- 41
- 37 682
Dr. K
United States
Registrace 8. 11. 2019
Cyber education from start to finish.
How to explore the Dark Web
Exploring the Dark Web in a mostly "safe" manner utilizing a VirtualBox Kali and ToR browser.
@ToR @kali @cyber @cybersecurity
@ToR @kali @cyber @cybersecurity
zhlédnutí: 14
Video
Kali Tools: Dirb
zhlédnutí 367Před měsícem
#cyber #cybersecurity #dirb #webapplication #vulnerability #hacking #pentesting
The Harvester OSint Tools Kali
zhlédnutí 481Před měsícem
#osint #theharvester #kali github.com/laramies/theHarvester
Basics of Recon-NG
zhlédnutí 831Před 2 měsíci
github.com/lanmaster53/recon-ng #recon-ng #opensource #osint
Enabling Root User in Kali
zhlédnutí 441Před 2 měsíci
#sudo apt update #sudo apt upgrade #sudo apt install kali-root-login #sudo passwd
Wire Shark Basic Setup and Use
zhlédnutí 690Před 8 měsíci
#wireshark #practice drive.google.com/file/d/1NFxYaaQNhQNnhIKjAHBV1unGLU_WKECp/view?usp=drive_link
Windows Vbox: Windows cannot find the Microsoft Software License Terms
zhlédnutí 693Před 8 měsíci
How to fix the error: Windows cannot find the Microsoft Software License Terms #windows #server #server2019 #server2022
OpenSSL Lab with Kali Linux: Using OpenSSL to send Asynchronous Encrypted messages
zhlédnutí 2,3KPřed 10 měsíci
#encryption #cyber #cybersecurity #asynchronous #linux #kali
Home Lab Forensics 5: Volatility
zhlédnutí 278Před 10 měsíci
Cridex: github.com/volatilityfoundation/volatility/wiki/Memory-Samples Cridex Drive: drive.google.com/file/d/1soSHUlYQxcOHHEGQPFRDNMsbNFWjf8TK/view?usp=drive_link Volatility program: www.volatilityfoundation.org/releases #cyber #digitalforensics #cybersecurity
Home Labs Forensics 4: Autopsy
zhlédnutí 208Před 10 měsíci
Exploring deleted data using Autopsy on Linux drive.google.com/file/d/1BdT3NZaXi33riAr-rgJeWPhhC5wRwjan/view?usp=drive_link File #8: dftt.sourceforge.net/ #cybersecurity #cyber #digitalforensics
Home Lab forensics 3: Linux DD (data dump)
zhlédnutí 313Před 10 měsíci
Create a bit-for-bit copy of a USB using the Linux DD command. #cyber #cybersecurity #digitalforensics
Home Lab Forensics 2: Meta Data from media (exif tool)
zhlédnutí 194Před 10 měsíci
Grabbing data such as camera type, picture quality, and even latitude and longitude from a picture. #cyber #digitalforensics #kali #virtualbox
Home Lab 15: Hacking Kioptix1
zhlédnutí 1KPřed 10 měsíci
Using Kali Linux to hack into Kioptrix 1 #cybersecurity #penetrationtesting #cyber #nmap #metasploit
Home Lab Forensics 1: FTK
zhlédnutí 239Před 10 měsíci
Using FTK imager to create a bit-for-bit copy of a USB flash drive and finding deleted images. FTK: go.exterro.com/l/43312/2023-05-03/fc4b78 VirtualBox Extension: www.virtualbox.org/wiki/Downloads #cyber #digitalforensics #copy #ftk #cybersecurity
Home Lab 14: ARP & DNS Spoofing with Bettercap
zhlédnutí 23KPřed 11 měsíci
Home Lab 14: ARP & DNS Spoofing with Bettercap
Learning Linux: Over The Wire: Bandit 1
zhlédnutí 177Před 11 měsíci
Learning Linux: Over The Wire: Bandit 1
Home Lab 13: Browser Exploitation (BeEF)
zhlédnutí 406Před 11 měsíci
Home Lab 13: Browser Exploitation (BeEF)
Home Lab 11: Group Policy & Add Win 10 to Domain
zhlédnutí 155Před rokem
Home Lab 11: Group Policy & Add Win 10 to Domain
Home Lab 10: Server 2019 Active Directory
zhlédnutí 250Před rokem
Home Lab 10: Server 2019 Active Directory
Home Lab 9: PfSense VLans & Domain blocking VBox
zhlédnutí 173Před rokem
Home Lab 9: PfSense VLans & Domain blocking VBox
Home Lab 8: PfSense Install & Basic configuration
zhlédnutí 352Před rokem
Home Lab 8: PfSense Install & Basic configuration
Home Lab 6: OpenVas on Server 2019 and Kioptrix 1
zhlédnutí 229Před rokem
Home Lab 6: OpenVas on Server 2019 and Kioptrix 1
Home Lab 3: Server 2019 Install & Configure
zhlédnutí 323Před rokem
Home Lab 3: Server 2019 Install & Configure
at the point that you have spoofed ARP, is it not possible to become the real end point of the https comms? ie the user thinking he is sending and recieving https but he is on http with you, and you are with https with linkdin?
Do you know is if this will work on Rocky Linux or will some of the commands be different
for your home system there may be some differences. however, once logged into the bandit server the commands are the same.
how to fix problem: "[00:08:34] [net.sniff.dns] dns gateway > local : 1.0.168.192.in-addr.arpa is Non-Existent Domain". I configured brige network and turned off FW and AV
The algorithm is algorithmiging, i found gold❤️
This video was very informative. Well Done. Thank you.
hello, great tutorial! could you tell me why do we have to add an interface for our VLANs and if we should add an interface for each VLAN we create?
Wow, amazing work!
I followed all the steps, and made sure I was getting it right, but it did not work.
Nifty 😎👍🏻
nice
My router as anti arp spoofing, but it still causes lag when I get too many ARP replies, I tried sysctl drop_gratuitous_arp, but did not work. After some time of laggin, I finally blocked it with ebtables -A INPUT -p ARP --arp-gratuitous -j DROP seems to block the arp spoofin and poisonin. But you need a router that runs Linux like openwrt or dd-wrt.
Thank you Doc🙏
Sorry for this but who the hell use the HTTP Here I'm using hstshijack caplet also But it working on android 6 version and below only Soo can you tell the other way to capture the HTTP request of latest version mobile
Thanks for the video. Was helpful
❤
Greenbone is stuck on updating (0:38). Seen this issue in a lot of forums. Any solutions I've tried typing into a command prompt in Linux result in a failure to execute. Help? :)
Dns spoofing isn't working at all for me. I'm using a virtual box Kali machine and I'm testing against my windows host machine, and nothing related to dns works no matter what I do to the settings on either machine. Redirecting traffic is not feasible with my machines. The only thing I can really do is sometimes, but not always, look at http requests and that's it.
I doesn’t work for me… the browser keep going to the correct page and not the one I want it to go …
Same problem
I have an issue, I am using VMware, and after I do the Arp spoofing attack, my Target device, doesn't connect to the internet.
Prob you need a different wireless card and set the vm in bridged mode, good luck
@@-abstrvct-4438 after running net.niff on, I encountered the problem: "[00:08:34] [net.sniff.dns] dns gateway > local : 1.0.168.192.in-addr.arpa is Non-Existent Domain". I don't know how to fix it
Can you do a tutorial on how to use beef with bettercap to redirect the client to your hook page?
Hi thanks for this very educative video Much appreciated But the attack does not work I have two systems which i attempted to use to run this attack one runs kali linux as the main Operating system (Attacking device) And the other one runs Windows 10 as the main OS (Victim device) i followed all the steps but the arp poisoning did not work Please how to i resolve this??
01-2024 using Virtual Machine, has no floppy disk in the hardware lineup. Still get this error.
Please I have a question.. everything works fine but immediately I run the last command net.sniff on … the windows machine seems to disconnect from the internet and no packet was gotten on the Kali machine
Try turning off the firewall and AV
I just turned off the firewall and the machine has no AV… I’ll try the bettercap now
Still the same error… non existence domain
@@awoyefadolapo1435 did u fix this bug? i also face this problem
@@awoyefadolapo1435 same problem
Keep it up!
Thxs 💯
I tried this but why both gateway and attacker mac is different in my case
same in my case
Man, I wish to hug you from here in London. I spent the entire week reading about ARP and DNS poisoning to understand the attack and use it to complete my attacks in the Ethical hacking course. In less than 30 minutes you did that. You are a great teacher, subscribed. Pls don't stop.
How good is this a tutorial if you don't show us how to use the correct file in VB? What if we don't want to download your file?
Thanks so much for your help on this.
What are the adapters you configured for this lab?
I have them set for local
Probably internal adapter
ur amazing professor k , 😎
Thanksss
very helpful tutorial, Thank you very much Sir!
Hey man, this was really useful. Thank you very much!
Can you tell me what kind of laptop you are using. Thanks
At the time of this video, I was using an older desktop. I've since upgraded to an MSI Raider using a 13th Gen I9 processor, 64 GB RAM, and a 4060 graphics card.
Great video. Been working on something similar in my undergrad and this wonderfully helpful.
OMG THIS ACTUALLY WORKED!!! I HAD THE SAME PROBLEM WITH WINDOWS SERVER 2012 AND IT WORKED!!!
👍Excellent presentation Professor K! It looks like I'll fall in love with Linux finally.
Perfect
❤❤❤❤❤❤❤
Thanksss❤❤❤
Hello, I have an issue, when I open root terminal and run bettercap the terminal shows the message zsh: permission denied: bettercap
try adding sudo before your commands, or basically switch to root user, or start terminal as root terminal. that will fix the issues you are facing
Thanks a lot Professor K, I love you❤, I started two weeks ago to learning about this
thanks lot for sharing your knowledge.
Great tutorial, I was looking for a bettercap revision and this was more than enough. Thanks!
You make it look so easy
can you dns spoof two different urls to redirect to .html hosted?
very well explanation. step by step
Plz upload video of termux and its imp commands
شكرا لك اخي ❤️❤️😜