- 30
- 35 813
Cyber Nash
South Africa
Приєднався 3 гру 2021
All the knowledge from the cyber kid all the way to your screens. Curiosity is demolished. Learn, do it and and pull through it. Its all done here with THE CYBER NASH.
Cybersecurity Analysts course: Lecture 8 - Drive forensics, autopsy and post-mortem
🔍 Embark on an in-depth journey into Drive Forensics and Post Mortem Analysis with Lecture 8 of our cybersecurity analyst course! This session provides practical insights and techniques essential for mastering drive forensics. 💻
Explore the intricacies of partition tables, including GPT and MBR, and understand the various partition types like FAT32, FAT16, NTFS, ext3, and ext4. 📂
Learn how to use GParted to create, modify, and delete partitions in disks/drives, ensuring you can manage and manipulate storage effectively. 🛠️ Discover the power of TestDisk for recovering deleted data, an invaluable skill for any forensic investigator. 🔄
Whether you're a beginner or a seasoned professional, this lecture equips you with the knowledge and hands-on skills needed for effective drive forensics. Don't miss this opportunity to enhance your forensic capabilities! 🔒💾
#Cybersecurity #DriveForensics #PostMortemAnalysis #PartitionTables #GParted #TestDisk #DataRecovery #InfoSec
Explore the intricacies of partition tables, including GPT and MBR, and understand the various partition types like FAT32, FAT16, NTFS, ext3, and ext4. 📂
Learn how to use GParted to create, modify, and delete partitions in disks/drives, ensuring you can manage and manipulate storage effectively. 🛠️ Discover the power of TestDisk for recovering deleted data, an invaluable skill for any forensic investigator. 🔄
Whether you're a beginner or a seasoned professional, this lecture equips you with the knowledge and hands-on skills needed for effective drive forensics. Don't miss this opportunity to enhance your forensic capabilities! 🔒💾
#Cybersecurity #DriveForensics #PostMortemAnalysis #PartitionTables #GParted #TestDisk #DataRecovery #InfoSec
Переглядів: 43
Відео
Cybersecurity Analysts course: Lecture 7 - Digital Forensics Intro, Case Laws and Incident response
Переглядів 336 місяців тому
🔍 Explore the critical field of Digital Forensics with Lecture 7 of our cybersecurity analyst course! This session focuses on the theoretical foundations of digital forensics, equipping you with the knowledge to tackle cybersecurity incidents with precision and expertise. 💻 Learn the essentials of Incident Response, a key component in managing and mitigating cyber threats effectively. 🛡️ Unders...
Cybersecurity Analysts course: Lecture 5 - Offensive security, Password attacks, social engineering
Переглядів 1236 місяців тому
🔓 Step into the realm of Offensive Security with Lecture 5 of our dynamic cybersecurity analyst course! In this session, we delve deep into the intricacies of offensive tactics, password attacks, and the art of social engineering. 💻 Explore the cyberkill chain from an attacker's perspective, gaining invaluable insights into their methodologies and strategies. 🛡️ Engage in hands-on exercises on ...
Hack The Box: Hacking Bizness
Переглядів 7406 місяців тому
Hi everyone! In this video, we look at a machine in the HTB machines called Bizness and walkthrough it to solve it. Remember to support by liking, Subscribing, and sharing! If you have questions, leave them in the comment section!
Cybersecurity Analysts course Lecture 4: Penetration Testing, Information Gathering, Ethical Hacking
Переглядів 1856 місяців тому
🛡️ Dive into the world of cybersecurity with Lecture 4 of our comprehensive cybersecurity analyst course! In this session, we explore the intricate art of Penetration Testing and Auditing, essential skills for any aspiring cybersecurity professional. 💻 Discover the ins and outs of the cyberkill chain, learn the importance of system patches, and delve into advanced Linux penetration testing dist...
Cybersecurity Analysts course Lecture 3: Network configuration, firewalls, sniffers
Переглядів 1547 місяців тому
Welcome to Lecture 2 of the Cybersecurity Analysts Course! In this session, we delve deep into Network Defense, aligning with the Cisco Network Defense Syllabus. 🚀💻 🔗 Key Topics Covered: Understanding Connection Types Exploring Wireless Password Encryption (WEP, WPA2-PSK, WPA, AES, TKIP) Firewall Fundamentals Intrusion Detection Systems (IDS) Harnessing the Power of Sniffers 💡 Practical Exercis...
Cybersecurity Analysts Course 2024: Week 1 Assignment Solution
Переглядів 777 місяців тому
Hi guys, In this video we look into the solutions for the assignment in week 1 on the terminal navigation. I walk you through on the perspective of linux, however it is worth noting that the same thing applies for MacOS and Windows except the command is different but the arguments(folder names) are the same. Have fun!
Cybersecurity Analysts Course Lecture 2 - Networking, Ports, Protocols, Firewalls
Переглядів 1977 місяців тому
Welcome back, cyber explorers! Get ready to embark on an exciting journey through the digital cosmos in Lecture 2 of our Cybersecurity Analysts course. 🎉 Key Topics Covered: Foundations of Networking: 🏰 Explore networks, servers, clients, switches, and routers for a rock-solid understanding of network architecture. Network Security: 🔒 Learn about firewalls and how they act as the guardians of o...
Free CyberSecurity Course
Переглядів 298 місяців тому
To register for the course, visit: codewiseacademy.pro/student_registration #shorts
Introducing the CodeWise Academy, school of programming and cyber security.
Переглядів 8411 місяців тому
🚀 Welcome to CodeWise Academy: Your Gateway to Tech Excellence! 🚀 🌐 Explore the world of programming, software engineering, cybersecurity, and information security with CodeWise Academy! 🌐 🎓 Short Courses Tailored for You: Dive into our meticulously crafted short courses designed to accelerate your learning journey in the dynamic fields of programming, software engineering, cybersecurity, and i...
CTF: Proving grounds - MoneyBox
Переглядів 914Рік тому
This is a walkthrough of pawning the proving grounds machine, MoneyBox, this is also included in the vulnhub in case you need it locally. Note that you are required to have an account first before beginning. Remember to like and subscribe!
How to solve the M57Biz Forensics Case
Переглядів 2,8 тис.Рік тому
This is a walkthrough for one of the assignments in the cybersecurity BootCamp course, for more information goto codewise.rf.gd/courses To Try this problem, you can check it out at the Digital Corpora website: digitalcorpora.org/corpora/scenarios/m57-jean/ Remember to Like, Share and Subscribe for more videos!
Cybersecurity BootCamp: Building Payloads with Msfvenom
Переглядів 273Рік тому
Cybersecurity BootCamp: Building Payloads with Msfvenom
Day 4: Information Gathering and Reconnaissance
Переглядів 65Рік тому
Day 4: Information Gathering and Reconnaissance
A short introduction of C-Programming for CS50
Переглядів 345Рік тому
A short introduction of C-Programming for CS50
Removing tailing white spaces using nano
Переглядів 362Рік тому
Removing tailing white spaces using nano
Performing FTP Operations from the command Terminal
Переглядів 962 роки тому
Performing FTP Operations from the command Terminal
Alternative for metasploit framework: Beast trojan
Переглядів 1,6 тис.2 роки тому
Alternative for metasploit framework: Beast trojan
How to scan for vulnerabilities(CVE) using nmap
Переглядів 9 тис.2 роки тому
How to scan for vulnerabilities(CVE) using nmap
Introduction to the Cyber Nash Channel
Переглядів 3912 роки тому
Introduction to the Cyber Nash Channel
Lecture 1 isn’t accessible for some reason.
to become root, su is enough.
Yes it is. But privilege escalation is necessary before just executing that.
Can you steal domain?
Unfortunately not. Domains are registered through the registrar thus far, you can't
Hello can I test the security protocol of WPA 2 and WPA 3 and compare and contrast using Cisco? How can I test it in real life? I am doing a research about comparing and contrasting the security protocols of both WPA 2 and WPA 3. Can you give me some guidelines? Thank you Nash
Hi, Unfortunately you cant test the security of the security encryption in Cisco. You can however setup your own wireless network at home and modify the security encryption as you perform your tests
@@cybernash Thank you so much. How can I reach out to you for further help if you don't mind?
info@codewiseacademy.pro
Please share the link of the next video 📹 like how to use CVE'S after scanning. Thanks 🎉❤
do you have a discord server?
No unfortunately, perhaps as the crowd grows we may have one.
Thanks man you really helped
Glad I could help
Thanks bro🙏
What's your linux version? It seems super familiar
Its Kali Linux but instead of running on xfce, I am using gnome. It's the most recent version.
🤤 "PromoSM"
help me fb hack
Unfortunately we do not condone or accept malicious hacks
how do you share HTB solutions without getting copyright strike? I did one and my video got taken down
There is no content that isnt originally my work. Perhaps there are sounds or something of that nature that you used...
I liked the video, but you say "propose" way too much...
🤣Well I love proposing ideas
hahah fair enough! Keep up the good work! @@cybernash
best expo!q
wish i could afford ur course but living in 3rd world country its too expensive 🥲🥲
Hey bro what do you think of the game hacknet. Do you think i can learn something actually good?
Honestly, I dont find any applicable knowledge there. Take a look at the game, Uplink Hacker Elite for a more handy experience
Do you run it through a Virtual machine or as your overall operating system?
I ran it as a hosting local machine
@@cybernash okey nice. What's your main OS?
@@r3inz404 Linux
which distro?
Your infosec is very nice, however your history not so much... There was a city called Troy in ancient Greece and...
Spot on! I'm not much of a history person.
@@cybernash hey, don't worry, you will be on top of the world with your knowledge very soon - you are still very young - nothing else will matter. Pursue your dreams (they are obviously binary coded) and enjoy life. Great content. Wish you all the best
@@docmalitt Oh no not at all. We learn as we bleed after all
@@docmalitt I've got 3 linux distros hosted. Elementary, Deepin and Zorin
@@cybernash I'm getting very religious about PopOS as my main home system with Kali in VM. I have collected from family 2 ten year old laptops, bought 1 5 yo for 55 USD and 2 RPi 2b's so... Time for a nice home lab. Any particular reason you are mentioning this? Have I missed anything?
Blud really knows what he is doing, not only that but wastes no time. We're severely lacking this type of content nowadays. If I had these skills I know what I would be doing all day, so I have to watch stuff like this for entertainment only, because I have a very high degree of difficulty understanding abstract things such as hacking, codes, math, etc, but I take great interest in the area and it was always my dream to work as a hacker in the field doing something I like and think is the closest thing to wizardry we have in real life, and of course, look cool for potential friends in the future. -No annoying 1 minute intro with music blasting as loud as an airplane -No "don't do this! this is for educational purposes only" -No clickbait -No waste of time, going straight to the point from the first second of the video -Explains the steps and thought process -No interruptions -No obnoxious annoying "anonymous scary hackerman mask" anywhere -Achieves the goal in 18 minutes unlike people who make a 30-minute video where they talk endlessly and end up teaching literally nothing of value -No annoying background music -Shows how easy a CTF game can be if you just know how to think and what to search for, even if the game is rated as easy -Does not censor or omit information, limiting the knowledge about the process Please don't lose yourself and become like the major obnoxious "hacking" channels where they teach nothing, show nothing, obnoxious anonymous mask everywhere stick to useless talk for hours without saying anything worth your time. Continue with the on-point content and you will make it far. Just be careful not to break youtube TOS regarding hacking videos because youtube is full of bs, most "hacker channels" just show you things and exploits that were patched literally years ago and the people watching them think they are learning something to become the hackerman.
Dude it’s not that deep bro. It’s a freaking UA-cam video. Don’t lose any sleep 😂😂
@@会供価 He is speaking fax though.
Happy to find someone in Pitori/PTA teaching Cyber Sec🔥🔥❤🔥🔥🔥 Do you have a communicate that I may join?
We've got an Academy coming up soon if you interested...
Most definitely interested@@cybernash
can u do game mod app? i used to play the game but its super annoying to much ads
There are many ways to achieve this such as lucky patcher or game guardian for android and apple devices. Another way is manually decomposing and rewriting the DAX variables to redirect them to a proxy but that's a little complicated so I recommend just lucky patcher or game guardian
Thanks, but did u have to send it right after the exam cybernash
Absolutely!😛
I love your content keep going
Thanks for the easy explanation 😊
nice video
Really interesting! I didn’t know hackthebox had this. Thanks for sharing!
Can u be my mentor ? I’m from SA learning cyber
Hi Teba, sure. It would be an honor!
Great explanation! I would love to see you explain more CTFs.
Sweet, there'll be more coming in future!
It took me a couple of days but I finally got this one solved thanks to you. Mine was a little different as the first basket exploit 8:25 with just the localhost:80 code was all I needed, cause when I tried to run the code with localhost:80/login 12:23, and send the generated link to maltrail, the maltrail exploit kept appending an extra /login at the end (idk if they updated their code specifically for that since this video but there was an update 2 days ago on github?) but running the initial code you showed and using that generated link for the maltrail code at 14:18 got me the shell. Thank you again, I learned a whole lot.
Sweet!
Isn't this against the policy of hackthebox? Edit: I loved the video still, great, easy to understand, also challenges me to change my way of thinking, loved it.
True case. Most testers have issues with just thinking around the challenge at hand but truly everything boils down to the kill chain.
From South Africa? Based on the accent nfana
Yep!
@@cybernash aweh
Please make beginner to advance level practical live website hacking, live website bug hunting, live website penetration testing, live website exploitation content video series... 🙏 😊 💯✌❤💚💙💜😍😘🤝
I'll consider that when I hit 1K subscribers at least. Nonetheless sweet consideration!
This is one of the best explanation of this box , great work .. even the flow of information and your thought process is something to learn from great going ..
Much appreciated mate!
New subscriber, ty for the cool content. I'm learning these methods currently 😊.
More coming up!
i wish i understood more than 10% of whats happening
You should check the cybersecurity bootcamp course!
@@cybernashon your channel?
@@Godl_Damon codewise.rf.gd/courses/
These are the nice easy ones.
@@Michael_Jackson187 You need to walk before you can run. Objective is to make easy to understand content.
Thank u!!!
Keep making videos, and do more videos on undetectable backdoors, imbedding exploits into existing executables, and post exploitation (such as lateral movement through the target machine and gaining elevated privileges). Thanks for the information, and I did subscribe.
Noted!
Which version of parrot is that?
Its a 2021 version
How to scan and bypass systeme with nmap
Nmap is just a mapper used for information gathering and reconnaissance alone, as such you can not do much than gather info with it.
Big fan mn
Sweet, I appreciate the support!
I am first to comment, wow
We can't understand your voice is not clear
Hello sir can u help me
Can you please make a video about android hacking
Our Boys really Want it
Bro make video on Undetectable payload for android bro
Where are you from?
did u use telegram????
Hey bro I might need your help in somethin can you give me you email or somethin
Made his own Operating system .... Anyone else pick there jaw off the ground. Mind Blown !!!! 🤯🔥