- 87
- 15 040
9cesec
Приєднався 13 січ 2024
Hi, Welcome to 9cesec. I'm using this channel to journal my progress as i dive into the world of cybersecurity.
Most of my content will be from Tryhackme.com, and I will be sharing what I've learnt and learning.
REPETITION IS THE MOTHER OF SUCCESS.
Most of my content will be from Tryhackme.com, and I will be sharing what I've learnt and learning.
REPETITION IS THE MOTHER OF SUCCESS.
CROSS-SITE SCRIPTING(XSS) | METASPLOITABLE 2
In this video, I walked through some penetration testing techniques for exploiting cross-site scripting(XSS) vulnerability using Metasploitable 2 DVWA machine.
This video is a form of journal and a way I practice what I've learnt.
▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬
DISCLAIMER:
This video is for educational purposes only and demonstrates general penetration testing techniques and procedures. I cannot be held responsible for any damage caused to your computer or software by following these steps. Use this information at your own risk. It is always advisable to seek professional assistance if you are not comfortable performing these procedures yourself. Additionally, some software and tools featured in this video may have specific licensing requirements or limitations. Please ensure you are using them in accordance with their respective terms of use.
▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬
#XSS #metasploitable #pentesting #php #linux #tutorial
0:00 Intro
0:50 What is cross-site scripting XSS?
1:37 How does XSS work?
3:05 Reflected XSS
3:40 Stored XSS
4:23 DOM-Based XSS
6:31 Reflected XSS Lab
8:00 Stored XSS Lab
10:28 Preventing XSS Attack
#XSS #XSS #metasploitable #linux •#webexploitation •#secureshell •#linuxtowindows •#browser •#burpsuite •#curls •#web •#cybersecurity •#offensivesecurity •#hacking
- - -
tryhackme ethicalhacking cybersecurity cybersec hacking informationsecurity pentesting ethicalhacking cybersecuritytraining learnhacking tryhackmecommunity tryhackmerooms cyberwarriors cyberattack cyberdefense cyberthreats cybercrime cyberawareness cyberhygiene cybersavvy cybereducation cyberskills linuxcommunity linuxusers linuxenthusiasts linuxmastery cyberninjas ninjaskills linuxsecrets hiddenfiles shellscripting capturetheflag adventofcyber attacksurfacereduction securityposture networksecurity cybersecurityprofessional phishing dosattacks vulnerabilityexploitation firewall intrusiondetection patchmanagement cyberdefence cyberresilience cybercrime informationsecurity cyberthreats cyberattack cyberprotect
kali linux
linux
nmap
ssl
http
https
ssh
telnet
chargen
port
port numbers
wireshark
- - -
This video is a form of journal and a way I practice what I've learnt.
▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬
DISCLAIMER:
This video is for educational purposes only and demonstrates general penetration testing techniques and procedures. I cannot be held responsible for any damage caused to your computer or software by following these steps. Use this information at your own risk. It is always advisable to seek professional assistance if you are not comfortable performing these procedures yourself. Additionally, some software and tools featured in this video may have specific licensing requirements or limitations. Please ensure you are using them in accordance with their respective terms of use.
▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬
#XSS #metasploitable #pentesting #php #linux #tutorial
0:00 Intro
0:50 What is cross-site scripting XSS?
1:37 How does XSS work?
3:05 Reflected XSS
3:40 Stored XSS
4:23 DOM-Based XSS
6:31 Reflected XSS Lab
8:00 Stored XSS Lab
10:28 Preventing XSS Attack
#XSS #XSS #metasploitable #linux •#webexploitation •#secureshell •#linuxtowindows •#browser •#burpsuite •#curls •#web •#cybersecurity •#offensivesecurity •#hacking
- - -
tryhackme ethicalhacking cybersecurity cybersec hacking informationsecurity pentesting ethicalhacking cybersecuritytraining learnhacking tryhackmecommunity tryhackmerooms cyberwarriors cyberattack cyberdefense cyberthreats cybercrime cyberawareness cyberhygiene cybersavvy cybereducation cyberskills linuxcommunity linuxusers linuxenthusiasts linuxmastery cyberninjas ninjaskills linuxsecrets hiddenfiles shellscripting capturetheflag adventofcyber attacksurfacereduction securityposture networksecurity cybersecurityprofessional phishing dosattacks vulnerabilityexploitation firewall intrusiondetection patchmanagement cyberdefence cyberresilience cybercrime informationsecurity cyberthreats cyberattack cyberprotect
kali linux
linux
nmap
ssl
http
https
ssh
telnet
chargen
port
port numbers
wireshark
- - -
Переглядів: 22
Відео
Advent of Cyber 2024 | Introduction {Tryhackme}
Переглядів 47619 годин тому
Advent of Cyber 2024 - Dive into the wonderful world of cyber security by engaging in festive beginner-friendly exercises every day in the lead-up to Christmas! Here I walkedthrough the introduction room for the upcoming advent of cyber 2024. Sign up on Tryhackme: tryhackme.com/signup?referrer=656cbbd3fafb242fa32c741c Follow along for free at tryhackme.com/r/room/adventofcyber2024 This video is...
SMTP Penetration Testing on Metasploitable 2 | Port 25
Переглядів 48414 днів тому
SMTP - Simple Mail Transfer Protocol is a protocol mostly used to send and receive emails in a network via Port 25. Here I walked through some penetration testing techniques for the SMTB protocol port 25 on Metasploitable 2 Vulnerable machine. This video is a form of journal and a way I practice what I've learnt. ▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬ DISCLAIMER:This video is for educational purposes only a...
PICOCTF2024 | VERIFY | SCAN SURPRISE - Challenge Walkthrough
Переглядів 5321 день тому
Verify & Scan Surprise is a PicoCTF2024 CTF challenge from the PICOCTF website play.picoctf.org/ In this video, I walked-through the challenge showing how to get the flag. You can follow through via play.picoctf.org/practice/challenge/450 & play.picoctf.org/practice/challenge/444 This video is a form of journal and a way I practice what I've learnt. ▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬ DISCLAIMER:This vid...
SMB(SAMBA) Penetration Testing on Metasploitable 2 (Port 139 & 445) | PART 2
Переглядів 14321 день тому
SMB - Server Message Block is a protocol mostly used to transfer files between a windows network using TCP/IP connections via Port 139/445. This is a sequel to SMB(SAMBA) Penetration Testing on Metasploitable 2 (Port 139 & 445) video. Here I walked through some penetration testing techniques for the SMB/SAMBA protocol port 139/445 on Metasploitable 2 Vulnerable machine. This video is a form of ...
SMB(SAMBA) Penetration Testing on Metasploitable 2 (Port 139 & 445)
Переглядів 14421 день тому
SMB - Server Message Block is a protocol mostly used to transfer files between a windows network using TCP/IP connections via Port 139/445. Here I walked through some penetration testing techniques for the SMB/SAMBA protocol port 139/445 on Metasploitable 2 Vulnerable machine using metasploit, nmap and searchsploit tools. This video is a form of journal and a way I practice what I've learnt. ▬▬...
PICOCTF | COOKIES & SCAVENGER HUNT - Challenge Walkthrough
Переглядів 5521 день тому
Cookies & Scavenger Hunt are CTF challenges from the PICOCTF website play.picoctf.org/ In this video, I walked-through the challenge showing how to get the flag. You can follow through via play.picoctf.org/practice/challenge/173 & play.picoctf.org/practice/challenge/161 This video is a form of journal and a way I practice what I've learnt. 0:00 Intro 0:10 Cookies 7:01 Scavenger Hunt #burpsuite ...
COMMAND EXECUTION | METASPLOITABLE 2
Переглядів 147Місяць тому
In this video, I walked through some penetration testing techniques for exploiting command execution vulnerability using Metasploitable 2 DVWA machine. This video is a form of journal and a way I practice what I've learnt. ▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬ DISCLAIMER: This video is for educational purposes only and demonstrates general troubleshooting techniques and procedures. I cannot be held respons...
FILE UPLOAD VULNERABILITY | METASPLOITABLE 2
Переглядів 211Місяць тому
In this video, I walked through some penetration testing techniques for exploiting file upload vulnerability using Metasploitable 2 DVWA machine. This video is a form of journal and a way I practice what I've learnt. ▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬ DISCLAIMER: This video is for educational purposes only and demonstrates general troubleshooting techniques and procedures. I cannot be held responsible f...
PICOCTF | RUNME.PY - Challenge Walkthrough
Переглядів 28Місяць тому
Runme.py is a CTF challenge from the PICOCTF website play.picoctf.org/ In this video, I walked-through the challenge showing how to get the flag. You can follow through via play.picoctf.org/practice/challenge/250 This video is a form of journal and a way I practice what I've learnt. #python #pythonscript #wget #CSS #JS #webexploitation #php #burpsuite •#curls •#web •#cybersecurity •#offensivese...
PICOCTF | UNMINIFY - Challenge Walkthrough
Переглядів 38Місяць тому
Unminify is a CTF challenge from the PICOCTF website play.picoctf.org/ In this video, I walked-through the challenge showing how to get the flag. You can follow through via play.picoctf.org/practice/challenge/426 This video is a form of journal and a way I practice what I've learnt. #sourcecode #unminify #HTML #CSS #JS #webexploitation #php #burpsuite •#curls •#web •#cybersecurity •#offensivese...
FTP Penetration Testing on Metasploitable 2 (Port 21)
Переглядів 3022 місяці тому
File Transfer Protocol(FTP) is a file transfer protocol, used to transfer files between a network using TCP/IP connections via Port 20/21. This is a sequel to FTP Penetration Testing on Ubuntu (Port 21) video. Here I walked through some penetration testing techniques for the FTP protocol port 21 on Metasploitable 2 Vulnerable machine. This video is a form of journal and a way I practice what I'...
FTP Penetration Testing on Ubuntu (Port 21)
Переглядів 2142 місяці тому
File Transfer Protocol(FTP) is a file transfer protocol, used to transfer files between a network using TCP/IP connections via Port 20/21. FTP works as just like HTTP and SMB protocols. When the FTP server is configured in a network then a specific folder is defined as a shared folder in order to share files. Users can access this file server via FTP. Here I walked through some penetration test...
PICOCTF | INSP3CT0R - Challenge Walkthrough
Переглядів 422 місяці тому
Insp3ct0r is a CTF challenge from the PICOCTF website play.picoctf.org/ In this video, I walked-through the challenge showing how to get the flag. You can follow through via play.picoctf.org/practice/challenge/18 This video is a form of journal and a way I practice what I've learnt. #HTML #CSS #JS #webexploitation #php #burpsuite •#curls •#web •#cybersecurity •#offensivesecurity •#hacking ▬▬▬▬▬...
SSH Penetration Testing (Port 22) | Part 2
Переглядів 3052 місяці тому
Secure Shell (SSH) is a cryptographic protocol, this is a method for securely interacting with a computer over an unsecured network. Here I continued through some penetration testing techniques for the SSH protocol port 22 specifically on key based authentication. This video is a form of journal and a way I practice what I've learnt. ▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬▬ DISCLAIMER: This video is for educa...
PICOCTF | SOAP - Challenge Walkthrough
Переглядів 1122 місяці тому
PICOCTF | SOAP - Challenge Walkthrough
PICOCTF | WEBDECODE - Challenge Walkthrough
Переглядів 852 місяці тому
PICOCTF | WEBDECODE - Challenge Walkthrough
ARTSY COMMANDS | How To Get Creative In The Linux Terminal
Переглядів 582 місяці тому
ARTSY COMMANDS | How To Get Creative In The Linux Terminal
PICOCTF | INCLUDES - Challenge Walkthrough
Переглядів 532 місяці тому
PICOCTF | INCLUDES - Challenge Walkthrough
PICOCTF | INSPECT HTML - Challenge Walkthrough
Переглядів 422 місяці тому
PICOCTF | INSPECT HTML - Challenge Walkthrough
PICOCTF | LOCAL AUTHORITY - Challenge Walkthrough
Переглядів 903 місяці тому
PICOCTF | LOCAL AUTHORITY - Challenge Walkthrough
PICOCTF2024 | TIME MACHINE - Challenge Walkthrough
Переглядів 1033 місяці тому
PICOCTF2024 | TIME MACHINE - Challenge Walkthrough
0 - DVWA{DAMN VULNERABLE WEB APPLICATION} | INTRO AND SETUP
Переглядів 823 місяці тому
0 - DVWA{DAMN VULNERABLE WEB APPLICATION} | INTRO AND SETUP
PICOCTF2024 | TRICKSTER - Challenge Walkthrough
Переглядів 1,2 тис.3 місяці тому
PICOCTF2024 | TRICKSTER - Challenge Walkthrough
HYDRA - How to Use Hydra to Bruteforce Passwords {TRYHACKME}
Переглядів 2,6 тис.3 місяці тому
HYDRA - How to Use Hydra to Bruteforce Passwords {TRYHACKME}
PICOCTF2024 | IntroToBurp - Challenge Walkthrough
Переглядів 1353 місяці тому
PICOCTF2024 | IntroToBurp - Challenge Walkthrough
FILE TRANSFER | How to transfer files from WINDOWS to LINUX | Part 2
Переглядів 643 місяці тому
FILE TRANSFER | How to transfer files from WINDOWS to LINUX | Part 2
FILE TRANSFER | How to transfer files from WINDOWS to LINUX | Part 1
Переглядів 2563 місяці тому
FILE TRANSFER | How to transfer files from WINDOWS to LINUX | Part 1
what is the last question answer ?
It will be unlock on December 1st at 16.00 GMT
what was the last answer to submit?
No answer yet until the 1st of December. It will be available to answer by then.
Great video. Lots of good advice. Can you do a video on NMAP / Gobuster / Dirbuster? Using them together and what the thought process is when you find something open? I like the unedited aspect and showing you trying to figure out why something is not working.
Thank you and I appreciate your comment. I will try to make a video on the requested tools much later.
hey i love ur video and its explained really well
Thank you and I appreciate you.
Can you create a video on custom exploit creation
You mean like creating your own exploits for a CTF??
i like your videos!!! keep making those videos for me watch you channel😅
Thank you, I really appreciate your comment😁 And yes I will continue.
what tool pentester use before burpsuite invented?
Not quite sure butt I think it's Nessus.
Thanks man. Love your content, subscribed! Would love to see you do more THM stuff too!
I appreciate you. Yeah more THM coming soonest. Thank you.
clear explanation michael !!! great
Glad it was helpful!
tq
🤝
the discord invite link inside your channel info is invalid
Thank you for that. The link was expired. It's now updated and here is the link as well. discord.gg/wGTJQ3QG
Very Useful 🙌
curl is a nice tool !
Insightful 👍
Thank you🙏
thank you , very helpful <3
You are welcome.
what requirements to run hydra sir, does it need a network adapter for "hacking"?
Did u knew?
No. It doesn’t. It is a tool for online cracking. Adapter is for Wi-Fi. Read more about them
I write cd PicoCFT and its shows ,no such file or directory, what can i do? Please help
That's a folder or directory i created before the video. if you want to follow the exact same steps then create the follow with this command > mkdir PicoCFT
@@9cesec.1 you save me
Thanks man
Good Series, very helpful :)
Thank you
so you are coming in
Hi, i love your videos Very nice explanation, keep it up.
Thank you for your kind words
Nice Video.
Nice video
Awesome man thanks ❤
Thank you
Nice video has been learning a lot
I'm glad to hear that👍
Awesome video. keep it up.
nice
Thank you❤
Nice video❤
Awesome video
Nice video❤
Thank you.
Keep it up.
Thank you. I will.
'Promosm' 😱
nice
Thank you
😔 promo sm