This is one of multiple videos explaining and demonstrating Cumulus Linux. Full course: https://goo.gl/nm43ZO
Dive into the new world of Open Networking with Cumulus VX. Cumulus VX is a community-supported virtual appliance that enables cloud admins and network engineers to preview and test Cumulus Networks technology at zero cost.
...
https://www.youtube.com/watch?v=SW-X9U-xYEk
EIGRP Troubleshooting Scenario 2. Why will EIGRP neighbor relationships not form? Get $200 worth of network software for free here:https://goo.gl/613TUF
My full course is here: http://www.ccnax.com
#CCNA #CCENT #CCNP
Subscribe to learn how to pass the CCNA 200-125 exam. Also includes content for the ICND1 100-105 and ICND2 200-105 exams.
What do you want to learn? Let me know via the comments.
...
https://www.youtube.com/watch?v=k2F80WfIlBQ
Learn how to configure Aruba / HPE networks. This is one of multiple videos demonstrating the configuration and setup of HPE networking devices. This video shows how to link aggregation / Etherchannel / port aggregation / bonding / trunking.
Get $200 worth of network software for free here: https://goo.gl/613TUF
...
https://www.youtube.com/watch?v=hzagfmCrXQ4
In this series of videos I show you how to download, install and configure Cisco VIRL 1.5.X. Download Cisco VIRL here: http://virl.cisco.com/
Learn about the VIRL Virtual machine, VM Maestro, Licensing and more!
VIRL is CISCO'S POWERFUL, EASY-TO-USE, AND EXTENSIBLE NETWORK MODELING AND SIMULATION ENVIRONMENT.
- Build highly-accurate models of existing or planned networks.
- Design, configure, and operate networks using authentic versions of Cisco's network operating systems
- Build using common platforms like IOSv, IOSv Layer-2, IOS-XRv, NX-OSv, CSR1000v and ASAv. All Included
- Integrate 3rd-party virtual machines, appliances, VNFs, and servers.
- Connect real and virtual networks to form high-fidelity development and test environments.
- Design and test anywhere - VIRL is portable!
...
https://www.youtube.com/watch?v=EZfUtBxR_1Q
Learn how to hack DHCP with Kali Linux! Learn how to use Kali Linux to use a Denial of service attack (DOS) against a DHCP server; set up a rogue DHCP server on Kali Linux and then get hosts to send traffic via Kali Linux so you can use a man-in-the-middle (MITM) attack and capture packets and see usernames and passwords using Wireshark.
It's can be so easy to hack badly configured networks with Kali Linux! Make sure you have got your network configured securely. Otherwise, look how you can hack networks using Kali Linux running on a Windows 10 computer and applications like Yersinia! It's important that you as a network professional know how to protect networks from hackers. Even the new Cisco CCNA 200-301 exam covers some of these hacking topics. Don't just learn the theory of hacking, learn how to hack practically.
In this Ethical Hacking with Kali Linux playlist, I'm going to show you step by step how to hack and protect networks.
Menu:
Overview: 0:00
Network Setup: 2:44
DHCP Denial of service attack: 7:18
Rogue DHCP Server: 10:14
Forward traffic via Kali: 14:14
Capture Passwords using Wireshark: 14:51
======================
Referenced Videos:
======================
DHCP Basics: https://youtu.be/Dp2mFo3YSDY
EVE-NG: https://youtu.be/FDbgTlr-tnw
GNS3: https://youtu.be/Ibe3hgP8gCA
Kali: https://youtu.be/K1bMSPje6pw
======================
Free Network Software:
======================
Solar-PuTTY: http://bit.ly/SolarPutty
SolarWinds TFTP Server: http://bit.ly/2mbtD6j
WAN Killer: http://bit.ly/wankiller
Engineers Toolset: http://bit.ly/gns3toolset
IP Address Scanner: http://bit.ly/swipscan
Network Device Scanner: http://bit.ly/swnetscan
Wifi Heat Map: http://bit.ly/wifiheat
Wifi Analyzer: http://bit.ly/swwifianalyzer
SolarWinds NPM: http://bit.ly/getnpm
kali linux
Hacking
Ethical hacking
EVE-NG
GNS3
VIRL
Packet Tracer
10x Engineer
CCNA
Cisco Devnet Associate
CCNP Enterprise
CCNP Security
CCNP Data Center
CCNP Service Provider
CCNP Collaboration
Cisco Certified Devnet Professional
Cisco Certified Network Professional
LPIC 1
LPIC 2
Linux Professional Institute
LX0-103
LX0-104
XK0-004
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
#kalilinux #ethicalhacking #hacker
...
https://www.youtube.com/watch?v=g9OGphrEMb0
Big thanks to Brilliant for sponsoring this video! Get started with a free 30 day trial and 20% discount: https://Brilliant.org/DavidBombal
The First 200 people that sign up will get a special discount.
Disclaimer: This video is for educational purposes only.
// Jakoby’s SOCIAL//
YouTube: https://www.youtube.com/c/IamJakoby
LinkedIn: https://www.linkedin.com/in/i-am-jakoby
X: https://x.com/i_am_jakoby
Instagram: https://www.instagram.com/i_am_jakoby/
GitHub: https://github.com/I-Am-Jakoby
TikTok: https://www.tiktok.com/@i_am_jakoby
// YouTube Video REFERENCE //
Next Gen Hacker?: https://youtu.be/6jqJ7Ga5CoE
The best Hacking Courses & Certs? Your 2024 roadmap to Pentester success: https://youtu.be/10P4aoXdXTI
// David's SOCIAL //
Discord: https://discord.com/invite/usKSyzb
X: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
TikTok: http://tiktok.com/@davidbombal
YouTube: https://www.youtube.com/@davidbombal
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
00:00 - Coming Up
00:57 - Sponsored Section
03:01 - Intro
03:19 - Power Shell Gallery
05:05 - Modules
06:28 - Microsoft Patch
08:04 - Consulting with the Cybersecurity Community
08:58 - Microsoft Honeypot
10:09 - Models by Jakoby
11:33 - Running Models
12:01 - How Models Function
13:43 - The Vulnerability of The Site
15:30 - Ransomware
18:20 - Owning Models
19:13 - Bug Bounty Program
22:23 - Reverse Shell Generator
29:25 - Methods For Execution
31:49 - How To Solve
33:47 - Engage with the Ethical Hackers
34:20 - Exfiltration Data Bouncing
39:12 - Demo
39:56 - Capture DNS Traffic
41:01 - Running Vanish
50:05 - Running A lot of Testing, No Man’s Land
52:29 - Get ahold of IamJakoby
54:08 - Hak5 Payload
55:57 - Imposter Syndrome
57:41 - Background Story into Hacking
01:07:27 - Stationed in Hawaii
01:10:00 - Conclusion
Disclaimer: This video is for educational purposes only.
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
#hak5 #cybersecurity #microsoft
...
https://www.youtube.com/watch?v=JFWnMMte3f0
He made $100K in 2 months from Bug Bounty! Learn from one of the best!
Big thanks to Brilliant for sponsoring this video! Get started with a free 30 day trial and 20% discount: https://brilliant.org/DavidBombal
Ben (Nahamsec) hacks platforms legally and with their permission! He gives us his top 3 Bug Bounty tips for 2023.
// Websites recommended by Ben //
* https://hackerone.com
* https://www.bugcrowd.com/
* https://picoctf.org/
* https://portswigger.net/web-security
* https://www.intigriti.com/
* https://www.hacker101.com/
* https://www.synack.com/
// Ben’s Social //
Twitch: https://www.twitch.tv/nahamsec
YouTube: https://www.youtube.com/c/nahamsec
Github: https://github.com/nahamsec
Instagram: https://www.instagram.com/nahamsec
Twitter: https://twitter.com/NahamSec
Website: https://nahamsec.com/
// Videos mentioned //
Ben's $100K video: https://youtu.be/TKIEXwOcbfc
Kali Linux Nethunter Android Install in 5 minutes (Rootless): https://youtu.be/KxOGyuGq0Ts
// Youtube channels recommended by Ben//
@InsiderPHD: https://www.youtube.com/@InsiderPhD
@FarahHawa: https://www.youtube.com/@FarahHawa
@STOKFredrik: https://www.youtube.com/@STOKfredrik
@phd_security: https://www.youtube.com/@phd_security
@_JohnHammond: https://www.youtube.com/@_JohnHammond
@IamJakoby: https://www.youtube.com/@IamJakoby
@HackerSploit: https://www.youtube.com/@HackerSploit
@BugBountyReportsExplained: https://www.youtube.com/@BugBountyReportsExplained
// Recommended Books //
Atomic Habits by James Clear: https://amzn.to/46D8yDE
Hacking API’s by Corey J. Ball: https://amzn.to/3NRTafh
Bug Bounty Bootcamp by Vickie Li: https://amzn.to/3JAPZWS
The Web Application Hacker’s Handbook 2 by Daffyd Stuttard and Marcus Pinto: https://amzn.to/3XvNmLp
// MENU //
00:00 - Coming up
01:00 - Brilliant sponsored segment
02:31 - Making $100K in 2 months with bug bounty
04:43 - Top 3 tips for starting with bug bounty
06:15 - Top 3 technical tips for bug bounty
08:10 - "Don't learn to hack, hack to learn" // Consistency is key
11:32 - Top 3 free learning platforms for bug bounty
12:47 - Top 3 bug bounty platforms
15:08 - Vulnerability Disclosure Programs // How VDPs can open doors to opportunities
19:55 - Top 3 recommended YouTube channels
21:27 - Top 3 recommended books
22:17 - Top 3 technologies to understand
23:45 - Helping others // Twitch, YouTube & Twitter
25:35 - Conclusion
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
xss
cross site scripting
portswigger
ajax
jscript
javascript
xss attack
penetration testing
ethical hacking
bug bounty
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
#xss #hack #javascript
...
https://www.youtube.com/watch?v=KXQ_MUe6wKo
Learn Python programming with David Bombal. For much more, go to http://www.cciepython.com
More free Python videos here: https://youtu.be/IhroIrV9_7w
Learn how to automate your networks using Python.
...
https://www.youtube.com/watch?v=shvkbqKVkDQ