Hacking Soccer [HackTheBox Walkthrough]

Поділитися
Вставка
  • Опубліковано 15 лис 2024

КОМЕНТАРІ • 20

  • @t.g.k3530
    @t.g.k3530 7 місяців тому +1

    Great video ! i am amazed by you note taking skill, well done !

    • @ByteSizedSec
      @ByteSizedSec  7 місяців тому +1

      Thank you very much! Its a quite simple system but it works

  • @xj0ex39
    @xj0ex39 8 місяців тому +2

    bro i absolutely love your videos since i discovered you. you explain things in such a way its easy for me to actually keep up and learn\commit to memory the concepts im learning. i hope big things for your channel and your future in tech. -theadmin

    • @ByteSizedSec
      @ByteSizedSec  8 місяців тому

      Hey thank you so so much for the kind words! Very much appreciated, lets see how where I can take this. Im very glad you get something out of it !

    • @jacobkowalewski1929
      @jacobkowalewski1929 7 місяців тому +1

      Cannot agree more

    • @ByteSizedSec
      @ByteSizedSec  7 місяців тому

      thank you so so much guys! @@jacobkowalewski1929

  • @Ibr8kThingz
    @Ibr8kThingz 7 місяців тому +1

    Hello brother. So I was wondering if you're going to use Parrot OS for the OSCP exam? They state the VPN file is designed for Kali when taking the exam but I imagine it would work with other distributions. I know they highly encourage it but wondered what your thoughts were. I understand Parrot is more lightweight and responsive. Just trying to figure out what direction to go since my kernel was left outdated and had to reinstall my VM.

    • @ByteSizedSec
      @ByteSizedSec  7 місяців тому

      Great question! This is my second attempt, and i did use Parrot the first time, too. There are no issues with it. The only thing is, they can not help you debug, should something still go wrong. That's the only risk you're gonna have to take. I just have gotten so used to Parrot, I'll be fine, issue free during the exam

  • @Hckr-ei2xj
    @Hckr-ei2xj 8 місяців тому +2

    nice one keep this up my friend

    • @ByteSizedSec
      @ByteSizedSec  8 місяців тому

      Thank you very much, I will !

  • @ambidiestr0
    @ambidiestr0 8 місяців тому +2

    Nicely done again! See ya on the next one! 👌🏻✌🏿🤙🏻

    • @ByteSizedSec
      @ByteSizedSec  8 місяців тому

      Cheers man! In a bit 👋🏾

  • @pendragon3434
    @pendragon3434 8 місяців тому +1

    Great video bro, i always learn something new from your walkthroughs

    • @ByteSizedSec
      @ByteSizedSec  8 місяців тому +1

      Glad to hear it man, that is the goal for sure!

    • @pendragon3434
      @pendragon3434 8 місяців тому +1

      @@ByteSizedSec question for you, what's the reasoning behind using rustscan and autorecon? I've never gotten into the habit of using rustscan as last I had read up on it, it was unable to check for UDP which to me was a big deal. So I was wondering what benefit you get from running both those tools concurrently.

    • @ByteSizedSec
      @ByteSizedSec  8 місяців тому +1

      @pendragon3434 good question. So rustscan is written in rust, which is just incredibly fast. It scans all 65535 ports in under 5 seconds. But you are right, it doesn't scan UDP ports, but running those is always slow anyway. The reason for why I scan using rustscan, is that sometimes nmap will be very slow. So while waiting for it to finish, Rustscan might give you enough information to get started with other recon commands, while you wait.

    • @pendragon3434
      @pendragon3434 8 місяців тому +1

      @@ByteSizedSec ah okay that makes a lot of sense, appreciate the explanation thanks a lot!

    • @ByteSizedSec
      @ByteSizedSec  8 місяців тому

      you're very welcome!@@pendragon3434

  • @lividlareb
    @lividlareb 8 місяців тому +2

    you earned a subscriber

    • @ByteSizedSec
      @ByteSizedSec  8 місяців тому +1

      Great to hear! Welcome, and thank you for the support!