To try everything Brilliant has to offer-free-for 30 days, visit brilliant.org/An0nAli/. The first 200 of you will get 20% off Brilliant’s annual premium subscription.
cheers, just subbed to brilliant and code still works for anyone wondering. Apart from brilliant and khan can you recomend any other resources that provide instruction or detail? specifically the sort that covers the lesser discussed information and instructions?
Just do paid courses online or get your hands on free sources on yt just select one things and go to its core dont think into learning multiple things all at once remember this one thing u must need to know networking ,how do computer work ,routers and many more fundamental before diving into anything, thats all u have to do for now that is
This video, while a bit superficial in terms of content depth, is great. The explanation of the attack phases is a great start for anyone that wants to dive into cybersecurity. So, please don't get this comment the wrong way. I meant that without this kind of video/content, many people disregard the holistic/big picture perspective of the process of an attack. Thanks !!! :)
@@an0n_ali thanks 🙏🏼 if you did this your channel become unique in security topic. We have so many other channels posting the same shit again and again. channel like this become successful
No, I'd rather suggest diving into the steps I covered in this video and exploring related articles online. It's a great way to get introduced to hacking and see if you have a passion for the field before investing in books or certifications. P.S. You'll know what books to read once you have a basic understanding and know what to learn.
I agree with the him first start with basic I mean how os works all may say that learn linux .but I say learn windows because most of the people use it .I don't mean that learn power point spreed sheet etc I mean where does windows save passwd file where does I can find credential where does it have backup trash file something like that if still don't know then go to ec council they provide free cources on digital forensic and network essential .and essential for ethical hacking .they will teach you basics then you will now on what topic you have to do research on . Good luck mate
Im soo hyped for your videos!!! I have an old pc and I try to mess around with it, so I dont damage others property and can learn how to do thing. And im also not destroying my laptop that I use for work, because Im new to the topic and interested but make tooo much errors😅😅
Thanks! I appreciate your cautious approach to learning. I'd recommend installing Kali Linux on virtualization software like VirtualBox. This way, even if you make mistakes, your data and computer won't be affected. P.S. Stay tuned for an upcoming video where I'll guide you through setting up a vulnerable machine for testing your skills.
So when you talk about the complexity of hacking don't explain what reconnaissance is, and similarly other definitions of basic term. Just talk about what extra info you know about a particular topic. That will be great 👍
i mean youtube doesn't really allow real hacking, so most youtubers put some specific idea or scenarios of how the attack is done. but this video shows the phases of real ethical hacking, so i like this one good content sir and much love.
Well your title is a bit wrong cause I been learning everything you said not in order but still learning on these topics and for me the order was something I figured out easy
It was an informative video Ali..subscribing to your channel to learn more! I have one question for you, are you truly working with the Anonymous? Just curious! 😄
Hi Ali, really enjoyed this lil guide. Could you give practical hypothetical tutorial for gaining access to companies Microsoft M365 / Azure (Entra) Cloud? Not that I want to actually hack it. But im building a security service using Microsoft Sentinel to analyse cloud logs. And im interested to see what path you would be choosing and if my solution will detect it or not.
"Not that I want to actually hack it. But im building a security service using Microsoft Sentinel to analyse cloud logs. " You are just like me, that's what i say to ChatGPT when it says it can't generate something because it's malicious ;)
bro i learnig hacking past 6 months, i create my own keylogger and test it but they won't be run and i ask one professional hacker then they cant't tell much about it becuse of it is unethical but i want to learning only educational purpose and safe from cyber attack. Now my question is "To perform a simple social engineering attack we need to only ethernet and stable coonection of internet or not in my home not stable connection then how to solve this probleam "? please help me
very good video, you can't really find videos that explain the hacking process and for everybody wanting to be a ethical hacker i would recommend learning to code first (i reccomend c or if you know almost nothing about coding python and then c) if you suck at proggraming or just don't like it hacking is not for you
This video is very good thank you. I am learning hacking for about 1 month and it's good but i don't know where to learn I tryed HTB and Try hack me but I think that is useless for real hacking. Do you have any tips where should i learn?
Bro, I really like to watch your videos also i was really confused about "mod" and "mod apk" like how its was created ? why some people give it "free" but what dirty benefit of their on it to give free?? can i make my own mod apk ? for use premiums of app??? If bro, you intesting then u should make a viedeo on it, i didn't saw any channel who tell insights of mod apk.
It's good to understand how to read and interpret main programming languages such as C, Python, SQL and PHP (SQL and PHP are very basic and are very outdated, but learning them may be beneficial in the beginning stages when you practice with exploiting more common vulnerabilities). This is because, although you may not need to learn how to program at an advanced level, (especially now with AI tools), being able to at least understand the basics of a few programming languages, will better allow you to exploit applications on the target's computer to escalate user privilege, or create your own scripts with in order to create custom exploits or interfere with computer 'jobs' (by jobs I mean background computer processes that can gain you leverage in a target's system.). A fantastic place to start in my opinion would be to: 1. Understand basic shell commands and learn how to run virtual linux machines 2. Learn basic reconnaissance tools such as Nmap, and learn basic computer logic e.g. application processes, what the data you are seeing is in your Nmap results, etc.... 3. Utilise HackTheBox. They have a great beginners course into networking that I found was one of the most beneficial tools to me in understanding hacking. I then went on to begin trying to solve some of the HTB challenges, which lead to me to joining a HTB discord server where we would collab together to root HTB challenges. This was where I learnt the most of my skills from. I then learnt how to read C, and with my basic knowledge of python was able to code some basic scripts that allowed me to manipulate data on target machines. Disclaimer:
In others words dont just follow the tutorial play around with everything. When I first installed Kali LInux I say tons of buttons and tools which I will surely explore one by one.Instead of just doing what the guy is doing.
@@krishthakar6661 If you see owasp top ten vulnerabilities, most of them occur due to misconfigurations only. Things like Buffer overflow, SQL injection are very rare now a days. You can also become professional hacker without working as developer but you should be very talented and able to write a mid level program using Assembly. If you work as developer then you can understand how developer will mess up with security configuration and with this insider information, you too can become a pen tester.
@@Anonymous51701why is he wrong tho? How can I develop a good new type of ransomware without being a dev? How can I make my own research on web vuln without knowing how they made and what is going on beyond the script itself? How can I find mistake in code without understanding the code?
"professional hackers invest weeks or even months in doing reconnaissance" 🤣🤣🤣🤣 most jobs last one to two weeks and even the long term ones wouldn't waste weeks let alone months on recon. Also, I lol'd very hard at the "you're doing it wrong learning about tools from free videos on UA-cam and now here's an add for an expensive and unrelated learning platform"
Bruh, You Told(Almost), What I Do ❤ Seriously This Video May Help... Others, What Should To Be Done Irl Maybe You Missed One CRUCIAL THING STEP ZERO: STAY ANONYMOUS
Literally zero knowledge being taught. Real stuff doesn’t really look nice aye? Poring over source code understanding tryna find vulns. Tracing stuff on a large codebase. Reading commonly abused windows api to see how it works and how you can fit it on your code so you can bypass mechanism. Reading how Kerberos works which is the underlying foundation between so many ad attacks. Ofc it isn’t interesting… Grind ain’t it? Peeps want to see the cool stuff but not how it is irl. Oh well ….
Well, you can't really go into great detail about how to carry out serious crimes on youtube And I also just belive this Chanell and channels like it are make people interested in this stuff they know nothing about and they don't give u all the necessary details to be safe so now you got gullible people going on to untrustworthy places with a free vpn thinking they will be all good 😂😂😂
Bro tell me more about it I'm gaining knowledge and UA-cam is teaching mostly bs ....how would you guide a fresher into this field ...I just joined an Israeli Group that exploit Iranian database leaks but I can't keep up with them or learn. if you're expierenced please do share in great detail Thanks
To try everything Brilliant has to offer-free-for 30 days, visit brilliant.org/An0nAli/. The first 200 of you will get 20% off Brilliant’s annual premium subscription.
cheers, just subbed to brilliant and code still works for anyone wondering.
Apart from brilliant and khan can you recomend any other resources that provide instruction or detail? specifically the sort that covers the lesser discussed information and instructions?
Being a cyber-security enthusiast for 10+ years now, you make by far some of the best concise videos on the subject I've ever seen!
can you reccomend some more channels by your experience
This is the first video I see online, who is really about hacking and not the BS you see online
Same - that was awesome step by step explanation instead of showing random gifs and animations in terminal making it look like some sort of voodoo
Im learning it from 20 months every month there's a new topic comes there is no end for hacking .....and your way of explaining is awesome 💯💯
Help me too
How and from where did you started learning?
Just do paid courses online or get your hands on free sources on yt just select one things and go to its core dont think into learning multiple things all at once remember this one thing u must need to know networking ,how do computer work ,routers and many more fundamental before diving into anything, thats all u have to do for now that is
This video, while a bit superficial in terms of content depth, is great. The explanation of the attack phases is a great start for anyone that wants to dive into cybersecurity. So, please don't get this comment the wrong way. I meant that without this kind of video/content, many people disregard the holistic/big picture perspective of the process of an attack. Thanks !!! :)
Thousand of videos but this one is different from all of them it changed my mind I don't have much words to appreciate your work❤❤❤ keep it up bro
ok thanks man but we need some more videos that explain attacks like keyboard emulation attack& other attacks and some free resorces to learn that.
Absolutely, I appreciate your input. Those topics are already on my content calendar, and I'll be diving into them after covering the basics.
@@an0n_ali thanks 🙏🏼 if you did this your channel become unique in security topic. We have so many other channels posting the same shit again and again. channel like this become successful
Thanks Ali, your video's offer a nice overview for aspiring cyber sec experts. Keep on going 💪
Is there books you recommend reading for pentesting?
No, I'd rather suggest diving into the steps I covered in this video and exploring related articles online. It's a great way to get introduced to hacking and see if you have a passion for the field before investing in books or certifications.
P.S. You'll know what books to read once you have a basic understanding and know what to learn.
Linux for hackers by occupy the web is a good book for learning the basics of linux and hacking
watch david bombal he have wonderful books
I agree with the him first start with basic I mean how os works all may say that learn linux .but I say learn windows because most of the people use it .I don't mean that learn power point spreed sheet etc I mean where does windows save passwd file where does I can find credential where does it have backup trash file something like that if still don't know then go to ec council they provide free cources on digital forensic and network essential .and essential for ethical hacking .they will teach you basics then you will now on what topic you have to do research on . Good luck mate
I think you should add penetration testing before the exploitation, that in my opinion, but a great video. We all should be aware of forensics 😂
Any youtubers you recommend for a cybersecurity major?
Hey Ali! Thanks a million. I have watched all of you videos and they have inspired me a lot to explore more! Keep making the difference.
Finally, someone who remind us the Classic paper by Eric S Raymond.
What's amazing is how what you explain can also be applied to many things other than hacking
Thank you man!
Im soo hyped for your videos!!! I have an old pc and I try to mess around with it, so I dont damage others property and can learn how to do thing. And im also not destroying my laptop that I use for work, because Im new to the topic and interested but make tooo much errors😅😅
And btw we are country neighbours "zoekopdrachten" niederlande :D Im from germany
Bro switch to Linux then boom 💥
@@Coral_pepe Yeah i try but its all new for me I use linux mint on the second pc and I look at tutorials to get better (but thx for the tip)
Thanks! I appreciate your cautious approach to learning. I'd recommend installing Kali Linux on virtualization software like VirtualBox. This way, even if you make mistakes, your data and computer won't be affected.
P.S. Stay tuned for an upcoming video where I'll guide you through setting up a vulnerable machine for testing your skills.
@@an0n_ali metasploitable?
which video editor do you use?
Reconnaissance is more or less the most straightforward phase of hacking. Going further will get more technical
You explain better than others
Bro From Where Will I Start Learning Hacking?
So when you talk about the complexity of hacking don't explain what reconnaissance is, and similarly other definitions of basic term. Just talk about what extra info you know about a particular topic. That will be great 👍
i mean youtube doesn't really allow real hacking, so most youtubers put some specific idea or scenarios of how the attack is done.
but this video shows the phases of real ethical hacking, so i like this one good content sir and much love.
Well your title is a bit wrong cause I been learning everything you said not in order but still learning on these topics and for me the order was something I figured out easy
It was an informative video Ali..subscribing to your channel to learn more! I have one question for you, are you truly working with the Anonymous? Just curious! 😄
This is actually incredibly clear and helpful.
Hi Ali,
really enjoyed this lil guide.
Could you give practical hypothetical tutorial for gaining access to companies Microsoft M365 / Azure (Entra) Cloud?
Not that I want to actually hack it. But im building a security service using Microsoft Sentinel to analyse cloud logs.
And im interested to see what path you would be choosing and if my solution will detect it or not.
"Not that I want to actually hack it. But im building a security service using Microsoft Sentinel to analyse cloud logs. "
You are just like me, that's what i say to ChatGPT when it says it can't generate something because it's malicious ;)
@@David-210does it work, saying that to ChatGPT?
Can you please tell me how do you make your videos like that? Im using it for my other UA-cam channel
Nice video what about the video where you told you will showing us the how to decrypt an encrypted packet !!?
Anyone know what the title of the movie that was playing during the video is? It looked pretty interesting
Mr Robot
Fun video, much appreciated mate ! 🙌
Hey man, you should really teach about rubber duckys/badusb and how its now possible to do so with kali nethunter, would be sick!
Do you have linux on VM or you have the actual OS?
bro i learnig hacking past 6 months, i create my own keylogger and test it but they won't be run and i ask one professional hacker then they cant't tell much about it becuse of it is unethical but i want to learning only educational purpose and safe from cyber attack. Now my question is "To perform a simple social engineering attack we need to only ethernet and stable coonection of internet or not in my home not stable connection then how to solve this probleam "? please help me
Bumped into your channel today and have to say, love your content and the way you explain stuff. Really awesome! You gotta new sub :)
sir can you give more information on above process
Is it important to learn math for hacking.
I am very weak in mathematics but I love hacking l,can't I learn without it????
very good video, you can't really find videos that explain the hacking process and for everybody wanting to be a ethical hacker i would recommend learning to code first (i reccomend c or if you know almost nothing about coding python and then c) if you suck at proggraming or just don't like it hacking is not for you
Have the metasploite commands changed 7 years ago??? Please answer
This video is very good thank you. I am learning hacking for about 1 month and it's good but i don't know where to learn I tryed HTB and Try hack me but I think that is useless for real hacking. Do you have any tips where should i learn?
I want to contact with you how can I contact with you brother?
Bro, I really like to watch your videos also i was really confused about "mod" and "mod apk" like how its was created ? why some people give it "free" but what dirty benefit of their on it to give free?? can i make my own mod apk ? for use premiums of app??? If bro, you intesting then u should make a viedeo on it, i didn't saw any channel who tell insights of mod apk.
Just Subscribed 🙂
If people are trying to learn tools before knowing killchain Im not going to be unemployed
bro, do you have any telegram channel?? or kinda on social media??
Will learning blue team first help me build a base fir red team
You are right thats just tools not hacking
can we hack through tcp/ip fingerprints ? im confused
just from the thumbnail i knew where this was going haha
We mean this is a hacker. You must be smart and exploit the goal well. I love your content. Continue
What if someone wants to break encryption
Could someone explain the client side attack where you escalate your privileges on a system
Me seeing fsociety in the thumbnail: i understood that reference
So MY approach was right? Don't lump me in with these damn averages.
Learn networking before you get into cybersecurity and hacking - something you forgot to mention.
Personally i think that those hacking tools are useful and also that should try to make your own tools too
Connection!?
whats an exploit that executes command through a servers memory called.
How to get voice like this?
thanks Anon
Barekeallahu fik Ali
I didn't know about the anti forensic and that's why i ended up caught
yo nice using of the watchdogs stuff like system loading and stuff nice video
The day my computer and Yt channel got hacked. It was the worst day of my life...
bro do we have to learn a programming langague for to learn hacking
It's good to understand how to read and interpret main programming languages such as C, Python, SQL and PHP (SQL and PHP are very basic and are very outdated, but learning them may be beneficial in the beginning stages when you practice with exploiting more common vulnerabilities). This is because, although you may not need to learn how to program at an advanced level, (especially now with AI tools), being able to at least understand the basics of a few programming languages, will better allow you to exploit applications on the target's computer to escalate user privilege, or create your own scripts with in order to create custom exploits or interfere with computer 'jobs' (by jobs I mean background computer processes that can gain you leverage in a target's system.).
A fantastic place to start in my opinion would be to:
1.
Understand basic shell commands and learn how to run virtual linux machines
2.
Learn basic reconnaissance tools such as Nmap, and learn basic computer logic e.g. application processes, what the data you are seeing is in your Nmap results, etc....
3.
Utilise HackTheBox. They have a great beginners course into networking that I found was one of the most beneficial tools to me in understanding hacking. I then went on to begin trying to solve some of the HTB challenges, which lead to me to joining a HTB discord server where we would collab together to root HTB challenges. This was where I learnt the most of my skills from. I then learnt how to read C, and with my basic knowledge of python was able to code some basic scripts that allowed me to manipulate data on target machines.
Disclaimer:
no
Who needs to think creatively when cgatgpt is absolute
Because ChatGPT can't do stuff physically yet? Everyday creativity is up to us homo sapien meat bags 😁
Research the Lockheed Martin Cyber Kill Chain
If you want to be a hacker just learn software engineering and cyber security
Amazing knowledge
In others words dont just follow the tutorial play around with everything.
When I first installed Kali LInux I say tons of buttons and tools which I will surely explore one by one.Instead of just doing what the guy is doing.
If you are watching this video - you are already heaving 0 chances to become a hacker
i dont want to be hacker anyway 😂
I hope you don't screw like you type.
@@laserm6113 excuses
It is fine because sometimes it only takes a spark to burn the whole world.
Can't even check your spelling, yet you want to judge others
amazing content pls keep going
How to break high level encryption
i love your videos 🖤
And cyber security
so im at the part where i googled anti-phorensics already and uhhhhhhhhhhh
It work is wrong 😢
Martin Richard Miller David Hall Paul
Becoming professional hacker without working as a developer is impossible.
why dude ...btw I'm starting my career in this field and I'm intrested in some guidance on how to start
@@krishthakar6661 If you see owasp top ten vulnerabilities, most of them occur due to misconfigurations only. Things like Buffer overflow, SQL injection are very rare now a days. You can also become professional hacker without working as developer but you should be very talented and able to write a mid level program using Assembly.
If you work as developer then you can understand how developer will mess up with security configuration and with this insider information, you too can become a pen tester.
What are you on?😂 Obviously you know nothing about cybersecurity
@@Anonymous51701 Ok bro. Watch hollywood movies and learn hacking by staying in Garage..
@@Anonymous51701why is he wrong tho? How can I develop a good new type of ransomware without being a dev? How can I make my own research on web vuln without knowing how they made and what is going on beyond the script itself? How can I find mistake in code without understanding the code?
Ct os boot animation
Bro your voiceover is too annoying but videos are amazing
ma boi got a sponsor
great video u said a truth hacking is not simple LOL
MY FRIEND IS THE BEST PRO.
BTW can you show a tutorial showing how to do what you explained?
jo baat hai
It's always good to try a few hats on, see what fits your style.
Please do you have a telegram channel where tku can share educational resources such as pdf's or notes pls
Can you teach
OG
You are Rollercoaster. Please slow down 😐
❤❤❤❤❤
some posts theory & some posts running script/tool lmao != hacker . But one can become hacker just by hack someone to d3th 😂
❤
Love ur vid, make videos of exploiting remote control a android or pc.target specific ip.
www
Hi
"professional hackers invest weeks or even months in doing reconnaissance" 🤣🤣🤣🤣 most jobs last one to two weeks and even the long term ones wouldn't waste weeks let alone months on recon. Also, I lol'd very hard at the "you're doing it wrong learning about tools from free videos on UA-cam and now here's an add for an expensive and unrelated learning platform"
Bruh, You Told(Almost), What I Do ❤ Seriously This Video May Help... Others, What Should To Be Done Irl
Maybe You Missed One CRUCIAL THING
STEP ZERO:
STAY ANONYMOUS
You're approaching English wrong
The whole video and sound is made using ai
Literally zero knowledge being taught.
Real stuff doesn’t really look nice aye?
Poring over source code understanding tryna find vulns.
Tracing stuff on a large codebase.
Reading commonly abused windows api to see how it works and how you can fit it on your code so you can bypass mechanism.
Reading how Kerberos works which is the underlying foundation between so many ad attacks. Ofc it isn’t interesting…
Grind ain’t it? Peeps want to see the cool stuff but not how it is irl. Oh well ….
Well, you can't really go into great detail about how to carry out serious crimes on youtube
And I also just belive this Chanell and channels like it are make people interested in this stuff they know nothing about and they don't give u all the necessary details to be safe so now you got gullible people going on to untrustworthy places with a free vpn thinking they will be all good 😂😂😂
Bro tell me more about it I'm gaining knowledge and UA-cam is teaching mostly bs ....how would you guide a fresher into this field ...I just joined an Israeli Group that exploit Iranian database leaks but I can't keep up with them or learn.
if you're expierenced please do share in great detail Thanks
Is this an ai Channel?