Cyber Nash
Cyber Nash
  • 30
  • 35 813
Cybersecurity Analysts course: Lecture 8 - Drive forensics, autopsy and post-mortem
🔍 Embark on an in-depth journey into Drive Forensics and Post Mortem Analysis with Lecture 8 of our cybersecurity analyst course! This session provides practical insights and techniques essential for mastering drive forensics. 💻
Explore the intricacies of partition tables, including GPT and MBR, and understand the various partition types like FAT32, FAT16, NTFS, ext3, and ext4. 📂
Learn how to use GParted to create, modify, and delete partitions in disks/drives, ensuring you can manage and manipulate storage effectively. 🛠️ Discover the power of TestDisk for recovering deleted data, an invaluable skill for any forensic investigator. 🔄
Whether you're a beginner or a seasoned professional, this lecture equips you with the knowledge and hands-on skills needed for effective drive forensics. Don't miss this opportunity to enhance your forensic capabilities! 🔒💾
#Cybersecurity #DriveForensics #PostMortemAnalysis #PartitionTables #GParted #TestDisk #DataRecovery #InfoSec
Переглядів: 43

Відео

Cybersecurity Analysts course: Lecture 7 - Digital Forensics Intro, Case Laws and Incident response
Переглядів 336 місяців тому
🔍 Explore the critical field of Digital Forensics with Lecture 7 of our cybersecurity analyst course! This session focuses on the theoretical foundations of digital forensics, equipping you with the knowledge to tackle cybersecurity incidents with precision and expertise. 💻 Learn the essentials of Incident Response, a key component in managing and mitigating cyber threats effectively. 🛡️ Unders...
Cybersecurity Analysts course: Lecture 5 - Offensive security, Password attacks, social engineering
Переглядів 1236 місяців тому
🔓 Step into the realm of Offensive Security with Lecture 5 of our dynamic cybersecurity analyst course! In this session, we delve deep into the intricacies of offensive tactics, password attacks, and the art of social engineering. 💻 Explore the cyberkill chain from an attacker's perspective, gaining invaluable insights into their methodologies and strategies. 🛡️ Engage in hands-on exercises on ...
Hack The Box: Hacking Bizness
Переглядів 7406 місяців тому
Hi everyone! In this video, we look at a machine in the HTB machines called Bizness and walkthrough it to solve it. Remember to support by liking, Subscribing, and sharing! If you have questions, leave them in the comment section!
Cybersecurity Analysts course Lecture 4: Penetration Testing, Information Gathering, Ethical Hacking
Переглядів 1856 місяців тому
🛡️ Dive into the world of cybersecurity with Lecture 4 of our comprehensive cybersecurity analyst course! In this session, we explore the intricate art of Penetration Testing and Auditing, essential skills for any aspiring cybersecurity professional. 💻 Discover the ins and outs of the cyberkill chain, learn the importance of system patches, and delve into advanced Linux penetration testing dist...
Cybersecurity Analysts course Lecture 3: Network configuration, firewalls, sniffers
Переглядів 1547 місяців тому
Welcome to Lecture 2 of the Cybersecurity Analysts Course! In this session, we delve deep into Network Defense, aligning with the Cisco Network Defense Syllabus. 🚀💻 🔗 Key Topics Covered: Understanding Connection Types Exploring Wireless Password Encryption (WEP, WPA2-PSK, WPA, AES, TKIP) Firewall Fundamentals Intrusion Detection Systems (IDS) Harnessing the Power of Sniffers 💡 Practical Exercis...
Cybersecurity Analysts Course 2024: Week 1 Assignment Solution
Переглядів 777 місяців тому
Hi guys, In this video we look into the solutions for the assignment in week 1 on the terminal navigation. I walk you through on the perspective of linux, however it is worth noting that the same thing applies for MacOS and Windows except the command is different but the arguments(folder names) are the same. Have fun!
Cybersecurity Analysts Course Lecture 2 - Networking, Ports, Protocols, Firewalls
Переглядів 1977 місяців тому
Welcome back, cyber explorers! Get ready to embark on an exciting journey through the digital cosmos in Lecture 2 of our Cybersecurity Analysts course. 🎉 Key Topics Covered: Foundations of Networking: 🏰 Explore networks, servers, clients, switches, and routers for a rock-solid understanding of network architecture. Network Security: 🔒 Learn about firewalls and how they act as the guardians of o...
Lecture 1: SQL Databases
Переглядів 398 місяців тому
Lecture 1: SQL Databases
Free CyberSecurity Course
Переглядів 298 місяців тому
To register for the course, visit: codewiseacademy.pro/student_registration #shorts
Introducing the CodeWise Academy, school of programming and cyber security.
Переглядів 8411 місяців тому
🚀 Welcome to CodeWise Academy: Your Gateway to Tech Excellence! 🚀 🌐 Explore the world of programming, software engineering, cybersecurity, and information security with CodeWise Academy! 🌐 🎓 Short Courses Tailored for You: Dive into our meticulously crafted short courses designed to accelerate your learning journey in the dynamic fields of programming, software engineering, cybersecurity, and i...
CTF: Proving grounds - MoneyBox
Переглядів 914Рік тому
This is a walkthrough of pawning the proving grounds machine, MoneyBox, this is also included in the vulnhub in case you need it locally. Note that you are required to have an account first before beginning. Remember to like and subscribe!
How to solve the M57Biz Forensics Case
Переглядів 2,8 тис.Рік тому
This is a walkthrough for one of the assignments in the cybersecurity BootCamp course, for more information goto codewise.rf.gd/courses To Try this problem, you can check it out at the Digital Corpora website: digitalcorpora.org/corpora/scenarios/m57-jean/ Remember to Like, Share and Subscribe for more videos!
CTF: Hacking Sau
Переглядів 17 тис.Рік тому
CTF: Hacking Sau
Analyzing Evidence Using Autopsy
Переглядів 119Рік тому
Analyzing Evidence Using Autopsy
Cybersecurity BootCamp: Building Payloads with Msfvenom
Переглядів 273Рік тому
Cybersecurity BootCamp: Building Payloads with Msfvenom
Day 4: Information Gathering and Reconnaissance
Переглядів 65Рік тому
Day 4: Information Gathering and Reconnaissance
CS50x: Revision of C's basics
Переглядів 77Рік тому
CS50x: Revision of C's basics
A short introduction of C-Programming for CS50
Переглядів 345Рік тому
A short introduction of C-Programming for CS50
Introduction to python
Переглядів 58Рік тому
Introduction to python
Removing tailing white spaces using nano
Переглядів 362Рік тому
Removing tailing white spaces using nano
Nmap SYN Scan and OS Depetection
Переглядів 1472 роки тому
Nmap SYN Scan and OS Depetection
Performing FTP Operations from the command Terminal
Переглядів 962 роки тому
Performing FTP Operations from the command Terminal
Alternative for metasploit framework: Beast trojan
Переглядів 1,6 тис.2 роки тому
Alternative for metasploit framework: Beast trojan
Social Engineering
Переглядів 2752 роки тому
Social Engineering
How to practice Hacking Safely
Переглядів 4902 роки тому
How to practice Hacking Safely
How to scan for vulnerabilities(CVE) using nmap
Переглядів 9 тис.2 роки тому
How to scan for vulnerabilities(CVE) using nmap
How to create a safe website for free
Переглядів 3172 роки тому
How to create a safe website for free
My Parrot OS Machine
Переглядів 1602 роки тому
My Parrot OS Machine
Introduction to the Cyber Nash Channel
Переглядів 3912 роки тому
Introduction to the Cyber Nash Channel

КОМЕНТАРІ

  • @coolnormalandwelladjusted
    @coolnormalandwelladjusted 5 місяців тому

    Lecture 1 isn’t accessible for some reason.

  • @serkanhy
    @serkanhy 5 місяців тому

    to become root, su is enough.

    • @cybernash
      @cybernash 5 місяців тому

      Yes it is. But privilege escalation is necessary before just executing that.

  • @lowtv2066
    @lowtv2066 6 місяців тому

    Can you steal domain?

    • @cybernash
      @cybernash 6 місяців тому

      Unfortunately not. Domains are registered through the registrar thus far, you can't

  • @atlas_a_symbol
    @atlas_a_symbol 7 місяців тому

    Hello can I test the security protocol of WPA 2 and WPA 3 and compare and contrast using Cisco? How can I test it in real life? I am doing a research about comparing and contrasting the security protocols of both WPA 2 and WPA 3. Can you give me some guidelines? Thank you Nash

    • @cybernash
      @cybernash 7 місяців тому

      Hi, Unfortunately you cant test the security of the security encryption in Cisco. You can however setup your own wireless network at home and modify the security encryption as you perform your tests

    • @atlas_a_symbol
      @atlas_a_symbol 7 місяців тому

      @@cybernash Thank you so much. How can I reach out to you for further help if you don't mind?

    • @cybernash
      @cybernash 5 місяців тому

      info@codewiseacademy.pro

  • @Free.Education786
    @Free.Education786 7 місяців тому

    Please share the link of the next video 📹 like how to use CVE'S after scanning. Thanks 🎉❤

  • @SWARAJSINGH211
    @SWARAJSINGH211 8 місяців тому

    do you have a discord server?

    • @cybernash
      @cybernash 8 місяців тому

      No unfortunately, perhaps as the crowd grows we may have one.

  • @benjaminchristy2691
    @benjaminchristy2691 9 місяців тому

    Thanks man you really helped

    • @cybernash
      @cybernash 6 місяців тому

      Glad I could help

  • @BifaleKalonda
    @BifaleKalonda 9 місяців тому

    Thanks bro🙏

  • @madatch9947
    @madatch9947 10 місяців тому

    What's your linux version? It seems super familiar

    • @cybernash
      @cybernash 10 місяців тому

      Its Kali Linux but instead of running on xfce, I am using gnome. It's the most recent version.

  • @pailmckinnon8580
    @pailmckinnon8580 11 місяців тому

    🤤 "PromoSM"

  • @ДөлөөЖаргалсайхан
    @ДөлөөЖаргалсайхан 11 місяців тому

    help me fb hack

    • @cybernash
      @cybernash 11 місяців тому

      Unfortunately we do not condone or accept malicious hacks

  • @0x00official
    @0x00official 11 місяців тому

    how do you share HTB solutions without getting copyright strike? I did one and my video got taken down

    • @cybernash
      @cybernash 11 місяців тому

      There is no content that isnt originally my work. Perhaps there are sounds or something of that nature that you used...

  • @arkwinger
    @arkwinger 11 місяців тому

    I liked the video, but you say "propose" way too much...

    • @cybernash
      @cybernash 11 місяців тому

      🤣Well I love proposing ideas

    • @arkwinger
      @arkwinger 11 місяців тому

      hahah fair enough! Keep up the good work! @@cybernash

  • @vedantkanoujia
    @vedantkanoujia 11 місяців тому

    best expo!q

  • @kuramamizukage
    @kuramamizukage Рік тому

    wish i could afford ur course but living in 3rd world country its too expensive 🥲🥲

  • @tuturu9419
    @tuturu9419 Рік тому

    Hey bro what do you think of the game hacknet. Do you think i can learn something actually good?

    • @cybernash
      @cybernash Рік тому

      Honestly, I dont find any applicable knowledge there. Take a look at the game, Uplink Hacker Elite for a more handy experience

  • @r3inz404
    @r3inz404 Рік тому

    Do you run it through a Virtual machine or as your overall operating system?

    • @cybernash
      @cybernash Рік тому

      I ran it as a hosting local machine

    • @r3inz404
      @r3inz404 Рік тому

      @@cybernash okey nice. What's your main OS?

    • @cybernash
      @cybernash Рік тому

      @@r3inz404 Linux

    • @r3inz404
      @r3inz404 Рік тому

      which distro?

  • @docmalitt
    @docmalitt Рік тому

    Your infosec is very nice, however your history not so much... There was a city called Troy in ancient Greece and...

    • @cybernash
      @cybernash Рік тому

      Spot on! I'm not much of a history person.

    • @docmalitt
      @docmalitt Рік тому

      @@cybernash hey, don't worry, you will be on top of the world with your knowledge very soon - you are still very young - nothing else will matter. Pursue your dreams (they are obviously binary coded) and enjoy life. Great content. Wish you all the best

    • @cybernash
      @cybernash Рік тому

      @@docmalitt Oh no not at all. We learn as we bleed after all

    • @cybernash
      @cybernash Рік тому

      @@docmalitt I've got 3 linux distros hosted. Elementary, Deepin and Zorin

    • @docmalitt
      @docmalitt Рік тому

      @@cybernash I'm getting very religious about PopOS as my main home system with Kali in VM. I have collected from family 2 ten year old laptops, bought 1 5 yo for 55 USD and 2 RPi 2b's so... Time for a nice home lab. Any particular reason you are mentioning this? Have I missed anything?

  • @POLARTTYRTM
    @POLARTTYRTM Рік тому

    Blud really knows what he is doing, not only that but wastes no time. We're severely lacking this type of content nowadays. If I had these skills I know what I would be doing all day, so I have to watch stuff like this for entertainment only, because I have a very high degree of difficulty understanding abstract things such as hacking, codes, math, etc, but I take great interest in the area and it was always my dream to work as a hacker in the field doing something I like and think is the closest thing to wizardry we have in real life, and of course, look cool for potential friends in the future. -No annoying 1 minute intro with music blasting as loud as an airplane -No "don't do this! this is for educational purposes only" -No clickbait -No waste of time, going straight to the point from the first second of the video -Explains the steps and thought process -No interruptions -No obnoxious annoying "anonymous scary hackerman mask" anywhere -Achieves the goal in 18 minutes unlike people who make a 30-minute video where they talk endlessly and end up teaching literally nothing of value -No annoying background music -Shows how easy a CTF game can be if you just know how to think and what to search for, even if the game is rated as easy -Does not censor or omit information, limiting the knowledge about the process Please don't lose yourself and become like the major obnoxious "hacking" channels where they teach nothing, show nothing, obnoxious anonymous mask everywhere stick to useless talk for hours without saying anything worth your time. Continue with the on-point content and you will make it far. Just be careful not to break youtube TOS regarding hacking videos because youtube is full of bs, most "hacker channels" just show you things and exploits that were patched literally years ago and the people watching them think they are learning something to become the hackerman.

    • @会供価
      @会供価 11 місяців тому

      Dude it’s not that deep bro. It’s a freaking UA-cam video. Don’t lose any sleep 😂😂

    • @misterpoogiesthecat3469
      @misterpoogiesthecat3469 10 місяців тому

      @@会供価 He is speaking fax though.

  • @buggy-c2j
    @buggy-c2j Рік тому

    Happy to find someone in Pitori/PTA teaching Cyber Sec🔥🔥❤‍🔥🔥🔥 Do you have a communicate that I may join?

    • @cybernash
      @cybernash Рік тому

      We've got an Academy coming up soon if you interested...

    • @buggy-c2j
      @buggy-c2j Рік тому

      Most definitely interested@@cybernash

  • @pixlyana
    @pixlyana Рік тому

    can u do game mod app? i used to play the game but its super annoying to much ads

    • @cybernash
      @cybernash Рік тому

      There are many ways to achieve this such as lucky patcher or game guardian for android and apple devices. Another way is manually decomposing and rewriting the DAX variables to redirect them to a proxy but that's a little complicated so I recommend just lucky patcher or game guardian

  • @boitumelomaswanganyi
    @boitumelomaswanganyi Рік тому

    Thanks, but did u have to send it right after the exam cybernash

  • @osmanmusa6030
    @osmanmusa6030 Рік тому

    I love your content keep going

  • @demo1905
    @demo1905 Рік тому

    Thanks for the easy explanation 😊

  • @n.w.r5411
    @n.w.r5411 Рік тому

    nice video

  • @itsd3br33
    @itsd3br33 Рік тому

    Really interesting! I didn’t know hackthebox had this. Thanks for sharing!

  • @tebamoabelo74
    @tebamoabelo74 Рік тому

    Can u be my mentor ? I’m from SA learning cyber

    • @cybernash
      @cybernash Рік тому

      Hi Teba, sure. It would be an honor!

  • @lajkm8847
    @lajkm8847 Рік тому

    Great explanation! I would love to see you explain more CTFs.

    • @cybernash
      @cybernash Рік тому

      Sweet, there'll be more coming in future!

  • @Jennn
    @Jennn Рік тому

    It took me a couple of days but I finally got this one solved thanks to you. Mine was a little different as the first basket exploit 8:25 with just the localhost:80 code was all I needed, cause when I tried to run the code with localhost:80/login 12:23, and send the generated link to maltrail, the maltrail exploit kept appending an extra /login at the end (idk if they updated their code specifically for that since this video but there was an update 2 days ago on github?) but running the initial code you showed and using that generated link for the maltrail code at 14:18 got me the shell. Thank you again, I learned a whole lot.

  • @yanivy1960
    @yanivy1960 Рік тому

    Isn't this against the policy of hackthebox? Edit: I loved the video still, great, easy to understand, also challenges me to change my way of thinking, loved it.

    • @cybernash
      @cybernash Рік тому

      True case. Most testers have issues with just thinking around the challenge at hand but truly everything boils down to the kill chain.

  • @warrenlouw1610
    @warrenlouw1610 Рік тому

    From South Africa? Based on the accent nfana

  • @Free.Education786
    @Free.Education786 Рік тому

    Please make beginner to advance level practical live website hacking, live website bug hunting, live website penetration testing, live website exploitation content video series... 🙏 😊 💯✌❤💚💙💜😍😘🤝

    • @cybernash
      @cybernash Рік тому

      I'll consider that when I hit 1K subscribers at least. Nonetheless sweet consideration!

  • @ManInTheMiddle-m4p
    @ManInTheMiddle-m4p Рік тому

    This is one of the best explanation of this box , great work .. even the flow of information and your thought process is something to learn from great going ..

  • @Iron_Condorr
    @Iron_Condorr Рік тому

    New subscriber, ty for the cool content. I'm learning these methods currently 😊.

  • @SadSquidward420
    @SadSquidward420 Рік тому

    i wish i understood more than 10% of whats happening

    • @cybernash
      @cybernash Рік тому

      You should check the cybersecurity bootcamp course!

    • @Godl_Damon
      @Godl_Damon Рік тому

      ​@@cybernashon your channel?

    • @cybernash
      @cybernash Рік тому

      @@Godl_Damon codewise.rf.gd/courses/

    • @Michael_Jackson187
      @Michael_Jackson187 10 місяців тому

      These are the nice easy ones.

    • @cybernash
      @cybernash 10 місяців тому

      @@Michael_Jackson187 You need to walk before you can run. Objective is to make easy to understand content.

  • @user-ly6eo2ss9r
    @user-ly6eo2ss9r Рік тому

    Thank u!!!

  • @architech5940
    @architech5940 Рік тому

    Keep making videos, and do more videos on undetectable backdoors, imbedding exploits into existing executables, and post exploitation (such as lateral movement through the target machine and gaining elevated privileges). Thanks for the information, and I did subscribe.

  • @ForexSavage666
    @ForexSavage666 Рік тому

    Which version of parrot is that?

  • @allwar23
    @allwar23 Рік тому

    How to scan and bypass systeme with nmap

    • @cybernash
      @cybernash Рік тому

      Nmap is just a mapper used for information gathering and reconnaissance alone, as such you can not do much than gather info with it.

  • @Qwerty_mathics
    @Qwerty_mathics Рік тому

    Big fan mn

    • @cybernash
      @cybernash Рік тому

      Sweet, I appreciate the support!

  • @Qwerty_mathics
    @Qwerty_mathics Рік тому

    I am first to comment, wow

  • @eyadaldossari597
    @eyadaldossari597 Рік тому

    We can't understand your voice is not clear

  • @vishalyadav4621
    @vishalyadav4621 2 роки тому

    Hello sir can u help me

  • @istifanusijabanialexander6868
    @istifanusijabanialexander6868 2 роки тому

    Can you please make a video about android hacking

  • @hamzakhan5067
    @hamzakhan5067 2 роки тому

    Our Boys really Want it

  • @hamzakhan5067
    @hamzakhan5067 2 роки тому

    Bro make video on Undetectable payload for android bro

  • @user-eu2yf6ij2t
    @user-eu2yf6ij2t 2 роки тому

    Where are you from?

  • @rajabudaimu3411
    @rajabudaimu3411 2 роки тому

    did u use telegram????

  • @hello-cl3vm
    @hello-cl3vm 2 роки тому

    Hey bro I might need your help in somethin can you give me you email or somethin

  • @millacentbystander2992
    @millacentbystander2992 2 роки тому

    Made his own Operating system .... Anyone else pick there jaw off the ground. Mind Blown !!!! 🤯🔥