BEGINNER’S Guide To HACKING TERMINOLOGY

Поділитися
Вставка
  • Опубліковано 13 лип 2024
  • “What’re you doing up there?!”
    Happy holidays, everyone! I really hope you enjoy this video; it's considerably shorter than my first video, but I still hope you enjoy it regardless.
    Check out the previous video (a deep dive into Buffer Overflows)!
    • Buffer Overflows: A Sy...
    🔖 My Socials:
    avatar/mascot made with picrew: picrew.me/en/image_maker/1108773
    - full credits to the artist: / mimisentakosen
    - visit her shop: coconala.com/services/1871766... discord server: dsc.gg/crow-academy
    crows-nest.gitbook.io/
    github.com/cr-0w
    / cr0ww_
    💖 Support My Work
    / cr0w
    ko-fi.com/cr0ww
    www.buymeacoffee.com/cr0w
    Join this channel to get access to perks:
    / @crr0ww
    🎵 Kerning City © Copyright Wizet, Nexon, Jungle Book © Copyright Wizet, Nexon
    The images and music used in this video are used under the principle of fair use for the purpose of criticism, comment, news reporting, teaching, scholarship, and research. I do not claim ownership of any of the images/music and they are used solely for the purpose of enhancing the content of the video. I respect the rights of the creators and owners of these images and will remove any image upon request by the rightful owner.
    Copyright Disclaimer under section 107 of the Copyright Act of 1976, allowance is made for “fair use” for purposes such as criticism, comment, news reporting, teaching, scholarship, education, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing.
    🕰️ Timestamps:
    00:00 - Intro
    00:37 - Black Hats
    01:22 - Grey Hats
    02:16 - White Hats
    02:59 - Extra Hats
    03:20 - IP Addresses
    06:16 - Ports
    07:45 - Firewalls
    08:49 - Honey Pots
    09:42 - DoS
    10:32 - DDoS
    11:09 - Servers
    12:34 - Outro
  • Наука та технологія

КОМЕНТАРІ • 67

  • @harsh2314
    @harsh2314 Рік тому +28

    No cap you are one of the best content creator in this field... I watched buffer overflow video first and am in love with the way you make content

    • @crr0ww
      @crr0ww  Рік тому +5

      this is the sweetest comment ever 😭❤️ THANK YOU SO MUCH, im so glad you enjoyed it! 🥹

  • @crr0ww
    @crr0ww  Рік тому +11

    happy holidays, everyone! 🎄 let me know what else you’d like to see in the next one :)
    join our discord server! dsc.gg/crow-academy
    (also the freaking hats at 3:02; take that image with a grain of salt (it's never that dramatic LOL) LANTERN CORP HACKERS OR SOME SH*T IDK)

    • @crr0ww
      @crr0ww  Рік тому

      @@donmo1461 maybe one day ;)

    • @user-ej7fd3re7u
      @user-ej7fd3re7u Рік тому +2

      can you show why http is insecure?

    • @crr0ww
      @crr0ww  Рік тому

      @@user-ej7fd3re7u awesome suggestion! i’ll definitely make sure to cover that :)

  • @irvingirving6275
    @irvingirving6275 Рік тому +6

    Respect. You can communicate clearly complex ideas and make it funny so the knowledge absorption is a lot better. Thank you very much for your work man. You got yourself a subscriber!

  • @phantompuma228
    @phantompuma228 Рік тому +9

    This is really cool!
    The terminology has some similarities to investigations and security, and was super easy to follow and understand, Merry belated Christmas!

    • @crr0ww
      @crr0ww  Рік тому

      thank you so much :D it’s always nice when you can find similarities in different fields like that :))

  • @RendonJr
    @RendonJr 4 місяці тому

    Just what i was looking for. Good content 🎉

  • @yousefsammar176
    @yousefsammar176 Рік тому

    What a wonderful day to find this channel

  • @Xzurii
    @Xzurii Рік тому +1

    Kerning City in the bg, i think im in love

  • @retsu1957
    @retsu1957 Рік тому

    Nice content. This helps me a lot.

  • @piyushpatil6874
    @piyushpatil6874 Рік тому

    Really Helpfull !

  • @abrahamcamarilloloza4882
    @abrahamcamarilloloza4882 Рік тому +3

    Can you make a video on VPNs? I think this was a super simple way of understanding some concepts, and I would really like your approach to this. Great video! hope UA-cam highlights more your channel

    • @crr0ww
      @crr0ww  Рік тому +2

      yes of course! i’ll definitely add VPNs in the next part :) thank you so much ❤️

  • @inchane4933
    @inchane4933 Рік тому +3

    dude please keep creating content

    • @crr0ww
      @crr0ww  Рік тому

      of course :p !! tysm for commenting :)

  • @zetsu6566
    @zetsu6566 11 місяців тому

    keep doing it

  • @hemiilisreal
    @hemiilisreal Рік тому

    i like video very naice , i didnt get the port part a lot but still rest is well explained :)

  • @noorkhara1429
    @noorkhara1429 Рік тому +7

    how much honey comes in a honeypot

  • @HTWwpzIuqaObMt
    @HTWwpzIuqaObMt Рік тому +4

    Happy holidays! Maybe make a video about exploit development or on how to improve your own anonimity. Would be interestinf to lots of beginners

    • @crr0ww
      @crr0ww  Рік тому +1

      sounds good! i have a whole binary exploitation playlist planned but i’ll def cover anonymity :) thank you for your comment!

    • @HTWwpzIuqaObMt
      @HTWwpzIuqaObMt Рік тому +1

      @@crr0ww As a side topic you could do a brief introduction to OS hardening. This will open the way to more blue team based content that could be combined with offensive security to highlight both sides of pen testing engagements

    • @crr0ww
      @crr0ww  Рік тому

      @@HTWwpzIuqaObMt yes! i was actually planning on covering a lot more of the blue-teaming side; things like digital forensics and reverse engineering, etc. i can def add in a section or two about os hardening as well :) ty for the suggestion!

    • @HTWwpzIuqaObMt
      @HTWwpzIuqaObMt Рік тому +1

      @@crr0ww oh awesome! Do you have any other social media by any chance? Perhaps discord

    • @crr0ww
      @crr0ww  Рік тому

      @@HTWwpzIuqaObMt yes! i’ve added in my discord to the description of all my videos; you can find me there

  • @georgevinueza7249
    @georgevinueza7249 Рік тому +1

    holy maplestory bg music :)

  • @Yurkari
    @Yurkari Рік тому +2

    beast asf

    • @crr0ww
      @crr0ww  Рік тому

      appreciate cha

  • @Zihad
    @Zihad Рік тому +3

    great video!
    btw 10:58 Tbps is terabit per second right? And TBps terabyte?

    • @crr0ww
      @crr0ww  Рік тому +3

      thank you so much!! and yeah, you got it :D Tbps = terabits/sec, TBps = terabytes/sec

    • @janoslaszlovasik9161
      @janoslaszlovasik9161 Рік тому

      Fyi there's also TiB meaning tebibyte, not the same as the previous two.

  • @NightlockHayze
    @NightlockHayze Рік тому +3

    Hello mate, it is i, Nightlock

  • @Artym_Q
    @Artym_Q Рік тому +3

    you cool man

    • @crr0ww
      @crr0ww  Рік тому

      NAH! YOURE COOL :D TYSM ❤️🥹

  • @astranger4810
    @astranger4810 Рік тому +1

    Knowledge 😮

  • @skeletron9505
    @skeletron9505 Рік тому

    el barto was here.

  • @leefhuh
    @leefhuh 6 місяців тому

    is that maplestory music i hear?

  • @danielrivas3444
    @danielrivas3444 Рік тому +6

    after watching this i now, too want to hack

  • @Zooiest
    @Zooiest Рік тому

    I'd say most (D)DoS attacks are done via actual exploits nowadays. Like forcing a Minecraft server to constantly load chunks where you shouldn't be allowed to

  • @zer0day463
    @zer0day463 Рік тому +2

    Noice video

    • @crr0ww
      @crr0ww  Рік тому

      thank you so much!! :)

    • @zer0day463
      @zer0day463 Рік тому +1

      @@crr0ww your belcome

  • @n.w.r5411
    @n.w.r5411 Рік тому

    man you're pretty funny

  • @Abdirahmaann
    @Abdirahmaann Рік тому +2

    What is your type role in IT??

    • @crr0ww
      @crr0ww  Рік тому

      i'm trained as a penetration tester : ) i hope that's what you mean! although i'm trying to shift more onto the red-teaming side of things; thank you for your comment! :D

    • @Abdirahmaann
      @Abdirahmaann Рік тому +1

      @@crr0ww thank bro welcome and subscribed

    • @crr0ww
      @crr0ww  Рік тому

      @@Abdirahmaann thank you so much! :D

  • @doofus989
    @doofus989 Рік тому +2

    system or network - they do have user honey pots now days or files when open leak your ip address -- like fake spn user accounts on active directory

    • @crr0ww
      @crr0ww  Рік тому +2

      oh yeah, most definitely! one of my instructors, nikhil mittal (dude who wrote nishang) has some super cool tools on his github made especially for this purpose :)

    • @doofus989
      @doofus989 Рік тому +1

      i would love to know how many companies actually use honeypots this way - doesnt seem like many tho

    • @crr0ww
      @crr0ww  Рік тому +2

      most fortune companies actually do use active directory with pretty big defensive systems set in place, from things like looking at changes in the registry, general traffic, event ids; which include ids denoting changes to users as well and some crazy things like kerberos auth reqs and stuff (although with some kerberos most of this stuff is hard to discern since the domain controller sends sooooo many of these requests out, but like things 100% still do stick out, for instance, using RC4/NTLM hashes for auth instead of AES, that’ll stick out like a sore thumb, among other things) so it’s a lot more prevalent than people might think! although the super hollywood-esque decoy i’d say is pretty scarce.
      i’d imagine most threat actors, upon discovering a suspiciously out of place user with domain admin privileges would be a bit more cautious, knowing all the defences in place now a days :)

    • @doofus989
      @doofus989 Рік тому

      @@crr0ww yeah, i wasnt sure tho since groups like Guacamaya, phineas fisher make things look easy for bad guys

  • @sinatra02
    @sinatra02 Рік тому +2

    log are u ben parker 🥴

    • @crr0ww
      @crr0ww  Рік тому +2

      with great secrets comes no transparency 🤫🤐

  • @0x2fd
    @0x2fd Рік тому +1

    Do you have a job now brother?

  • @legion465
    @legion465 Рік тому

    very good Respect From Armenian Hackers Group LEGION