Це відео не доступне.
Перепрошуємо.

how to build your hacking lab

Поділитися
Вставка
  • Опубліковано 17 сер 2024
  • Hi Everyone, in this video I will guide you on how to build your own hacking box and start the journey to become an ethical hacker. This video is first in a series to learn the foundations of hacking methods, techniques and tools to be used to improve your skills, knowledge and protect your own/organizations environment.
    Feel free to leave any feedback or comments and I would try my best to address it all
    CHAPTERS:
    0:00 - 1:33 Opening
    1:34 - 1:43 Intro video
    1:44 - 2:25 What is a hack box and why do you need one?
    2:26 - 4:25 HW requirements (CPU, RAM, HDD)
    4:26 - 7:03 SW tools (Kali, Email encryption, FW and PassManager)
    7:04 - 13:09 Setting your hack box (VM, EC2, Kali.....)
    13:10 - 13:58 Ready to start hacking?
    13:59 - 15:36 5 new Kali tools (Brutshark, DefectDojo, PhpSploit, Shellfire, SprayingToolKit
    15:37 - 17:04 Summary
    More video's about hacking and ethical hacking:
    1. Hacking APIs - • How Hacking APIs Works...
    2. OSINT - • OSINT framework Explai...
    3. What is Ethical Hacker - • What is ethical hacking?
    Description Links:
    1Password - 1password.com/...
    Oracle VM Virtual Box Download: - www.virtualbox...
    Amazon AWS Website - aws.amazon.com/
    Hacking Challenges by VulnHub - www.vulnhub.com/
    Kali Commands to download tools:
    Brute Shark: sudo apt install bruteshark
    DefectDojo: sudo apt install defectdojo
    Phpsploit: sudo apt install phpsploit
    Sheelfire: sudo apt install shellfire
    SprayingToolkit: sudo apt install sprayingtoolkit
    Watch more cyber security fundamental videos
    1. Stuxnet - • Explaining cybersecuri...
    2. Cybersecurity Kill Chain - • cyber kill chain
    3. Red Vs Blue teams in cybersecurity - • cybersecurity red team...
    4. OSINT - Open Intelligence tools - • OSINT framework Explai...
    5. Does VPN Prevent Hacking - • Does VPN prevents hack...
    6. How to get into cybersecurity with no experience - • how to get into cybers...
    7. The Secrets of the DarkWeb - • The Secrets of the Dar...
    8. NIST cybersecurity framework - • NIST cybersecurity fra...
    9. Deadly Ransomware attacks - • what is ransomware
    10. What is ethical hacking - • What is ethical hacking?
    11. Top 5 cybersecurity books - • Top 5 cybersecurity books
    12 . Cyber Security Career - • Cybersecurity Career t...
    13. Top 10 cybersecurity threats 2021- • Top 10 cybersecurity t...
    14. Weak passwords | Consequences and Best Practices - • My cyber security chan...
    15. Hacking APIs - • How Hacking APIs Works...
    Be in the loop on the latest videos. Subscribe to my channel and join our growing community! ►►SUBSCRIBE: cutt.ly/YanivH...
    Thank you for being here!
    Stay Safe and Healthy,
    Yaniv Hoffman
    #cybersecuritycertification
    #hacking
    #hackers
    #lab
    #hackingtools
    #hackingphone
    #kali
    #vm
    #metasploit
    #hackingapp
    #cybersecurityfundamentals
    #informationtechnology
    #cybersecurity
    #hackthebox

КОМЕНТАРІ • 24

  • @yanivhoffman
    @yanivhoffman  2 роки тому +5

    Hi Everyone, in this video I will guide you on how to build your own hacking box and start the journey to become an ethical hacker. This video is first in a series to learn the foundations of hacking methods, techniques and tools to be used to improve your skills, knowledge and protect your own/organizations environment.
    Feel free to leave any feedback or comments and I would try my best to address it all

  • @user-th1hz9hc2i
    @user-th1hz9hc2i Рік тому +1

    סרטון מעולה (:

  • @idohoffmanfc3968
    @idohoffmanfc3968 2 роки тому +1

    great video again and happy anniversary !

  • @squiizzy69
    @squiizzy69 2 роки тому +2

    אין עליך יניב אוהבים אותך פה

    • @yanivhoffman
      @yanivhoffman  2 роки тому

      ❤️❤️❤️❤️❤️❤️❤️

  • @bruhhhhh7799
    @bruhhhhh7799 2 роки тому +1

    Amazing😍 nice

  • @marcocaruso3965
    @marcocaruso3965 2 роки тому +1

    Great video Master! Full of insights and useful information ❤️ great job 👏🏼

  • @NoName-dx3bh
    @NoName-dx3bh Рік тому +1

    Need more content!!!

  • @mazalhoffman4914
    @mazalhoffman4914 2 роки тому +1

    Great video 👍👍👍thank you for the interesting and important information 👏🏼👏🏼

  • @deadbrad6041
    @deadbrad6041 2 роки тому +1

    very smart man

  • @-AGM83-
    @-AGM83- 2 роки тому +1

    Thanks mate. Good video.

    • @yanivhoffman
      @yanivhoffman  2 роки тому

      Thank you very much. Really appreciate it

  • @animble
    @animble 2 роки тому +1

    New to the channel, and happy anniversary! Hope I can be here for more, you seem like a fantastic creator! ❤️

    • @yanivhoffman
      @yanivhoffman  2 роки тому +1

      Thx a lot for your kind words ❤️

  • @runningoutoftime7065
    @runningoutoftime7065 2 роки тому +2

    Can you use metasploit in a self built hacking box?

    • @yanivhoffman
      @yanivhoffman  2 роки тому

      yes of course and im working on a chapter related to hacking of DNS. stay tuned my friend

    • @runningoutoftime7065
      @runningoutoftime7065 2 роки тому

      @@yanivhoffman awesome I been trying to get metasploitable 2 but the vdmk file I need wasn’t found in the download after I unzipped the file and I was thinking of going the hack the box route