- 26
- 61 292
Kumar Priyanshu
Приєднався 18 лют 2021
A N00b in INFOSec, trying to help others by practicing with his own skills.
Відео
Hacking with Go | Building a port scanner
Переглядів 9232 роки тому
This video is made for ethical hackers / penetration testers . The use of Go/Golang has taken up the surge in recent years. So, in this video we're exploring about : 1. how a port scanner works on the lines of NMAP 2. Simple syntax examples in GO 3. how to build a port scanner in GO A like and subscribe would be appreciated if you liked my content. Leave a feedback/suggestion in comments so tha...
Mr. Evil Hacking case Investigation Pt. II
Переглядів 1,1 тис.2 роки тому
Link to the case - cfreds-archive.nist.gov/Hacking_Case.html Other autopsy videos(related to TRYHACKME rooms) - ua-cam.com/video/JPhfB053sig/v-deo.html (Tryhackme Autopsy room for fundamentals), ua-cam.com/video/MtrYfZXbEf8/v-deo.html (Tryhackme Disk analysis room for another case study & methodology). In this video, I have gone over a hacking case and tried to establish links with the suspect(...
Mr. EVIL Hacking Case Investigation with Autopsy
Переглядів 3,1 тис.2 роки тому
Link to the case - cfreds-archive.nist.gov/Hacking_Case.html Other autopsy videos(related to TRYHACKME rooms) - ua-cam.com/video/JPhfB053sig/v-deo.html (Tryhackme Autopsy room for fundamentals), ua-cam.com/video/MtrYfZXbEf8/v-deo.html (Tryhackme Disk analysis room for another case study & methodology). In this video, I have gone over a hacking case and tried to establish links with the suspect(...
Exploring Autopsy | Cyber forensics | Tryhackme | Investigation of cases
Переглядів 3 тис.2 роки тому
Don't forget to subscribe! Disk analysis and autopsy Part I - ua-cam.com/video/MtrYfZXbEf8/v-deo.html Disk analysis and autopsy Part II - ua-cam.com/video/l7fy7WR91EA/v-deo.html Topics covered : Investigation of artifacts from autopsy, introduction to autopsy by sleuthkit, installation of autopsy by sleuthkit for cyber forensics, creating a case for analysis in autopsy, choosing a data source f...
[TryHackMe] Masterminds | Using BRIM for network forensics
Переглядів 3463 роки тому
This video has been created to help penetration testers, ethical hackers, SOC analysts, Tryhackme users, CTF players, Blue team students , cybersecurity students, information security students,cyber forensics students, etc. who are unable to do the network traffic analysis using brim and, this video can be used as a demonstration to learn how to do it. However, in-depth analysis and the syntax ...
Can you CRACK this ? | #EasyCryptography1
Переглядів 2913 роки тому
This video is dedicated towards solving a simple, basic and easy problem with OSINT & CRYPTOGRAPHY as the part of the CTFs. Don't forget to subscribe ! Methodology,approach for beginners can be developed by watching the video. Cryptography for CTFs, OSINT for CTFs, Tips and Tricks for CTFs, how to start CTFs by a beginner or noob. Credits for the problem goes to the DEFCON 9111 DELHI GROUP, whi...
[TryHackMe] Vulnerabilities 101 | Room walkthrough
Переглядів 4,4 тис.3 роки тому
[TryHackMe] Vulnerabilities 101 | Room walkthrough
[TryHackMe] Dunkle materie | Room Walkthrough | Ransomware investigation
Переглядів 2633 роки тому
[TryHackMe] Dunkle materie | Room Walkthrough | Ransomware investigation
[TryHackMe] Investigating Windows - I | Room walkthrough ~ Kumar Priyanshu
Переглядів 2,6 тис.3 роки тому
[TryHackMe] Investigating Windows - I | Room walkthrough ~ Kumar Priyanshu
[TryHackMe] Python Basics - I | Room Walkthrough | Learn python
Переглядів 4193 роки тому
[TryHackMe] Python Basics - I | Room Walkthrough | Learn python
[TryHackMe] Windows Fundamentals 3 | Room walkthrough ~Kumar Priyanshu
Переглядів 5 тис.3 роки тому
[TryHackMe] Windows Fundamentals 3 | Room walkthrough ~Kumar Priyanshu
[TryHackMe] Windows Fundamentals 2 | Room walkthrough ~ Kumar Priyanshu
Переглядів 11 тис.3 роки тому
[TryHackMe] Windows Fundamentals 2 | Room walkthrough ~ Kumar Priyanshu
[TryHackme] Windows Fundamentals 1 | Walkthrough ~Kumar Priyanshu
Переглядів 18 тис.3 роки тому
[TryHackme] Windows Fundamentals 1 | Walkthrough ~Kumar Priyanshu
[TryHackMe] Disk Analysis & Autopsy Usage | Part-II ~Kumar Priyanshu
Переглядів 1,1 тис.3 роки тому
[TryHackMe] Disk Analysis & Autopsy Usage | Part-II ~Kumar Priyanshu
[TryHackMe] Disk Analysis & Autopsy Usage | Part-I ~Kumar Priyanshu
Переглядів 1,9 тис.3 роки тому
[TryHackMe] Disk Analysis & Autopsy Usage | Part-I ~Kumar Priyanshu
Learn Hacking with CTFs | Basic problem-solving | First CTF problem for beginners ~Kumar Priyanshu
Переглядів 1,1 тис.3 роки тому
Learn Hacking with CTFs | Basic problem-solving | First CTF problem for beginners ~Kumar Priyanshu
Some advice I’d give is to definitely go to a dojo and receive training from an instructor, and if that’s not an option stick to basics, the flashy kicks shouldn’t be priority right now. I mention training with an instructor as it’s necessary to have someone point out things to be worked on, such as your guard while you kick, try to keep it still as it’s like a chicken wing at the moment. Keep it up though!
@@TheSpeedOfVideo Thank you so much! You exactly pointed out the problem. I record for the purpose of noticing these mistakes, and I've been trying to get rid of the chicken wing myself for some weeks now. And yes I'll definitely join a dojang soon, because I've seen the irregularities in my training and technique. By the way, do you think in these kicks, guard should be dropped? or should it be kept a bit low/high? Thanks again.
Keep up the great work, sounds like you have a good grasp on the small details, which no doubt means you’ll do great as your training continues! As for the guard on that kick, i would personally say to keep it low and in close to the body.
how you connected to rdp it showing error
Thank you for theae two videos you really helped me to understand autopsy to be able to complete an assignment!!!!!!
please give me a answer for number 6 and What is the account description?
How did you add the magnifier in the window below please? I lost my sight😢😢😢😢😢😢😢😢😢😢😢😢😢😢😢😢😢😢😢😢😢😢
The correct answer - 1554 for question: Using NVD, how many CVEs were published in July 2021? (Vulnerability Databases)
thanks
Thank you bro, nice video please upload more videos like this video
Where is part 2?
he is make v vidio for view where is part 2
Thank you for the video! nice and to the point, thumbs up
My pleasure buddy!
of course your indian 💀💀💀
Thank you
Thank you so much this was so helphuf
My pleasure dude!
Thank you for this, This was super helpful to understand the world of Mr.Evil!
Can u leave a link to code
Hi, in the task 7, the answer What MD5 hash value of the binary is listed as an Interesting File? is changed, If can you help me to risolve the questions please? Thanks 🙏
So, you're saying that the question has been modified and now we need to give the MD5 of the interesting file, right?
@@KumarPriyanshu13 I am seeing the same about the md5 hash
kitni bar OK bolta h bhai
🙂English ki practice krte hue Video bna di bhai...
@@KumarPriyanshu13 aur muje laga tum Saitama baan Gaya h
great walkthrough with explanation thanks man 👏
How to generate hash ? Nothing is showing in hash value.
How to upload "4Dell Latitude CPi.e01" on autopsy ? Because I make a new case and upload there this 4Dell file, but some of the options like "Operating system information (2)" is not showing.
Thank you for the video :) 🙂
really simple room, thanks btw
This was really simple , thanks btw
You're a lifesaver. Thanks!!
I'm glad it helped you!
Nice bro upload more videos bro
Sure I will! Thanks for appreciating
Timestamps: 0:50 : Understanding TCP and Port scanning 5:40 : Developing a Port scanner to scan a single port 15:05 : Enhancing Port scanner with for loop to can multiple ports
Oh man thank god for this video!! I was stuck on the question "What is the account status" for ages... I just could not figure it out, but it certainly makes sense now... Now I can move on. Cheers Kumar
Cheers paige😉..Glad to help you.
🤩🙌❤️Cheers 👌
It was really technical windows fundamentals 2 part. really difficult to understand. but easier with this video. i hope i am going to be better to understand this windows
new beginner here and i felt like an idiot in this room:)
Haha..similar feelings happened to me at my start. But,it's a long journey you'll improve with time. Keep your confidence intact!
Great content, thanks for this help.
My pleasure buddy.
nice video
Thanks😀
Thank you so much
How would you get the image of the computer in the real world? Do you run Autopsy on it and it collects all this info?
Autopsy is for image analysis only. What you are talking is the data/disk acquisition and image creation. There are many tools to do so ,one of them being FTK imager. It is more of practical and real world thing, which would be done usually in police investigations. There are many methods to do the acquisition and you can check them here: info-savvy.com/data-acquisition-methods/
Here is some more resource for you as beginner : itmasters.edu.au/free-short-course-digital-forensics-updated/
não acredito que era só isso
não entendi, você está dizendo isso de um jeito engraçado ou está insatisfeito?
@@KumarPriyanshu13 estou dizendo de uma forma engraçada, que era tão fácil e eu não consegui ver o que estava na minha frente, obrigado por me ajudar.
@@RM1988. Obrigado pela apreciação. Espero que você esteja indo bem
Can we get the rest of it?
Yeah, it's coming soon. Stay tuned. Just a couple of days.
Hey, its published. ua-cam.com/video/r4FgoS1iiYE/v-deo.html
Bhai dekhne ke liye sab cool hai par karne ke liye phategi sabki 😂😂😂
areee mere commerce k shershah😂😂
Dhanyavaad (I know you can understand Hindi )
😃😃😃shukriya
thanks for the video...well explained <3
4:49 matlab :)
😂😂kya kre bhai.. Apne bhasha aa hi jati h bich me
thanks for help
Welcome !
Thank you for this. It really helped a lot.
Glad to help you.
thank you again, Sir!
Glad to help you, brother!
Thank you for the video walkthrough!
Thanks for watching and enjoying.
Bhai 11th 12th mae computer science padhai ki hai bolne ke liye sharam aarahi hai 😂😂 kuch samaj hee nahi aaraha sab kuch naya naya hai 😂😂
Phuti kismat tmhari🤣.. Koi baat nahi.. Vese bhi samajh nhi aayega ese😂
Can you explain the differences between netsh, net, wmic commands?
Hello! Wmic refers to windows management instrumentation command-line( actually is a set of commands which helps you in managing windows in various aspects). However, net and netsh are specifically related to network . Honestly speaking, you can refer to Win PrivEsc videos to detect the minute details related to these. I'm still a noob at these, but continuosly working. Sorry for a late reply🙂
<3
Appreciate it! Much love, keep doing what you are doing <3
Thank you brother!!
This helped so much!
Happy to help you!
Bro please make a video on investigating windows 3.x
Sure! Now I'll do it. Thanks for recommending
Make video on remote desktop also
Okay..I'll do so..thanks for suggesting.
Flag: GetReadyAliensAreHere. Congrats if you successfully decoded this!!
Is this room still online
Yes it is. Here's the link: www.tryhackme.com/room/vulnerabilities101
It's a course that's part of the jr. penetration tester under the vulnerability research section, so yes.