SQL Injection and Hashcat
In this tutorial, I demonstrate how to use SQL Injection to expose password hashes and then cracking those hashes with a tool called Hashcat to get the plain text passwords.
DISCLAIMER: All activities performed in this video were done in a lab environment, against my own systems. PLEASE DO NOT use these actions against any individual, organization, company, agency without their prior, express written permission. This is FOR EDUCATIONAL PURPOSES ONLY!
47
views
Metasploit, msfvenom against Windows Server
In this video I demonstrate how to use Metasploit and msfvenom against a Windows Server.
DISCLAIMER: This video is for educational purposes only and the actions taken in the video were performed against my own lab of servers. DO NOT PERFORM any of the actions portrayed against any individual, company, organization, etc, without their express prior written permission or you can and will most likely be prosecuted.
44
views
Responder, lateral movement, LLMNR, Kiwi and NTLM
In this video I demonstrate how to use Responder, execute lateral movement across systems, the functions of LLMNR and NTLM, and then Kiwi to extract information.
DISCLAIMER: All actions taken in this video were performed in a lab setting against machines I had authorization to attack. All actions are highly illegal if performed against any individual, company, organization, entity, etc unless they have given you prior written consent to do so.
47
views
Using nmap and Metasploit
DISCLAIMER: all activities demonstrated in this video are highly illegal if performed against any individual, company, organization, entity, etc without their express written permission.
Demonstrating nmap and Metasploit using Metasploitable 3.
104
views
File Upload vulnerability (packet manipulation)
DISCLAIMER: all activities demonstrated in this video are highly illegal when/if performed against any individual, company, organization, entity, etc without their prior written permission.
In this video, I demonstrate how to manipulate packets to get around file upload restrictions.
48
views
Cross-site Scripting (XSS) and BeEF
DISCLAIMER: all activities demonstrated in this are highly illegal if/when performed against any person, company, organization, entity, etc without their express written permission!
In this video I demonstrate how attacker's can use cross-site scripting (XSS) to hook users' web browsers.
50
views
Basic Linux Commands
This is a video I wish I had found when I started diving into Linux, years ago. Most Linux distro's have come a long way in terms of graphical user interfaces but, if I'm being honest, you still need to know some commands in the Terminal.
48
views
WPA/WPA2 Cracking
DISCLAIMER: The activities demonstrated in this video are highly illegal if performed against any person, company, organization, entity, etc without their express written permission.
In this video, I demonstrate how attackers can hack your WiFi password using the aircrack-ng suite.
95
views