I was recently let go after 9 months in my first professional security role. (Data security analyst) They created the position 9 months ago, and decided its no longer needed. I was in such a high with confidence and learning everyday. Since then....I cant even focus straight. No confidence. The timing of this video series coming out is incredible. Thank you.
Awesome video, got my box set up and now I’m going through and adding files that I think will be useful. I can see this being super helpful for a lot of things, really appreciate you sharing your knowledge with us!
Great content, as always! I saw you are using a basic plan when you configure your box, and it makes sense for what you showed. Till now I used my on-prem infra and my question will be: do you use the box for "heavy" activities (e.g. enumeration/fuzzing/hash cracking), in case they are allowed by the cloud provider?
What value does one derive by creating a localhost label entry for the loop back address in the DNS records? I know this entry can be used for setting up a Domain Controller, but is there some other reason?
hii i learned many thinks from u sir i want to the know about Exception of CSRF Impact: ->On Login and Logout Functionality. ->On Get Functionality would u plzz make a short video on this topic
probably because he only needs a bare bones ubuntu/linux VM to navigate and install small infrastructure. Not a full on VM with tools and whatnot that are not needed and has a large filesize and need more cpu power to run. Ubunutu is 2 gigs, Kali is from 4gigs - 20gigs.
hello NahamSec , I recently make a automation tool name 1nject0r , written in Go .. which can help to specifically Header Based Injections .. like HHI , cache poisoning , crlf .. and many more .. can you please help me to improve the tool ?
I was recently let go after 9 months in my first professional security role. (Data security analyst) They created the position 9 months ago, and decided its no longer needed. I was in such a high with confidence and learning everyday. Since then....I cant even focus straight. No confidence. The timing of this video series coming out is incredible. Thank you.
i appreciate your backstory.
Awesome video, got my box set up and now I’m going through and adding files that I think will be useful. I can see this being super helpful for a lot of things, really appreciate you sharing your knowledge with us!
Literally just made a website last week this is perfect for a walkthrough with domain hacking
This is the content I needed. I have been confused so much by what a VPS is used for. Thanks Naham
Bro you should always try to keep it up such intresting content full support ❤❤❤
Great content, as always! I saw you are using a basic plan when you configure your box, and it makes sense for what you showed. Till now I used my on-prem infra and my question will be: do you use the box for "heavy" activities (e.g. enumeration/fuzzing/hash cracking), in case they are allowed by the cloud provider?
This was awesome, but where is the part 2 on actual automation??
Ohh I am excited for this video. Exactly what I need
HUGE, thanks for your videos! I'm creating my own tool at the moment and this is really useful, i had a total different approach
Nice video Naham! Thank you for share with us your knowledge and tricks
Hey there! Thank you so much for your fantastic work! I can't wait to see your video on data organization! Keep on rockin'!
What value does one derive by creating a localhost label entry for the loop back address in the DNS records? I know this entry can be used for setting up a Domain Controller, but is there some other reason?
1st comment dream to be a ethical hacker as a carrier ❤
cool video, what do you use for catching blindxss?
hii
i learned many thinks from u sir
i want to the know about
Exception of CSRF Impact:
->On Login and Logout Functionality.
->On Get Functionality
would u plzz make a short video on this topic
So it's for tracking and storing of stuff we do like recon and attack we do and payloads etc ?
{replying to keep track of your comment - wondering the same thing)
Looking forward to part 2
Great video, would love more content like this!
When you dropping part 2?
This is a great topic and excellent video!
Part 2 plis
really nice video dude
Just curious, why did you create an Ubuntu VM instead of a Kali Linux VM on Digital Ocean?
probably because he only needs a bare bones ubuntu/linux VM to navigate and install small infrastructure. Not a full on VM with tools and whatnot that are not needed and has a large filesize and need more cpu power to run. Ubunutu is 2 gigs, Kali is from 4gigs - 20gigs.
We want video on how to make our own workflow
This is Gold!
Thanks so much
I appreciate you 🙏
Great information bro You Da Man :)
THanks for a good content THANK YOU
Thanks bro . But why most of time you voice feels low 😢😢
I think its because he doesn't have to talk over background music. But sometimes he could be louder.
data organization
hello NahamSec , I recently make a automation tool name 1nject0r , written in Go .. which can help to specifically Header Based Injections .. like HHI , cache poisoning , crlf .. and many more .. can you please help me to improve the tool ?
He never made part 2 to this.
🎉
دمت گرم 🇮🇷
2nd
1st
Brother please speak slowly ...
As usual cool tutorial thanks !!