BEGINNER’S Guide To HACKING TERMINOLOGY

Sdílet
Vložit
  • čas přidán 23. 07. 2024
  • “What’re you doing up there?!”
    Happy holidays, everyone! I really hope you enjoy this video; it's considerably shorter than my first video, but I still hope you enjoy it regardless.
    Check out the previous video (a deep dive into Buffer Overflows)!
    • Buffer Overflows: A Sy...
    🔖 My Socials:
    avatar/mascot made with picrew: picrew.me/en/image_maker/1108773
    - full credits to the artist: / mimisentakosen
    - visit her shop: coconala.com/services/1871766... discord server: dsc.gg/crow-academy
    crows-nest.gitbook.io/
    github.com/cr-0w
    / cr0ww_
    💖 Support My Work
    / cr0w
    ko-fi.com/cr0ww
    www.buymeacoffee.com/cr0w
    Join this channel to get access to perks:
    / @crr0ww
    🎵 Kerning City © Copyright Wizet, Nexon, Jungle Book © Copyright Wizet, Nexon
    The images and music used in this video are used under the principle of fair use for the purpose of criticism, comment, news reporting, teaching, scholarship, and research. I do not claim ownership of any of the images/music and they are used solely for the purpose of enhancing the content of the video. I respect the rights of the creators and owners of these images and will remove any image upon request by the rightful owner.
    Copyright Disclaimer under section 107 of the Copyright Act of 1976, allowance is made for “fair use” for purposes such as criticism, comment, news reporting, teaching, scholarship, education, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing.
    🕰️ Timestamps:
    00:00 - Intro
    00:37 - Black Hats
    01:22 - Grey Hats
    02:16 - White Hats
    02:59 - Extra Hats
    03:20 - IP Addresses
    06:16 - Ports
    07:45 - Firewalls
    08:49 - Honey Pots
    09:42 - DoS
    10:32 - DDoS
    11:09 - Servers
    12:34 - Outro
  • Věda a technologie

Komentáře • 67

  • @harsh2314
    @harsh2314 Před rokem +28

    No cap you are one of the best content creator in this field... I watched buffer overflow video first and am in love with the way you make content

    • @crr0ww
      @crr0ww  Před rokem +5

      this is the sweetest comment ever 😭❤️ THANK YOU SO MUCH, im so glad you enjoyed it! 🥹

  • @crr0ww
    @crr0ww  Před rokem +11

    happy holidays, everyone! 🎄 let me know what else you’d like to see in the next one :)
    join our discord server! dsc.gg/crow-academy
    (also the freaking hats at 3:02; take that image with a grain of salt (it's never that dramatic LOL) LANTERN CORP HACKERS OR SOME SH*T IDK)

    • @crr0ww
      @crr0ww  Před rokem

      @@donmo1461 maybe one day ;)

    • @user-ej7fd3re7u
      @user-ej7fd3re7u Před rokem +2

      can you show why http is insecure?

    • @crr0ww
      @crr0ww  Před rokem

      @@user-ej7fd3re7u awesome suggestion! i’ll definitely make sure to cover that :)

  • @irvingirving6275
    @irvingirving6275 Před rokem +6

    Respect. You can communicate clearly complex ideas and make it funny so the knowledge absorption is a lot better. Thank you very much for your work man. You got yourself a subscriber!

  • @phantompuma228
    @phantompuma228 Před rokem +9

    This is really cool!
    The terminology has some similarities to investigations and security, and was super easy to follow and understand, Merry belated Christmas!

    • @crr0ww
      @crr0ww  Před rokem

      thank you so much :D it’s always nice when you can find similarities in different fields like that :))

  • @RendonJr
    @RendonJr Před 5 měsíci

    Just what i was looking for. Good content 🎉

  • @yousefsammar176
    @yousefsammar176 Před rokem

    What a wonderful day to find this channel

  • @Xzurii
    @Xzurii Před rokem +1

    Kerning City in the bg, i think im in love

  • @retsu1957
    @retsu1957 Před rokem

    Nice content. This helps me a lot.

  • @abrahamcamarilloloza4882

    Can you make a video on VPNs? I think this was a super simple way of understanding some concepts, and I would really like your approach to this. Great video! hope CZcams highlights more your channel

    • @crr0ww
      @crr0ww  Před rokem +2

      yes of course! i’ll definitely add VPNs in the next part :) thank you so much ❤️

  • @piyushpatil6874
    @piyushpatil6874 Před rokem

    Really Helpfull !

  • @HTWwpzIuqaObMt
    @HTWwpzIuqaObMt Před rokem +4

    Happy holidays! Maybe make a video about exploit development or on how to improve your own anonimity. Would be interestinf to lots of beginners

    • @crr0ww
      @crr0ww  Před rokem +1

      sounds good! i have a whole binary exploitation playlist planned but i’ll def cover anonymity :) thank you for your comment!

    • @HTWwpzIuqaObMt
      @HTWwpzIuqaObMt Před rokem +1

      @@crr0ww As a side topic you could do a brief introduction to OS hardening. This will open the way to more blue team based content that could be combined with offensive security to highlight both sides of pen testing engagements

    • @crr0ww
      @crr0ww  Před rokem

      @@HTWwpzIuqaObMt yes! i was actually planning on covering a lot more of the blue-teaming side; things like digital forensics and reverse engineering, etc. i can def add in a section or two about os hardening as well :) ty for the suggestion!

    • @HTWwpzIuqaObMt
      @HTWwpzIuqaObMt Před rokem +1

      @@crr0ww oh awesome! Do you have any other social media by any chance? Perhaps discord

    • @crr0ww
      @crr0ww  Před rokem

      @@HTWwpzIuqaObMt yes! i’ve added in my discord to the description of all my videos; you can find me there

  • @inchane4933
    @inchane4933 Před rokem +3

    dude please keep creating content

    • @crr0ww
      @crr0ww  Před rokem

      of course :p !! tysm for commenting :)

  • @hemiilisreal
    @hemiilisreal Před rokem

    i like video very naice , i didnt get the port part a lot but still rest is well explained :)

  • @georgevinueza7249
    @georgevinueza7249 Před rokem +1

    holy maplestory bg music :)

  • @zetsu6566
    @zetsu6566 Před 11 měsíci

    keep doing it

  • @Yurkari
    @Yurkari Před rokem +2

    beast asf

  • @Zihad
    @Zihad Před rokem +3

    great video!
    btw 10:58 Tbps is terabit per second right? And TBps terabyte?

    • @crr0ww
      @crr0ww  Před rokem +3

      thank you so much!! and yeah, you got it :D Tbps = terabits/sec, TBps = terabytes/sec

    • @janoslaszlovasik9161
      @janoslaszlovasik9161 Před rokem

      Fyi there's also TiB meaning tebibyte, not the same as the previous two.

  • @noorkhara1429
    @noorkhara1429 Před rokem +7

    how much honey comes in a honeypot

  • @astranger4810
    @astranger4810 Před rokem +1

    Knowledge 😮

  • @leefhuh
    @leefhuh Před 6 měsíci

    is that maplestory music i hear?

  • @Zooiest
    @Zooiest Před rokem

    I'd say most (D)DoS attacks are done via actual exploits nowadays. Like forcing a Minecraft server to constantly load chunks where you shouldn't be allowed to

  • @NightlockHayze
    @NightlockHayze Před rokem +3

    Hello mate, it is i, Nightlock

  • @skeletron9505
    @skeletron9505 Před rokem

    el barto was here.

  • @Artym_Q
    @Artym_Q Před rokem +3

    you cool man

    • @crr0ww
      @crr0ww  Před rokem

      NAH! YOURE COOL :D TYSM ❤️🥹

  • @danielrivas3444
    @danielrivas3444 Před rokem +6

    after watching this i now, too want to hack

  • @zer0day463
    @zer0day463 Před rokem +2

    Noice video

  • @Abdirahmaann
    @Abdirahmaann Před rokem +2

    What is your type role in IT??

    • @crr0ww
      @crr0ww  Před rokem

      i'm trained as a penetration tester : ) i hope that's what you mean! although i'm trying to shift more onto the red-teaming side of things; thank you for your comment! :D

    • @Abdirahmaann
      @Abdirahmaann Před rokem +1

      @@crr0ww thank bro welcome and subscribed

    • @crr0ww
      @crr0ww  Před rokem

      @@Abdirahmaann thank you so much! :D

  • @doofus989
    @doofus989 Před rokem +2

    system or network - they do have user honey pots now days or files when open leak your ip address -- like fake spn user accounts on active directory

    • @crr0ww
      @crr0ww  Před rokem +2

      oh yeah, most definitely! one of my instructors, nikhil mittal (dude who wrote nishang) has some super cool tools on his github made especially for this purpose :)

    • @doofus989
      @doofus989 Před rokem +1

      i would love to know how many companies actually use honeypots this way - doesnt seem like many tho

    • @crr0ww
      @crr0ww  Před rokem +2

      most fortune companies actually do use active directory with pretty big defensive systems set in place, from things like looking at changes in the registry, general traffic, event ids; which include ids denoting changes to users as well and some crazy things like kerberos auth reqs and stuff (although with some kerberos most of this stuff is hard to discern since the domain controller sends sooooo many of these requests out, but like things 100% still do stick out, for instance, using RC4/NTLM hashes for auth instead of AES, that’ll stick out like a sore thumb, among other things) so it’s a lot more prevalent than people might think! although the super hollywood-esque decoy i’d say is pretty scarce.
      i’d imagine most threat actors, upon discovering a suspiciously out of place user with domain admin privileges would be a bit more cautious, knowing all the defences in place now a days :)

    • @doofus989
      @doofus989 Před rokem

      @@crr0ww yeah, i wasnt sure tho since groups like Guacamaya, phineas fisher make things look easy for bad guys

  • @n.w.r5411
    @n.w.r5411 Před rokem

    man you're pretty funny

  • @sinatra02
    @sinatra02 Před rokem +2

    log are u ben parker 🥴

    • @crr0ww
      @crr0ww  Před rokem +2

      with great secrets comes no transparency 🤫🤐

  • @0x2fd
    @0x2fd Před rokem +1

    Do you have a job now brother?

  • @legion465
    @legion465 Před rokem

    very good Respect From Armenian Hackers Group LEGION