Your Approach to Hacking is WRONG!!

Поділитися
Вставка
  • Опубліковано 3 січ 2025

КОМЕНТАРІ •

  • @an0n_ali
    @an0n_ali  Рік тому +29

    To try everything Brilliant has to offer-free-for 30 days, visit brilliant.org/An0nAli/. The first 200 of you will get 20% off Brilliant’s annual premium subscription.

    • @DripTactical
      @DripTactical 11 місяців тому

      cheers, just subbed to brilliant and code still works for anyone wondering.
      Apart from brilliant and khan can you recomend any other resources that provide instruction or detail? specifically the sort that covers the lesser discussed information and instructions?

  • @irx0r
    @irx0r 9 місяців тому +100

    Being a cyber-security enthusiast for 10+ years now, you make by far some of the best concise videos on the subject I've ever seen!

    • @shivamjha9441
      @shivamjha9441 6 місяців тому +6

      can you reccomend some more channels by your experience

  • @MygenteTV
    @MygenteTV Рік тому +78

    This is the first video I see online, who is really about hacking and not the BS you see online

    • @romzeek
      @romzeek 9 місяців тому +1

      Same - that was awesome step by step explanation instead of showing random gifs and animations in terminal making it look like some sort of voodoo

  • @Joy_boy.346
    @Joy_boy.346 Рік тому +53

    Im learning it from 20 months every month there's a new topic comes there is no end for hacking .....and your way of explaining is awesome 💯💯

    • @RedHat-o8q
      @RedHat-o8q 10 місяців тому +1

      Help me too

    • @RedHat-o8q
      @RedHat-o8q 10 місяців тому +2

      How and from where did you started learning?

    • @alonegamer9010
      @alonegamer9010 8 місяців тому

      Just do paid courses online or get your hands on free sources on yt just select one things and go to its core dont think into learning multiple things all at once remember this one thing u must need to know networking ,how do computer work ,routers and many more fundamental before diving into anything, thats all u have to do for now that is

  • @rgtechyt9267
    @rgtechyt9267 Рік тому +28

    Thousand of videos but this one is different from all of them it changed my mind I don't have much words to appreciate your work❤❤❤ keep it up bro

  • @man11withaplan
    @man11withaplan Рік тому +50

    Is there books you recommend reading for pentesting?

    • @an0n_ali
      @an0n_ali  Рік тому +61

      No, I'd rather suggest diving into the steps I covered in this video and exploring related articles online. It's a great way to get introduced to hacking and see if you have a passion for the field before investing in books or certifications.
      P.S. You'll know what books to read once you have a basic understanding and know what to learn.

    • @ashwinanil9169
      @ashwinanil9169 Рік тому +9

      Linux for hackers by occupy the web is a good book for learning the basics of linux and hacking

    • @ano1348
      @ano1348 Рік тому

      watch david bombal he have wonderful books

    • @Motopia_
      @Motopia_ 11 місяців тому +2

      I agree with the him first start with basic I mean how os works all may say that learn linux .but I say learn windows because most of the people use it .I don't mean that learn power point spreed sheet etc I mean where does windows save passwd file where does I can find credential where does it have backup trash file something like that if still don't know then go to ec council they provide free cources on digital forensic and network essential .and essential for ethical hacking .they will teach you basics then you will now on what topic you have to do research on . Good luck mate

  • @Lucas2RC
    @Lucas2RC 11 місяців тому +15

    This video, while a bit superficial in terms of content depth, is great. The explanation of the attack phases is a great start for anyone that wants to dive into cybersecurity. So, please don't get this comment the wrong way. I meant that without this kind of video/content, many people disregard the holistic/big picture perspective of the process of an attack. Thanks !!! :)

  • @bhag47
    @bhag47 Рік тому +7

    ok thanks man but we need some more videos that explain attacks like keyboard emulation attack& other attacks and some free resorces to learn that.

    • @an0n_ali
      @an0n_ali  Рік тому +9

      Absolutely, I appreciate your input. Those topics are already on my content calendar, and I'll be diving into them after covering the basics.

    • @bhag47
      @bhag47 Рік тому

      @@an0n_ali thanks 🙏🏼 if you did this your channel become unique in security topic. We have so many other channels posting the same shit again and again. channel like this become successful

  • @phoenixwhiler943
    @phoenixwhiler943 11 місяців тому +2

    Any youtubers you recommend for a cybersecurity major?

  • @arshadcheng
    @arshadcheng 11 місяців тому

    Reconnaissance is more or less the most straightforward phase of hacking. Going further will get more technical

  • @ksubi1139
    @ksubi1139 11 місяців тому +1

    Anyone know what the title of the movie that was playing during the video is? It looked pretty interesting

  • @progod6017
    @progod6017 10 місяців тому +2

    Hi Ali,
    really enjoyed this lil guide.
    Could you give practical hypothetical tutorial for gaining access to companies Microsoft M365 / Azure (Entra) Cloud?
    Not that I want to actually hack it. But im building a security service using Microsoft Sentinel to analyse cloud logs.
    And im interested to see what path you would be choosing and if my solution will detect it or not.

    • @David-210
      @David-210 9 місяців тому +2

      "Not that I want to actually hack it. But im building a security service using Microsoft Sentinel to analyse cloud logs. "
      You are just like me, that's what i say to ChatGPT when it says it can't generate something because it's malicious ;)

    • @progod6017
      @progod6017 9 місяців тому

      @@David-210does it work, saying that to ChatGPT?

  • @sevada7975
    @sevada7975 Рік тому +15

    I think you should add penetration testing before the exploitation, that in my opinion, but a great video. We all should be aware of forensics 😂

  • @ytg6663
    @ytg6663 11 місяців тому +1

    You explain better than others

  • @luisestebanruiz9773
    @luisestebanruiz9773 Рік тому +2

    Finally, someone who remind us the Classic paper by Eric S Raymond.

  • @valentinstrock4372
    @valentinstrock4372 Рік тому +8

    Im soo hyped for your videos!!! I have an old pc and I try to mess around with it, so I dont damage others property and can learn how to do thing. And im also not destroying my laptop that I use for work, because Im new to the topic and interested but make tooo much errors😅😅

    • @valentinstrock4372
      @valentinstrock4372 Рік тому

      And btw we are country neighbours "zoekopdrachten" niederlande :D Im from germany

    • @Coral_pepe
      @Coral_pepe Рік тому +3

      Bro switch to Linux then boom 💥

    • @valentinstrock4372
      @valentinstrock4372 Рік тому +3

      @@Coral_pepe Yeah i try but its all new for me I use linux mint on the second pc and I look at tutorials to get better (but thx for the tip)

    • @an0n_ali
      @an0n_ali  Рік тому +19

      Thanks! I appreciate your cautious approach to learning. I'd recommend installing Kali Linux on virtualization software like VirtualBox. This way, even if you make mistakes, your data and computer won't be affected.
      P.S. Stay tuned for an upcoming video where I'll guide you through setting up a vulnerable machine for testing your skills.

    • @Coral_pepe
      @Coral_pepe Рік тому

      @@an0n_ali metasploitable?

  • @raiden7821
    @raiden7821 4 місяці тому

    which video editor do you use?

  • @almahmud218
    @almahmud218 Рік тому +8

    Hey Ali! Thanks a million. I have watched all of you videos and they have inspired me a lot to explore more! Keep making the difference.

  • @isaifi-j6z
    @isaifi-j6z Рік тому

    can we hack through tcp/ip fingerprints ? im confused

  • @rickier
    @rickier 10 місяців тому

    This is actually incredibly clear and helpful.

  • @pratikanand8437
    @pratikanand8437 11 місяців тому

    bro i learnig hacking past 6 months, i create my own keylogger and test it but they won't be run and i ask one professional hacker then they cant't tell much about it becuse of it is unethical but i want to learning only educational purpose and safe from cyber attack. Now my question is "To perform a simple social engineering attack we need to only ethernet and stable coonection of internet or not in my home not stable connection then how to solve this probleam "? please help me

  • @So-Me-On3
    @So-Me-On3 11 місяців тому

    Have the metasploite commands changed 7 years ago??? Please answer

  • @GameBangStudios
    @GameBangStudios Рік тому +2

    Well your title is a bit wrong cause I been learning everything you said not in order but still learning on these topics and for me the order was something I figured out easy

  • @jaswanthmanikantaalapati8097
    @jaswanthmanikantaalapati8097 Рік тому +1

    sir can you give more information on above process

  • @Havoc625
    @Havoc625 Рік тому +1

    Can you please tell me how do you make your videos like that? Im using it for my other UA-cam channel

  • @tusharwagh4561
    @tusharwagh4561 Рік тому +3

    So when you talk about the complexity of hacking don't explain what reconnaissance is, and similarly other definitions of basic term. Just talk about what extra info you know about a particular topic. That will be great 👍

  • @eastbricktonmedia6670
    @eastbricktonmedia6670 Рік тому

    Do you have linux on VM or you have the actual OS?

  • @thealtisback5885
    @thealtisback5885 11 місяців тому

    Hey man, you should really teach about rubber duckys/badusb and how its now possible to do so with kali nethunter, would be sick!

  • @a.iananda1215
    @a.iananda1215 Рік тому +1

    Nice video what about the video where you told you will showing us the how to decrypt an encrypted packet !!?

  • @hassaansameen-vr7zz
    @hassaansameen-vr7zz 4 місяці тому

    Will learning blue team first help me build a base fir red team

  • @D-DN
    @D-DN Рік тому +2

    Fun video, much appreciated mate ! 🙌

  • @etachiochiha2190
    @etachiochiha2190 11 місяців тому +2

    i mean youtube doesn't really allow real hacking, so most youtubers put some specific idea or scenarios of how the attack is done.
    but this video shows the phases of real ethical hacking, so i like this one good content sir and much love.

  • @Tutieboyron
    @Tutieboyron 11 місяців тому

    Could someone explain the client side attack where you escalate your privileges on a system

  • @eshan8362
    @eshan8362 11 місяців тому +2

    Bro From Where Will I Start Learning Hacking?

  • @SONUKATAKAM-b8m
    @SONUKATAKAM-b8m 9 місяців тому +1

    bro do we have to learn a programming langague for to learn hacking

    • @ashton4537
      @ashton4537 9 місяців тому

      It's good to understand how to read and interpret main programming languages such as C, Python, SQL and PHP (SQL and PHP are very basic and are very outdated, but learning them may be beneficial in the beginning stages when you practice with exploiting more common vulnerabilities). This is because, although you may not need to learn how to program at an advanced level, (especially now with AI tools), being able to at least understand the basics of a few programming languages, will better allow you to exploit applications on the target's computer to escalate user privilege, or create your own scripts with in order to create custom exploits or interfere with computer 'jobs' (by jobs I mean background computer processes that can gain you leverage in a target's system.).
      A fantastic place to start in my opinion would be to:
      1.
      Understand basic shell commands and learn how to run virtual linux machines
      2.
      Learn basic reconnaissance tools such as Nmap, and learn basic computer logic e.g. application processes, what the data you are seeing is in your Nmap results, etc....
      3.
      Utilise HackTheBox. They have a great beginners course into networking that I found was one of the most beneficial tools to me in understanding hacking. I then went on to begin trying to solve some of the HTB challenges, which lead to me to joining a HTB discord server where we would collab together to root HTB challenges. This was where I learnt the most of my skills from. I then learnt how to read C, and with my basic knowledge of python was able to code some basic scripts that allowed me to manipulate data on target machines.
      Disclaimer:

    • @Gutscat
      @Gutscat 3 місяці тому

      no

  • @John-leibert
    @John-leibert 7 місяців тому

    Is it important to learn math for hacking.
    I am very weak in mathematics but I love hacking l,can't I learn without it????

  • @DigitalPhreak765
    @DigitalPhreak765 11 місяців тому +2

    Just Subscribed 🙂

  • @jonathanhoward1499
    @jonathanhoward1499 2 місяці тому +1

    So MY approach was right? Don't lump me in with these damn averages.

  • @yuvrajchhatwani
    @yuvrajchhatwani Рік тому

    What if someone wants to break encryption

  • @NguyễnLong-o1t
    @NguyễnLong-o1t 8 днів тому

    thank you very much!

  • @gunmanwhy657
    @gunmanwhy657 Рік тому

    I want to contact with you how can I contact with you brother?

  • @1szco1
    @1szco1 11 місяців тому

    You are right thats just tools not hacking

  • @58statment
    @58statment Рік тому +1

    Bro, I really like to watch your videos also i was really confused about "mod" and "mod apk" like how its was created ? why some people give it "free" but what dirty benefit of their on it to give free?? can i make my own mod apk ? for use premiums of app??? If bro, you intesting then u should make a viedeo on it, i didn't saw any channel who tell insights of mod apk.

  • @marosak8056
    @marosak8056 11 місяців тому

    This video is very good thank you. I am learning hacking for about 1 month and it's good but i don't know where to learn I tryed HTB and Try hack me but I think that is useless for real hacking. Do you have any tips where should i learn?

  • @grennings
    @grennings Рік тому

    whats an exploit that executes command through a servers memory called.

  • @going-an0n
    @going-an0n Рік тому

    How to get voice like this?

  • @Pentestersploit
    @Pentestersploit 7 місяців тому

    Personally i think that those hacking tools are useful and also that should try to make your own tools too

  • @patsystone34
    @patsystone34 10 місяців тому

    Bumped into your channel today and have to say, love your content and the way you explain stuff. Really awesome! You gotta new sub :)

  • @revengerjohn6070
    @revengerjohn6070 Рік тому

    Connection!?

  • @LukasCarrein
    @LukasCarrein 4 місяці тому

    very good video, you can't really find videos that explain the hacking process and for everybody wanting to be a ethical hacker i would recommend learning to code first (i reccomend c or if you know almost nothing about coding python and then c) if you suck at proggraming or just don't like it hacking is not for you

  • @th343r04ch
    @th343r04ch Рік тому +2

    It was an informative video Ali..subscribing to your channel to learn more! I have one question for you, are you truly working with the Anonymous? Just curious! 😄

  • @AAHyo
    @AAHyo 3 місяці тому

    just from the thumbnail i knew where this was going haha

  • @carteldebellamy677
    @carteldebellamy677 11 місяців тому

    Research the Lockheed Martin Cyber Kill Chain

  • @58statment
    @58statment 11 місяців тому

    bro, do you have any telegram channel?? or kinda on social media??

  • @immazygh
    @immazygh 11 місяців тому

    We mean this is a hacker. You must be smart and exploit the goal well. I love your content. Continue

  • @algrithm0
    @algrithm0 7 місяців тому

    I didn't know about the anti forensic and that's why i ended up caught

  • @JockeyVR
    @JockeyVR 4 місяці тому

    Me seeing fsociety in the thumbnail: i understood that reference

  • @cxzirey
    @cxzirey 8 місяців тому

    yo nice using of the watchdogs stuff like system loading and stuff nice video

  • @kevincalebout3244
    @kevincalebout3244 10 місяців тому

    It work is wrong 😢

  • @yuvrajchhatwani
    @yuvrajchhatwani Рік тому

    How to break high level encryption

  • @lllllllllll11111lllllllll
    @lllllllllll11111lllllllll 11 місяців тому

    Who needs to think creatively when cgatgpt is absolute

    • @handlemonium
      @handlemonium 9 місяців тому

      Because ChatGPT can't do stuff physically yet? Everyday creativity is up to us homo sapien meat bags 😁

  • @1szco1
    @1szco1 11 місяців тому

    And cyber security

  • @adrianlouis2108
    @adrianlouis2108 11 місяців тому

    In others words dont just follow the tutorial play around with everything.
    When I first installed Kali LInux I say tons of buttons and tools which I will surely explore one by one.Instead of just doing what the guy is doing.

  • @umutyldz8715
    @umutyldz8715 7 місяців тому +1

    If people are trying to learn tools before knowing killchain Im not going to be unemployed

  • @dzvsow2643
    @dzvsow2643 Рік тому

    Barekeallahu fik Ali

  • @adejobiolajide8011
    @adejobiolajide8011 Рік тому

    Please do you have a telegram channel where tku can share educational resources such as pdf's or notes pls

  • @1szco1
    @1szco1 11 місяців тому

    If you want to be a hacker just learn software engineering and cyber security

  • @4n3c3d
    @4n3c3d Рік тому

    i love your videos 🖤

  • @motashaiye
    @motashaiye 4 місяці тому

    Learn networking before you get into cybersecurity and hacking - something you forgot to mention.

  • @Angelinajolieshorts
    @Angelinajolieshorts Рік тому

    you are amazing man

  • @pixlyana
    @pixlyana 10 місяців тому

    thanks Anon

  • @melo2691
    @melo2691 11 місяців тому

    amazing content pls keep going

  • @TraugottSandmeyer49
    @TraugottSandmeyer49 Рік тому

    Amazing knowledge

  • @BarghestOne
    @BarghestOne 10 місяців тому

    It's always good to try a few hats on, see what fits your style.

  • @SNSISNSJISEJSJS
    @SNSISNSJISEJSJS Рік тому +1

    MY FRIEND IS THE BEST PRO.
    BTW can you show a tutorial showing how to do what you explained?

  • @itsflint964
    @itsflint964 Рік тому

    The day my computer and Yt channel got hacked. It was the worst day of my life...

  • @chereyhotallygetufromfrida952
    @chereyhotallygetufromfrida952 3 місяці тому

    so im at the part where i googled anti-phorensics already and uhhhhhhhhhhh

  • @choice_4_life
    @choice_4_life Рік тому

    Ct os boot animation

  • @rosalindbrooks570
    @rosalindbrooks570 3 місяці тому

    Martin Richard Miller David Hall Paul

  • @acceleraisedgaming96
    @acceleraisedgaming96 6 місяців тому

    Bro your voiceover is too annoying but videos are amazing

  • @chillappreciator885
    @chillappreciator885 11 місяців тому +328

    If you are watching this video - you are already heaving 0 chances to become a hacker

    • @mr_fusion85
      @mr_fusion85 11 місяців тому +2

      I hope you don't screw like you type.

    • @chillappreciator885
      @chillappreciator885 11 місяців тому

      @@laserm6113 excuses

    • @xy1xy
      @xy1xy 11 місяців тому +49

      It is fine because sometimes it only takes a spark to burn the whole world.

    • @Unortha
      @Unortha 11 місяців тому +129

      Can't even check your spelling, yet you want to judge others

    • @chillappreciator885
      @chillappreciator885 11 місяців тому +4

      @@Unortha you got me

  • @Ivillam_Uendosi
    @Ivillam_Uendosi 10 місяців тому

    ma boi got a sponsor

  • @Deshammanideep
    @Deshammanideep 4 місяці тому +3

    Becoming professional hacker without working as a developer is impossible.

    • @krishthakar6661
      @krishthakar6661 4 місяці тому

      why dude ...btw I'm starting my career in this field and I'm intrested in some guidance on how to start

    • @Deshammanideep
      @Deshammanideep 4 місяці тому

      @@krishthakar6661 If you see owasp top ten vulnerabilities, most of them occur due to misconfigurations only. Things like Buffer overflow, SQL injection are very rare now a days. You can also become professional hacker without working as developer but you should be very talented and able to write a mid level program using Assembly.
      If you work as developer then you can understand how developer will mess up with security configuration and with this insider information, you too can become a pen tester.

    • @Anonymous51701
      @Anonymous51701 2 місяці тому +1

      What are you on?😂 Obviously you know nothing about cybersecurity

    • @Deshammanideep
      @Deshammanideep 2 місяці тому

      @@Anonymous51701 Ok bro. Watch hollywood movies and learn hacking by staying in Garage..

    • @ybygaming4229
      @ybygaming4229 2 місяці тому

      @@Anonymous51701why is he wrong tho? How can I develop a good new type of ransomware without being a dev? How can I make my own research on web vuln without knowing how they made and what is going on beyond the script itself? How can I find mistake in code without understanding the code?

  • @ashmitasharma9082
    @ashmitasharma9082 11 місяців тому

    Can you teach

  • @Mhcmhc1987
    @Mhcmhc1987 Місяць тому

    I do not care
    Only accept non-tech currency

  • @Vincent-rc6pe
    @Vincent-rc6pe 11 місяців тому

    You are Rollercoaster. Please slow down 😐

  • @viduptor
    @viduptor 11 місяців тому

    jo baat hai

  • @II-CRZ
    @II-CRZ Рік тому +1

    great video u said a truth hacking is not simple LOL

  • @Coral_pepe
    @Coral_pepe Рік тому

    Love ur vid, make videos of exploiting remote control a android or pc.target specific ip.

  • @_____666______
    @_____666______ 4 місяці тому

    some posts theory & some posts running script/tool lmao != hacker . But one can become hacker just by hack someone to d3th 😂

  • @p1nkpanther825
    @p1nkpanther825 Рік тому

    Hi

  • @Zxcv77-s8i
    @Zxcv77-s8i 4 місяці тому

    Literally zero knowledge being taught.
    Real stuff doesn’t really look nice aye?
    Poring over source code understanding tryna find vulns.
    Tracing stuff on a large codebase.
    Reading commonly abused windows api to see how it works and how you can fit it on your code so you can bypass mechanism.
    Reading how Kerberos works which is the underlying foundation between so many ad attacks. Ofc it isn’t interesting…
    Grind ain’t it? Peeps want to see the cool stuff but not how it is irl. Oh well ….

    • @LoganSilva-d1i
      @LoganSilva-d1i 4 місяці тому

      Well, you can't really go into great detail about how to carry out serious crimes on youtube
      And I also just belive this Chanell and channels like it are make people interested in this stuff they know nothing about and they don't give u all the necessary details to be safe so now you got gullible people going on to untrustworthy places with a free vpn thinking they will be all good 😂😂😂

    • @krishthakar6661
      @krishthakar6661 4 місяці тому

      Bro tell me more about it I'm gaining knowledge and UA-cam is teaching mostly bs ....how would you guide a fresher into this field ...I just joined an Israeli Group that exploit Iranian database leaks but I can't keep up with them or learn.
      if you're expierenced please do share in great detail Thanks

  • @Jango1989
    @Jango1989 10 місяців тому

    "professional hackers invest weeks or even months in doing reconnaissance" 🤣🤣🤣🤣 most jobs last one to two weeks and even the long term ones wouldn't waste weeks let alone months on recon. Also, I lol'd very hard at the "you're doing it wrong learning about tools from free videos on UA-cam and now here's an add for an expensive and unrelated learning platform"

  • @jamilahasan98
    @jamilahasan98 4 місяці тому

    ❤❤❤❤❤

  • @SojwalNaikwadi-nb4hv
    @SojwalNaikwadi-nb4hv Рік тому +1

    The whole video and sound is made using ai

  • @kraigeven
    @kraigeven Рік тому

    www

  • @TechAmbition
    @TechAmbition Рік тому +1

    Bruh, You Told(Almost), What I Do ❤ Seriously This Video May Help... Others, What Should To Be Done Irl
    Maybe You Missed One CRUCIAL THING
    STEP ZERO:
    STAY ANONYMOUS

  • @Proxyone444
    @Proxyone444 Рік тому

  • @Hackershub_official
    @Hackershub_official Рік тому

    OG

  • @corv0x04
    @corv0x04 Рік тому +1

    You're approaching English wrong