn.to/3ylCl33
Docker Security Essentials (FREE) ►► bit.ly/3pDcFuA
//SUPPORT THE CHANNEL
NordVPN Affiliate Link (73% Off) ►► bit.ly/3DEPbu5
Get $100 In Free Linode Credit ►► bit.ly/39mrvRM
Get started with Intigriti: go.intigriti.com/hackersploit
//CYBERTALK PODCAST
Spotify ►► spoti.fi/3lP65jv
Apple Podcasts ►► apple.co/3GsIPQo
//WE VALUE YOUR FEEDBACK
We hope you enjoyed the video and found value in the content. We value your feedback, If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms.
//THANK YOU!
Thanks for watching!
Благодарю за просмотр!
Kiitos katsomisesta
Danke fürs Zuschauen!
感谢您观看
Merci d'avoir regardé
Obrigado por assistir
دیکھنے کے لیے شکریہ
देखने के लिए धन्यवाद
Grazie per la visione
Gracias por ver
شكرا للمشاهدة
-----------------------------------------------------------------------------------
#HackerSploit #cybersecurity
The lab used in this video can be accessed for free on the CYBER RANGES platform. The links to the platform and lab are listed below:
// CYBER RANGES
CYBER RANGES: app.cyberranges.com
SQL Injection Lab: app.cyberranges.com/scenario/59bb8cec8b68ef17d2962512
//PLATFORMS
BLOG ►► bit.ly/3qjvSjK
FORUM ►► bit.ly/39r2kcY
ACADEMY ►► bit.ly/39CuORr
//SOCIAL NETWORKS
TWITTER ►► bit.ly/3sNKXfq
DISCORD ►► bit.ly/3hkIDsK
INSTAGRAM ►► bit.ly/3sP1Syh
LINKEDIN ►► bit.ly/360qwlN
PATREON ►► bit.ly/365iDLK
MERCHANDISE ►► bit.ly/3c2jDEn
//BOOKS
Privilege Escalation Techniques ►► amzn.to/3ylCl33
Docker Security Essentials (FREE) ►► bit.ly/3pDcFuA
//SUPPORT THE CHANNEL
NordVPN Affiliate Link (73% Off) ►► bit.ly/3DEPbu5
Get $100 In Free Linode Credit ►► bit.ly/39mrvRM
Get started with Intigriti: go.intigriti.com/hackersploit
//CYBERTALK PODCAST
Spotify ►► spoti.fi/3lP65jv
Apple Podcasts ►► apple.co/3GsIPQo
//WE VALUE YOUR FEEDBACK
We hope you enjoyed the video and found value in the content. We value your feedback, If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms.
//THANK YOU!
Thanks for watching!
Благодарю за просмотр!
Kiitos katsomisesta
Danke fürs Zuschauen!
感谢您观看
Merci d'avoir regardé
Obrigado por assistir
دیکھنے کے لیے شکریہ
देखने के लिए धन्यवाद
Grazie per la visione
Gracias por ver
شكرا للمشاهدة
-----------------------------------------------------------------------------------
#HackerSploit #cybersecurity
zhlédnutí: 22 639
Video
HackerSploit Channel Update 2024
zhlédnutí 15KPřed měsícem
Hey guys, HackerSploit here back again with another video. Just wanted to provide you with an update on where I have been and what the content plan is for the channel. Lots of exciting content ahead, and I look forward to continuing the journey we started. I would also like to thank everyone for their support during my absence and for checking in on me. It is greatly appreciated. //PLATFORMS BL...
3 Year Cybersecurity Career Roadmap
zhlédnutí 155KPřed rokem
In this video, I outline a concise 3-year Cybersecurity career roadmap designed for students or professionals looking to get started with a career in Cybersecurity in 2023 and beyond. Slides: bit.ly/3HlM3aw Black Hills 5-Year InfoSec Plan: www.blackhillsinfosec.com/webcast-5-year-plan-infosec/ //PLATFORMS BLOG ►► bit.ly/3qjvSjK FORUM ►► bit.ly/39r2kcY ACADEMY ►► bit.ly/39CuORr //SOCIAL NETWORKS...
Linux Red Team Defense Evasion Techniques - Hiding Linux Processes
zhlédnutí 20KPřed rokem
In this video, I explore the process of evading defenses on Linux by hiding Linux processes with libprocesshider. Defense Evasion consists of techniques that adversaries use to avoid detection throughout their compromise. Techniques used for defense evasion include uninstalling/disabling security software or obfuscating/encrypting data and scripts. Adversaries also leverage and abuse trusted pr...
Linux Red Team Persistence Techniques - SSH Keys, Web Shells & Cron Jobs
zhlédnutí 21KPřed rokem
In this video, I explore the process of establishing persistence on Linux via SSH keys, local accounts, web shells, and Cron Jobs. Persistence consists of techniques that adversaries use to keep access to systems across restarts, changed credentials, and other interruptions that could cut off their access. Techniques used for persistence include any access, action, or configuration changes that...
ChatGPT For Cybersecurity
zhlédnutí 468KPřed rokem
In this video, I go over the process of how to use ChatGPT and cover various examples of how to use ChatGPT for Cybersecurity. ChatGPT is an AI-driven chatbot launched by OpenAI in November 2022. It is trained using Reinforcement Learning from Human Feedback (RLHF). It is built on top of OpenAI's GPT-3.5 family of large language models and is fine-tuned with both supervised and reinforcement le...
Linux Red Team Privilege Escalation Techniques - Kernel Exploits & SUDO Permissions
zhlédnutí 30KPřed rokem
In this video, I explore the process of elevating privileges on Linux by leveraging kernel exploits, local accounts, and misconfigured SUDO permissions. Privilege Escalation consists of techniques adversaries use to gain higher-level permissions on a system or network. Adversaries can often enter and explore a network with unprivileged access but require elevated permissions to follow through o...
LastPass Data Breach - Password Security 101
zhlédnutí 44KPřed rokem
In this episode of CyberTalk, I discuss the latest LastPass data breach (December 2022) and outline a failsafe password management policy for you, your family, and or your business. The following is a set of password security and management guidelines you should follow: 1. Generate secure, random, and complex passwords. 2. Use a new and unique password for every account. 3. Store your passwords...
Windows Red Team Lateral Movement Techniques - PsExec & RDP
zhlédnutí 27KPřed rokem
In this video, I will be exploring the process of performing lateral movement on Windows by leveraging PsExec and RDP. Lateral Movement consists of techniques that adversaries use to enter and control remote systems on a network. Following through on their primary objective often requires exploring the network to find their target and subsequently gaining access to it. Reaching their objective ...
Windows Red Team Privilege Escalation Techniques - Bypassing UAC & Kernel Exploits
zhlédnutí 22KPřed rokem
In this video, I will be exploring the process of privilege escalation on Windows by leveraging various privilege escalation techniques. Privilege Escalation consists of techniques that adversaries use to gain higher-level permissions on a system or network. Adversaries can often enter and explore a network with unprivileged access but require elevated permissions to follow through on their obj...
Windows Red Team - Dynamic Shellcode Injection & PowerShell Obfuscation
zhlédnutí 25KPřed rokem
In this video, I will be exploring the process of dynamically injecting Shellcode into portable executables and PowerShell obfuscation for the purpose of defense evasion on Windows. Defense Evasion consists of techniques that adversaries use to avoid detection throughout their compromise. Techniques used for defense evasion include uninstalling/disabling security software or obfuscating/encrypt...
Updates & Content Schedule - Q4 2022 - Q2 2023
zhlédnutí 9KPřed rokem
This video outlines the latest updates from the HackerSploit team and goes over the content development plan for Q4 2022 - Q2 2023. //CERTIFICATIONS Certified Exploitation & Post-Exploitation Professional (CEPP): cyberranges.clickmeeting.com/exploitation-post-exploitation-3-day-bootcamp/register //PLATFORMS BLOG ►► bit.ly/3qjvSjK FORUM ►► bit.ly/39r2kcY ACADEMY ►► bit.ly/39CuORr //SOCIAL NETWOR...
How To Write A Penetration Testing Report
zhlédnutí 60KPřed rokem
How To Write A Penetration Testing Report
Performing Web Searches From Your Terminal
zhlédnutí 36KPřed 2 lety
Performing Web Searches From Your Terminal
Integrating Suricata With Wazuh For Log Processing
zhlédnutí 35KPřed 2 lety
Integrating Suricata With Wazuh For Log Processing
Threat Detection & Active Response With Wazuh
zhlédnutí 94KPřed 2 lety
Threat Detection & Active Response With Wazuh
Introduction To Intrusion Detection Systems (IDS)
zhlédnutí 33KPřed 2 lety
Introduction To Intrusion Detection Systems (IDS)
Decrypting HTTPS Traffic With Wireshark
zhlédnutí 102KPřed 2 lety
Decrypting HTTPS Traffic With Wireshark
Waiting for another 101❤
How do I make totally 100% "ethical" 🤥 hacking tool
Very detailed. Much appreciated
Hi here, My caldera uses localhost:8888, I was able to connect to it in kali which also host caldera however my windows fail to RS (localhost:7010, localhost:7011) to caldera. Is there anything i am missing out ?
Thanks for the effort. At the start, everything was going smoothly but near end, you confused a lot of things and missed many points that needed explanation for a student. This video seems like it was done without preparations rather it was a hit and try, as your main focus was on completing things not teaching the background, reasoning, and technical details like you missed the explanation of, batch, netcat, job control, webshell, VPN option .among many. We hope that you will explain more, improve the quality of video, and set a teaching standard for the diverse audience(beginners and intermediate) that waited for you for so long
A lot of the time, the payload will not be configured properly. This will result in the following message: [*] Started reverse TCP handler on (some ip will be here) [*] Exploit completed, but no session was created. If anyone else sees this and needs this like me... Type this: set LHOST tun0 ENTER This will change the payload config lhost to whatever your VPN IP is, which is what you are using to connect to the machine.
how do you the hash is NTLM? every where i look it tells me its md5 or whatever
great video
Is good to see hackersploit back
Sir Alexis, how do you do that edit video on the first clip that moving on screen?
very good
Can you please add ppt as well for theory
we need manuel sql injection ...
not able to access the 2nd part of the series
The current version of bandit doesn't have ncat installed. You have to use a different command within the game.
My port for the samba is showing closed after nmap
Can you sir pleas make a tutrial gor hacking using phones cuz im still yunge im 14 pleas its my dream 🙇♂️
Tem um jeito de deixar o seu comentário em português Br não mudando nada usando a mesma voz se eu achar aqui no meu celular eu te mando mensagem aí toda vez que posta da para entender em vários idiomas
i do the same configurations but i cant hide my dns server ..only my ip.
Great content !!!
excellent content
Please make a similar video in order to explain Oauth vulnerability
Great content but the RDP connection is very unstable , and reconnects again and again , on 20MB network connection. can't proceed further
Thanks for this video.
Hi FBI
Hi, FBI.*
can i use these all command and things in kali linux
thank you very much
Thanks man, really appreciate it
After decades it's good to have you back again great mentor
I'm so happy to see you again. I'm happy that you are still alive and safe. I 💕 u
I can listen to this man talking all day, keep it up with the good content
Important video
Great content! You are great teacher! :)
Is it necessary to open the ports on the host machine, or no? If yes, how then?
So you made a video about installation and configuration and skipped the whole installation process?
Happy to see you doing more content. Everything I have watched is adequately explanatory. Genuinely thank you for the work you put in this
Finished watching the whole vid. Very good refresher. Would like to see more webapp stuff
He's back boiesssss
Dear @HackerSploit, we are having trouble downloading the github repository, because it looks like it's infected with a backdoor trojan. Do you know if it is a false positive?
is his old videos like this still useful in 2024?
Welcome back. We missed you.
Sir i am a intermediate backend developer i have some knowledge in Html : 60/100 css: 50/100 Js: 70/100 node js express: 70/100 Mongodb noSQL: 60/100 hbs, bootstrap:45/100 Git : 40/100 This is my current situation in my domain .. So i am writing this comment for asking some doubts about bug bounding i am thinking implement skills in bug hunting but i am unfamiliar in Linux command, i don't know about kali Linux,, in this channel which is better tuturial for me starting bug hunding...
hackerspoit back again with another video 😢
Welcome back🎉
my netcat only shows listening it dosent connect what do i do
thank you
Hi, thank you so much for your video. I know only few basics yet I was able to follow through almost everything and managed to reproduce almost everything. I find it very nice that you take the time to explain things and even do the little extra with the performance tab for time based injections etc. I'm also grateful that most of the process is shown in one take with that not many cuts, it feels like we're seeing the action done live. Furthermore I find it insane for such a gem to be free so THANK YOU SO MUCH, it is struggle to find good and free lessons !
Hey man!
"Hey guys, Hackersploit here back again". Long time ❤
love this guy . our community was blessed with one of the best humans🥲