In this video, I demonstrate how to modify DNS nameservers manually on Linux with resolvconf. In some FreeBSD, Linux distributions, and other Unix-like operating systems, the resolvconf program maintains the system information about the currently available name servers and manages the contents of the configuration file resolv. conf, which determines Domain Name System (DNS) resolver parameters.
We hope you enjoyed the video and found value in the content. We value your feedback. If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms.
Thanks for watching! Благодарю за просмотр! Kiitos katsomisesta Danke fürs Zuschauen! 感谢您观看 Merci d'avoir regardé Obrigado por assistir دیکھنے کے لیے شکریہ देखने के लिए धन्यवाद Grazie per la visione Gracias por ver شكرا للمشاهدة
In this live stream, we discuss the future of HackerSploit and the Open Cybersecurity Training initiative. I also answer various questions regarding penetration testing and cybersecurity in general.
...
https://www.youtube.com/watch?v=ZHmsMcKa3sY
In this video, I will be showing you how to pwn Blue on HackTheBox. We will cover the basics of Windows enumeration and post exploitation Metasploit modules.
Our videos are also available on the decentralized platform LBRY: https://lbry.tv/$/invite/@HackerSploit:26
SUPPORT US:
Patreon: https://www.patreon.com/hackersploit
Merchandise: https://teespring.com/en-GB/stores/hackersploitofficial
SOCIAL NETWORKS:
Twitter: https://twitter.com/HackerSploit
LinkedIn: https://www.linkedin.com/company/18713892
WHERE YOU CAN FIND US ONLINE:
HackerSploit - Cybersecurity Training Simplified: https://hackersploit.org/
HackerSploit Forum: https://forum.hackersploit.org
HackerSploit Academy: https://www.hackersploit.academy
LISTEN TO THE CYBERTALK PODCAST:
Spotify: https://open.spotify.com/show/6j0RhRiofxkt39AskIpwP7
We hope you enjoyed the video and found value in the content. We value your feedback. If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms.
Thanks for watching!
Благодарю за просмотр!
Kiitos katsomisesta
Danke fürs Zuschauen!
感谢您观看
Merci d'avoir regardé
Obrigado por assistir
دیکھنے کے لیے شکریہ
देखने के लिए धन्यवाद
Grazie per la visione
Gracias por ver
شكرا للمشاهدة
#HackTheBox#Pentesting#Windows
...
https://www.youtube.com/watch?v=efajeZN-sPI
In this video, I demonstrate how to perform DNS enumeration and zone transfers with host, dig, dnsenum, and fierce. DNS zone transfer, also sometimes known by the inducing DNS query type AXFR, is a type of DNS transaction. It is one of the many mechanisms available for administrators to replicate DNS databases across a set of DNS servers.
? SUPPORT US:
Patreon: https://www.patreon.com/hackersploit
Merchandise: https://teespring.com/en-GB/stores/hackersploitofficial
SOCIAL NETWORKS:
Reddit: https://www.reddit.com/r/HackerSploit/
Twitter: https://twitter.com/HackerSploit
Instagram: https://www.instagram.com/hackersploit/
LinkedIn: https://www.linkedin.com/company/18713892
WHERE YOU CAN FIND US ONLINE:
Blog: https://hsploit.com/
HackerSploit - Open Source Cybersecurity Training: https://hackersploit.org/
HackerSploit Academy: https://www.hackersploit.academy
HackerSploit Discord: https://discord.gg/j3dH7tK
LISTEN TO THE CYBERTALK PODCAST:
Spotify: https://open.spotify.com/show/6j0RhRiofxkt39AskIpwP7
We hope you enjoyed the video and found value in the content. We value your feedback. If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms.
Thanks for watching!
Благодарю за просмотр!
Kiitos katsomisesta
Danke fürs Zuschauen!
感谢您观看
Merci d'avoir regardé
Obrigado por assistir
دیکھنے کے لیے شکریہ
देखने के लिए धन्यवाद
Grazie per la visione
Gracias por ver
شكرا للمشاهدة
#DNS
...
https://www.youtube.com/watch?v=EpfHhEGz35I
In this video, I will be showing you how to automate your penetration testing methodology by leveraging various Linux utilities and custom ZSH plugins.
-----------------------------------------------------------------------------------
LINKS:
ZSH Pentest Plugin: https://github.com/jhwohlgemuth/zsh-pentest
ZSH Nmap Plugin: https://github.com/ohmyzsh/ohmyzsh/tree/master/plugins/nmap
ZSH Web-Search Plugin: https://github.com/ohmyzsh/ohmyzsh/tree/master/plugins/web-search
ZSH Quiver Plugin: https://github.com/stevemcilwain/quiver
-----------------------------------------------------------------------------------
BLOG ►► https://bit.ly/3qjvSjK
FORUM ►► https://bit.ly/39r2kcY
ACADEMY ►► https://bit.ly/39CuORr
-----------------------------------------------------------------------------------
TWITTER ►► https://bit.ly/3sNKXfq
INSTAGRAM ►► https://bit.ly/3sP1Syh
LINKEDIN ►► https://bit.ly/360qwlN
PATREON ►► https://bit.ly/365iDLK
MERCHANDISE ►► https://bit.ly/3c2jDEn
-----------------------------------------------------------------------------------
CYBERTALK PODCAST ►► https://open.spotify.com/show/6j0RhRiofxkt39AskIpwP7
-----------------------------------------------------------------------------------
We hope you enjoyed the video and found value in the content. We value your feedback, If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms.
-----------------------------------------------------------------------------------
Thanks for watching!
Благодарю за просмотр!
Kiitos katsomisesta
Danke fürs Zuschauen!
感谢您观看
Merci d'avoir regardé
Obrigado por assistir
دیکھنے کے لیے شکریہ
देखने के लिए धन्यवाद
Grazie per la visione
Gracias por ver
شكرا للمشاهدة
-----------------------------------------------------------------------------------
#Pentesting#Linux
...
https://www.youtube.com/watch?v=v-PObOuJMsQ
In this video, I demonstrate how Google hacking/dorks can be used for penetration testing in finding vulnerabilities, misconfigurations and data exposure on websites. Google hacking is a passive information gathering/footprinting technique that is used to discover vulnerabilities, data exposure and security misconfigurations in websites. It involves using specialized search query operators to finetune results based on what you are looking for.
GHDB: https://www.exploit-db.com/google-hacking-database
? SUPPORT US:
Patreon: https://www.patreon.com/hackersploit
Merchandise: https://teespring.com/en-GB/stores/hackersploitofficial
SOCIAL NETWORKS:
Reddit: https://www.reddit.com/r/HackerSploit/
Twitter: https://twitter.com/HackerSploit
Instagram: https://www.instagram.com/hackersploit/
LinkedIn: https://www.linkedin.com/company/18713892
WHERE YOU CAN FIND US ONLINE:
Blog: https://hsploit.com/
HackerSploit Forum: https://hackersploit.org/
HackerSploit Cybersecurity Services: https://hackersploit.io
HackerSploit Academy: https://www.hackersploit.academy
HackerSploit Discord: https://discord.gg/j3dH7tK
LISTEN TO THE CYBERTALK PODCAST:
Spotify: https://open.spotify.com/show/6j0RhRiofxkt39AskIpwP7
We hope you enjoyed the video and found value in the content. We value your feedback. If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms.
Thanks for watching!
Благодарю за просмотр!
Kiitos katsomisesta
Danke fürs Zuschauen!
感谢您观看
Merci d'avoir regardé
Obrigado por assistir
دیکھنے کے لیے شکریہ
देखने के लिए धन्यवाद
Grazie per la visione
Gracias por ver
شكرا للمشاهدة
#GoogleHacking#Pentesting
...
https://www.youtube.com/watch?v=cFOBUYaxdWI
Welcome to the Linux Essentials For Hackers series, where we will be covering the 20% you need to know to be efficient with Linux. In this video, we will take a look at how to create users and groups in Linux and how to assign permissions with visudo.
This series is sponsored by Linode, use the link below to get 20$ in free credits.
https://promo.linode.com/hackersploit/
Promo code: HACKERSPLOIT20
◼️Get Our Courses:
Python For Ethical Hacking: https://www.udemy.com/python-for-ethical-hacking-develop-pentesting-tools/?couponCode=PFEHJUN
Ethical Hacking Bootcamp: https://www.udemy.com/the-complete-ethical-hacking-bootcamp/?couponCode=TCEHB2019
◼️Our Platforms:
Blog: https://hsploit.com/
HackerSploit Forum: https://hackersploit.org/
HackerSploit Cybersecurity Services: https://hackersploit.io
HackerSploit Academy: https://www.hackersploit.academy
HackerSploit Discord: https://discord.gg/j3dH7tK
HackerSploit Podcast: https://soundcloud.com/hackersploit
iTunes: https://itunes.apple.com/us/podcast/the-hackersploit-podcast/id1439732519?mt=2
◼️Support us by using the following links:
Patreon: http://patreon.com/hackersploit
I hope you enjoy/enjoyed the video.
If you have any questions or suggestions feel free to post them in the comments section or on my social networks.
Social Networks - Connect With Us!
-------------------------------
Facebook: https://www.facebook.com/HackerSploit/
Twitter: https://twitter.com/HackerSploit
Instagram: https://www.instagram.com/hackersploit/
Patreon: http://patreon.com/hackersploit
--------------------------------
Thanks for watching!
Благодаря за гледането
Kiitos katsomisesta
Danke fürs Zuschauen!
感谢您观看
Merci d'avoir regardé
دیکھنے کے لیے شکریہ
देखने के लिए धन्यवाद
Grazie per la visione
Gracias por ver
شكرا للمشاهدة
#Linux#Hacking
...
https://www.youtube.com/watch?v=XvyVjAvZ41c
Hey guys! HackerSploit here back again with another video, in this video, I will be reviewing Stacer for Linux, a system optimizer and monitoring tools for Linux.
Kali Linux is a Debian-derived Linux distribution designed for digital forensics and penetration testing. It is maintained and funded by Offensive Security Ltd.
Stacer Github Repo: https://github.com/oguzhaninan/Stacer
I Hope you enjoy/enjoyed the video.
If you have any questions or suggestions feel free to ask them in the comments section or on my social networks.
?HackerSploit Website: https://hsploit.com/
Support The Channel✔️
Pure VPN Affiliate Link:
PureVPN: https://billing.purevpn.com/aff.php?aff=33288
Patreon: http://patreon.com/hackersploit
Get Our Courses✔️
? Get My Courses at $10 Only!
The Complete Deep Web Course 2018:
https://www.udemy.com/the-complete-deep-web-course-2017/?couponCode=DWCBP2017
✔️SOCIAL NETWORKS
-------------------------------
Facebook: https://www.facebook.com/HackerSploit/
Instagram: https://www.instagram.com/alexi_ahmed/
Twitter: https://twitter.com/HackerSploit
Kik Username: HackerSploit
Patreon: http://patreon.com/hackersploit
--------------------------------
Thanks for watching!
Благодаря за гледането
感谢您观看
Merci d'avoir regardé
Grazie per la visione
Gracias por ver
شكرا للمشاهدة
देखने के लिए धन्यवाद
...
https://www.youtube.com/watch?v=nq-6J4aDMc0
In this video series, we will be taking a look at how to set up, secure, and audit Linux servers. This video covers the essentials of securing SSH.
Register for part 2 of the Linux Server Security Series: https://bit.ly/3kvVt6f
Get $100 in free credits on Linode: https://promo.linode.com/hackersploit100/
Our videos are also available on the decentralized platform LBRY: https://lbry.tv/$/invite/@HackerSploit:26
SUPPORT US:
Patreon: https://www.patreon.com/hackersploit
Merchandise: https://teespring.com/en-GB/stores/hackersploitofficial
SOCIAL NETWORKS:
Twitter: https://twitter.com/HackerSploit
LinkedIn: https://www.linkedin.com/company/18713892
WHERE YOU CAN FIND US ONLINE:
HackerSploit - Cybersecurity Training Simplified: https://hackersploit.org/
HackerSploit Forum: https://forum.hackersploit.org
HackerSploit Academy: https://www.hackersploit.academy
LISTEN TO THE CYBERTALK PODCAST:
Spotify: https://open.spotify.com/show/6j0RhRiofxkt39AskIpwP7
We hope you enjoyed the video and found value in the content. We value your feedback. If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms.
Thanks for watching!
Благодарю за просмотр!
Kiitos katsomisesta
Danke fürs Zuschauen!
感谢您观看
Merci d'avoir regardé
Obrigado por assistir
دیکھنے کے لیے شکریہ
देखने के लिए धन्यवाद
Grazie per la visione
Gracias por ver
شكرا للمشاهدة
#Linux#Security#Cybersecurity
...
https://www.youtube.com/watch?v=Ryu3SDPYNb8
In this clip, we discuss the increasingly growing role of Artificial Intelligence(AI) in Cyber Security and its effect on Cyber Security jobs and roles going forward.
Question Form: https://docs.google.com/forms/d/1d7A6fI--ZuJWXmLppskisW7U6Hlg7LE_MgTt1ffEsbc/edit?usp=sharing
WHERE YOU CAN FIND US ONLINE:
Blog: https://bit.ly/3qjvSjK
Forum: https://bit.ly/39r2kcY
Academy: https://bit.ly/39CuORr
SOCIAL NETWORKS:
Twitter: https://bit.ly/3sNKXfq
Instagram: https://bit.ly/3sP1Syh
LinkedIn: https://bit.ly/360qwlN
? SUPPORT US:
Patreon: https://bit.ly/365iDLK
Merchandise: https://bit.ly/3c2jDEn
LISTEN TO THE CYBERTALK PODCAST:
Spotify: https://open.spotify.com/show/6j0RhRiofxkt39AskIpwP7
We hope you enjoyed the video and found value in the content. We value your feedback, If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms.
Thanks for watching!
Благодарю за просмотр!
Kiitos katsomisesta
Danke fürs Zuschauen!
感谢您观看
Merci d'avoir regardé
Obrigado por assistir
دیکھنے کے لیے شکریہ
देखने के लिए धन्यवाद
Grazie per la visione
Gracias por ver
شكرا للمشاهدة
#CyberTalk#Malware#ReverseEngineering
...
https://www.youtube.com/watch?v=HtYlGdEo_9o