Skip to main content

Hacking and InfoSec stuff



rss RSS

1,122
RESULTS


Show sorted alphabetically

Show sorted alphabetically

SHOW DETAILS
up-solid down-solid
eye
Title
Date Archived
Creator
Hacking and InfoSec stuff
by a16z
movies

eye 2,157

favorite 7

comment 0

As a former Department of Justice prosecutor, Katie Haun set up the first-ever “cryptocurrency task force” for the U.S. government. She also led the investigations into the Mt. Gox hack and the corrupt agents on the Silk Road task force -- the first cases of the U.S. government using the bitcoin blockchain to fight fraud, not just against criminals but against their own. Haun -- Coinbase board member, Stanford lecturer, and now general partner on a16z crypto -- shares that story in this...
Topics: Youtube, video, Science & Technology, crypto, Silk Road, payments, unbanked, hyperinflation
How to Run Kali as a Windows Subsystem for Linux Full Tutorial: http://bit.ly/KaliAsWSL Subscribe to Null Byte: https://goo.gl/J6wEnH Microsoft's Windows Subsystem for Linux (WSL) is a great way to utilize Kali on your Windows computer without the need for a virtual machine. However, it is slightly limited right to what you can do, since security restrictions prevent the use of raw sockets, so tools like Nmap won't work and you won't be able to set your Wi-Fi adapter into promiscuous mode (or...
Topics: Youtube, video, Science & Technology, hacking, wonderhowto, wonder how to, hack, hacker,...
Hacking and InfoSec stuff
by Kaspersky Lab
movies

eye 1,299

favorite 1

comment 0

Sergey Golovanov Igor Soumenkov Kaspersky Lab In 2016 Kaspersky Lab employees participated in incident response cases that took place in dozens of financial institutions around the globe. In most cases we had to provide forensics analysis of ATMs. When Carbanak attack details were announced at #TheSAS2015, criminals also found this information useful. Other criminal groups eagerly adopted the same TTPs. Banks started to suffer from attacks on ATMs including both, malware and physical access....
Topics: Youtube, video, Entertainment, #TheSAS2017, KASPERSKY LAB, cyber security, itsecurity, conference
Hacking and InfoSec stuff
movies

eye 1,850

favorite 1

comment 0

Kim Zetter, Journalist, Author, Speaker, Freelance journalist Gary Brown, Professor of Cyber Security, Marine Corps University Oren Falkowitz, CEO and Co-Founder, Area 1 Security Roy Katmor, Co-Founder and CEO, enSilo Samples of malware in the wild hint how digital weapons today may be more powerful and stealthy than Stuxnet. Cyberwar experts will explore the current state of the art and future of digital weaponry. https://www.rsaconference.com/events/us17 Source:...
Topics: Youtube, video, Science & Technology, Cyber Warfare, Zero Day Vulnerability, Hackers &...
Hacking and InfoSec stuff
movies

eye 1,573

favorite 2

comment 0

https://blog.torproject.org/blog/releasing-tor-animation See this video in your language: Arabic https://www.youtube.com/watch?v=6v0ga4f2myY English https://www.youtube.com/watch?v=JWII85UlzKw Farsi https://www.youtube.com/watch?v=Y16VGmL5778 French https://www.youtube.com/watch?v=Mnrn3y-Qbyk German https://www.youtube.com/watch?v=fzeBfbHb0ZY Polish https://www.youtube.com/watch?v=Fx7bFE1v5m8 Spanish https://www.youtube.com/watch?v=Sz_J6vJ4MYw Source: https://www.youtube.com/watch?v=JWII85UlzKw...
Topics: Youtube, video, Education, Tor (Software), Online Privacy, Anonymity, Privacy, Surveillance,...
Hacking and InfoSec stuff
movies

eye 5,344

favorite 14

comment 0

How to Crack Weak Wi-Fi Passwords Full Tutorial: http://bit.ly/ParrotAir Subscribe to Null Byte: https://goo.gl/J6wEnH In this edition of Cyber Weapons Lab, we explore hacking Wi-Fi with bad passwords. We'll show you how using bad passwords can let anyone with a simple wireless network adapter and laptop hack a network with almost no resistance. Follow Null Byte on: Twitter: https://twitter.com/nullbytewht Flipboard: http://flip.it/3.Gf_0 Source: https://www.youtube.com/watch?v=ejTPWPGP0GA...
Topics: Youtube, video, People & Blogs, null byte, airgeddon, wifi hacking, wpa, wpa2, cracking,...
How to Phish for WiFi Passwords on Kali with Wifiphisher Full Tutorial: http://bit.ly/WiFiPhish Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie While there are plenty of tools available to hackers to crack passwords, several of which we've covered, sometimes a less direct approach is best. Social engineering attacks can be very successful assuming your target is tech illiterate. On this episode of Cyber Weapons Lab, we'll show you Wifiphisher, a tool...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 2,166

favorite 18

comment 0

Let’s take a journey back to the 1980’s and beyond, to discover the origins of the Cyberpunk movement, in literature, cinema, television, video games, comics and more! In this documentary miniseries, we will discover the wonders of Cyberpunk, dating back to the 1940’s, all the way through 1989, with each successive episode taking on a new decade. Co-written by Shalashaskka https://www.youtube.com/c/Shalashaskka 2:19 - The Origins of Cyberpunk 4:14 - PROTO-PUNK 4:58 - Philip K. Dick 5:30 -...
Topics: Youtube, video, Gaming, neuromancer, william gibson, neuromancer movie, mike pondsmith, akira,...
Hacking and InfoSec stuff
movies

eye 611

favorite 0

comment 0

An exclusive Tomorrow Unlocked documentary. One day in May 2017, computers all around the world suddenly shut down. A malware called WannaCry asks for a ransom. The epidemic suddenly stops, because a young, British researcher finds a killswitch, by accident. Source: https://www.youtube.com/watch?v=vveLaA-z3-o Uploader: Tomorrow Unlocked
Topics: Youtube, video, Science & Technology, tomorrowunlocked
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 2,346

favorite 5

comment 0

by SaintDruG / Anon for: Blackhatethicalhacking.com This is for Educational Purpose Only! Anything you do with this that creates bad results is your responsibility! Support our work on Patreon: https://www.patreon.com/blackhatethicalhacking Source: https://www.youtube.com/watch?v=R9Ee16XyrEU Uploader: Black Hat Ethical Hacking
Topics: Youtube, video, Education, linux, wifite, hacking, cracking, wifi crack, blackhatlessons, black hat...
Hacking and InfoSec stuff
movies

eye 752

favorite 7

comment 0

How to Run an OSINT Investigation on a Phone Number Full Tutorial: http://bit.ly/PhoneOSINT Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie IMPORTANT (JUNE 6, 2019): The OSINT Tools by Mike Bazzel featured in this guide were taken down from his website due to increased DDoS-style attacks, as well as DMCAs and cease-and-desists from some of the tools included. Phoneinfoga will still work in this guide, but for the others, you can try using each...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
by Source Code Deleted
movies

eye 1,092

favorite 8

comment 0

This is NOT my work. This is something I found in a back up from my old Server. I want to provide content for new people to become involved . It should be noted , that this is NOT reverse engineering like everyone says. This is intro to cracking software. I think for the most part the content doesn't exist on the internet. I think I still have the binaries too, when I find them I will upload them as well. I also would like to add to this, that the places where you normally can download this for...
Topics: Youtube, video, Education, software cracking, cracking, cracking software, software, hacking, crack...
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 1,755

favorite 14

comment 0

Hello Everyone! This is SaintDruG for Black Hat Ethical Hacking . Todays Hacking Minutes Series, Machines used: Mac OS: Sierra High / Raspberry Pi Runing Parrot OS We will create a backdoor PHP, and then run apache2 to start our webserver hosting a webpage on a raspberry pi. That will be the victim, so after creating the backdoor, we will copy it on that webserver. We will access our backdoor and get a shell! Giving us a lot of power and access on that webserver, basically own the machine....
Topics: Youtube, video, Science & Technology, Black Hat Ethical Hacking, SaintDruG, Ethical Hacking, Mr...
Hacking and InfoSec stuff
movies

eye 288

favorite 2

comment 0

How to Use Wireshark to See Phone Traffic Full Tutorial: https://nulb.app/z4m2t Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 131 Ever wonder what someone across the room is doing on their phone? With Wireshark, a pentester, white hat hacker, etc. can analyze the packets flowing through a network and provide an alarming amount of information about a target. We'll show you how to spy on network traffic, on this episode of...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
by GoogleTechTalks
movies

eye 2,040

favorite 7

comment 0

Google Tech Talks February 21, 2007 ABSTRACT The Python language, while object-oriented, is fundamentally different from both C++ and Java. The dynamic and introspective nature of Python allow for language mechanics unlike that of static languages. This talk aims to enlighten programmers new to Python about these fundamentals, the language mechanics that flow from them and how to effectively put those to use. Among the topics covered are duck-typing, interfaces, descriptors, decorators,...
Topics: Youtube, video, Howto & Style, python, google, howto
Hacking and InfoSec stuff
by FUTANTCOLLECTIVE
movies

eye 550

favorite 15

comment 0

Cyberpunk is a science fiction genre noted for its focus on "high tech and low life." The name is a portmanteau of cybernetics and punk, and was originally coined by Bruce Bethke as the title of his short story "Cyberpunk," published in 1983. I compiled all five parts into one. If you're a fan of the genre, please check out our other videos and music. WWW.FUTANT.NET Source: https://www.youtube.com/watch?v=wbp6G8do2_E Uploader: FUTANTCOLLECTIVE
Topics: Youtube, video, Education, Futant, Dystopia, Psychedelic, Electronica, Timothy Leary, Cyberpunk,...
Hacking and InfoSec stuff
movies

eye 683

favorite 3

comment 0

MagSpoof is a device that can spoof/emulate any magnetic stripe or credit card *wirelessly*. Full details at https://samy.pl/magspoof/ By Samy Kamkar - Allows you to store all of your credit cards and magstripes in one device - Works on traditional magstripe readers wirelessly (no NFC/RFID required) - Can disable Chip-and-PIN - Correctly predicts Amex credit card numbers + expirations from previous card number - Supports all three magnetic stripe tracks, and even supports Track 1+2...
Topics: Youtube, video, Science & Technology, hacking, reverse engineering, coding, samy kamkar,...
Hacking and InfoSec stuff
by Google Developers
movies

eye 912

favorite 3

comment 0

Google Python Class Day 1 Part 1: Introduction and Strings. By Nick Parlante. Support materials and exercises: https://developers.google.com/edu/python/introduction Source: https://www.youtube.com/watch?v=tKTZoB2Vjuk Uploader: Google Developers Upload date: 2010-03-01
Topics: Youtube, video, Science & Technology, google, programming, languages, python, tutorial
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 1,082

favorite 6

comment 1

by SaintDruG / Anon for: Blackhatethicalhacking.com This is for Educational Purpose Only! Anything you do with this that creates bad results is your responsibility! Support our work on Patreon: https://www.patreon.com/blackhatethicalhacking Source: https://www.youtube.com/watch?v=V5TUkRMEW0Q Uploader: Black Hat Ethical Hacking
favoritefavoritefavoritefavoritefavorite ( 1 reviews )
Topics: Youtube, video, Education, linux, blackhatethicalhacking, black hat ethical hacking, hacking,...
Hacking and InfoSec stuff
by FPS Weapons
movies

eye 378

favorite 5

comment 0

PLEASE SUBSCRIBE AND LEAVE A LIKE :) This is a video on how to build an EMP generator. The device creates an electromagnetic pulse which disrupts electronics from about a meters range. The EMP works by sending an electric current through a magnetic field this being the magnetic coated copper wire. Be very care if making one of these because the high voltage capacitor will deliver a very painful shock when coming in contact with you, also if the device is used for malicious purposes it is seen...
Topics: Youtube, video, Entertainment, fps weapons, emp, emp jammer, how to make an emp jammer, how to make...
Hacking and InfoSec stuff
movies

eye 179

favorite 1

comment 0

How to Hack FM Radio Frequencies with an RPi Full Tutorial: http://bit.ly/FMhack Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie There's an entire spectrum of information that surrounds us. With a Raspberry Pi and some simple know-how, you can take social engineering or a simple prank to the next level by hijacking radio frequencies on this episode of Cyber Weapons Lab. Guide on setting up a headless Raspberry Pi: http://bit.ly/HeadlessPi Recommended...
Topics: Youtube, video, Howto & Style, wonderhowto, nullbyte, null byte, hack, hacking, hacker, hacks,...
Hacking and InfoSec stuff
movies

eye 981

favorite 6

comment 0

by SaintDruG / Anon for: Blackhatethicalhacking.com This is for Educational Purpose Only! Anything you do with this that creates bad results is your responsibility! Support our work on Patreon: https://www.patreon.com/blackhatethicalhacking Source: https://www.youtube.com/watch?v=dJB9NG_hZOo Uploader: Black Hat Ethical Hacking
Topics: Youtube, video, Education, hacking twitter, hacking facebook, blackhat, black hat lessons,...
Hacking and InfoSec stuff
movies

eye 619

favorite 2

comment 0

How to Unlock Word & Excel Files That Have Passwords Full Tutorial: https://bit.ly/OfficePass Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie If you like to protect your Microsoft documents with a password, then you already know that the stronger the password, the more protected the file will be. However, on today's episode of Cyber Weapons Lab, we'll show you how to crack those passwords on Microsoft Office files, no matter how strong the...
Topics: Youtube, video, Howto & Style, wonderhowto, nullbyte, null byte, hack, hacking, hacker, hacks,...
Hacking and InfoSec stuff
by TheNotSoCivilEngr
movies

eye 250

favorite 0

comment 0

Today we build a long range rfid card reader which can be used to grab badges in the field from surprisingly far away... Build items: Reader: https://www.amazon.com/gp/product/B00UX03TLO/ref=ppx_yo_dt_b_asin_title_o02_s00?ie=UTF8&psc=1 Battery Pack: https://www.amazon.com/gp/product/B00VE7HBMS/ref=ppx_yo_dt_b_asin_title_o04_s00?ie=UTF8&psc=1 ESPKey: https://redteamtools.com/espkey If you are interested in the HID Maxiprox you can get one here:...
Topics: Youtube, video, People & Blogs, lock, pentesting, physical penetration testing, tubular, key,...
Hacking and InfoSec stuff
by Zcash
movies

eye 216

favorite 0

comment 0

This is the story of of the Zcash Multi-Party Computation Ceremony. Zcash's zero-knowledge proofs rely on a set of public parameters which allow users to construct and verify private transactions. Due to cryptographic limitations, these parameters must be generated in a setup phase: some random numbers are sampled (which we refer to as the "toxic waste") which are then used to construct the parameters. After the setup phase (aka "The Ceremony"), the toxic waste must be...
Topics: Youtube, video, Science & Technology, zcash, cryptography, cryptocurrency, zcash ceremony,...
Hacking and InfoSec stuff
movies

eye 206

favorite 3

comment 0

How to Discover a Person's Social Media Sites with Sherlock Full Tutorial: https://nulb.app/sherlock-0196138 Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie When running an OSINT investigation, discovering a person's screen name on any social website can lead to a lot of information. On today's episode of Cyber Weapons Lab, we'll show you how to make the most of this information and hunt down accounts across the internet with Sherlock. Follow Null...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
by BlackOpsPro07
movies

eye 510

favorite 10

comment 0

This video shows how hacking came to be and the logic and what hacking really is. Hacking is not only negative actions but it is divided into 3 categories black hat- illegal (bad) grey hat- both legal and illegal helps the community but at times does things that are illegal and white hat- such as security firms or individuals hacking for the security of others (good) Source: https://www.youtube.com/watch?v=PUf1d-GuK0Q Uploader: BlackOpsPro07
Topics: Youtube, video, Education, Hacker, Hackers, Hacking, guide, How to Hack, History of hacking
Hacking and InfoSec stuff
movies

eye 253

favorite 0

comment 0

How to Hijack MacOS Machines with EvilOSX Full Tutorial: http://bit.ly/EvilOSX Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie While many people consider macOS (aka Mac OS X) computers to be more secure, some of its most prominent features make it all the more damaging when infiltrated by a skilled attacker. On this episode of Cyber Weapons Lab, we'll teach you how to infiltrate a MacBook or other macOS computer using EvilOSX. Follow Null Byte on:...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 90

favorite 1

comment 0

How to Hunt Down Wi-Fi Devices Full Tutorial: https://nulb.app/x4pgb Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 151 With the right equipment, being able to monitor wireless signals is incredibly easy. The ability to track down the source of a Wi-Fi transmission can be invaluable to a hacker or pentester trying to pinpoint a target or conduct more precise reconnaissance. Today, on this episode of Cyber Weapons Lab,...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
by a16z
movies

eye 246

favorite 1

comment 0

We're surrounded by materials in nature, and we've certainly also been using them for ages. But we've also been operating largely outside of nature on using -- and applying materials -- to the world around us, rather than working from within. In this short talk given at a16z's annual Summit, CEO of Apeel Sciences (and PhD in materials science) James Rogers talks about how we can not just borrow from nature... but use the latest scientific advances in tech to take what we've learned from the...
Topics: Youtube, video, Science & Technology, nature, biology, agriculture, technology, materials...
Hacking and InfoSec stuff
movies

eye 839

favorite 0

comment 0

تور چیه؟ چه جوری کار میکنه؟ https://blog.torproject.org/blog/releasing-tor-animation See this video in your language: Arabic https://www.youtube.com/watch?v=6v0ga4f2myY English https://www.youtube.com/watch?v=JWII85UlzKw Farsi https://www.youtube.com/watch?v=Y16VGmL5778 French https://www.youtube.com/watch?v=Mnrn3y-Qbyk German https://www.youtube.com/watch?v=fzeBfbHb0ZY Polish https://www.youtube.com/watch?v=Fx7bFE1v5m8 Spanish https://www.youtube.com/watch?v=Sz_J6vJ4MYw...
Topics: Youtube, video, Education, Online Privacy, Surveillance, Encryption, Tor (Software), Persian...
Hacking and InfoSec stuff
movies

eye 270

favorite 1

comment 0

Our Premium Ethical Hacking Bundle Is 90% Off: https://nulb.app/cwlshop Besside-ng Is One Reason Wi-Fi Hacking Is Easy Full Tutorial: https://nulb.app/x43sf Subscribe to Null Byte: https://goo.gl/J6wEnH Cyber Weapons Lab, Episode 187 Hackers, pentesters, cybersecurity specialists, and other tech-savvy individuals can hack Wi-Fi passwords fairly easily, and tools like Besside-ng help them do it. Besside-ng is the hidden gem of the Aircrack-ng suite of Wi-Fi hacking tools. To use it, one just...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
by TheNotSoCivilEngr
movies

eye 84

favorite 1

comment 0

Today we take a look at reverse image searching and what tools exist for your use! Thanks to Arin Toler for letting me cover their article on Bellingcat: https://www.bellingcat.com/resources/how-tos/2019/12/26/guide-to-using-reverse-image-search-for-investigations/ OSINT Challenge 3: https://drive.google.com/file/d/1m-sjculihVOh3Iv-cg7MibAKH2XV3fub/view?usp=sharing Source: https://www.youtube.com/watch?v=F_BdgHsaZws Uploader: TheNotSoCivilEngr
Topics: Youtube, video, People & Blogs, lock, lockpicking, pentesting, physical penetration testing,...
Hacking and InfoSec stuff
movies

eye 155

favorite 1

comment 0

Part two of my four part series about my “new” Amiga 500. In part 1 (https://youtu.be/5_q0235udJo) I was testing the machine and preparing a floppy drive emulator. This time I'm cleaning the whole machine which was extremely dirty and rusty. I also repair the keyboard, which had some keys that were not working and do some maintenance on the floppy drive, which didn't work properly either. In some sections my voice sounds a bit funny, I had a cold when recording those. I hope you don't mind...
Topics: Youtube, video, Gaming, retro, retro computing, amiga, commodore, keyboard, keyboard repair,...
Hacking and InfoSec stuff
movies

eye 134

favorite 2

comment 0

Hello Everyone! Todays Hacking Minutes Series, We will see how misconfigurations in Linux can leave you Vulnerable to Attackers. A lot of companies often misconfigure their services and run those applications or frameworks by default without knowing that they can put the company at risk and at the same time the data and information of their clientele that can be a high target for breach. These services are designed to give some remote access to the system but obviously, need to have some...
Topics: Youtube, video, Science & Technology, Black Hat Ethical Hacking, Ethical Hacking, Black Hat,...
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 198

favorite 2

comment 0

Hello Everyone, Today's Learning Linux Series, gives you the opportunity, to see you useful commands for Kali Linux. The commands that we will be looking at today are : pwd command: print working directory ls command: List information about files cd command: Change Directory echo command: Display message on screen mkdir command: Create new folders cp command: Copy one or more files to another location rm command: Remove files rmdir command: Remove folders rm command: Remove files We hope you...
Topics: Youtube, video, Science & Technology, Black Hat Ethical Hacking, SaintDruG, Ethical Hacking,...
Hacking and InfoSec stuff
movies

eye 387

favorite 2

comment 0

by SaintDruG / Anon for: Blackhatethicalhacking.com This is for Educational Purpose Only! Anything you do with this that creates bad results is your responsibility! Support our work on Patreon: https://www.patreon.com/blackhatethicalhacking Source: https://www.youtube.com/watch?v=BGvPv0A-rcc Uploader: Black Hat Ethical Hacking
Topics: Youtube, video, Education, black hat ethicl hacking, blackhat, blackhatethicalhacking, saintdrug,...
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 113

favorite 3

comment 0

Hello Everyone! This is SaintDruG for Black Hat Ethical Hacking . Todays Hows To Mini Series, involves copying any file from a terminal using any linux, to another remote location that is running SSH, could be your webserver, or even for Black Hat Motives, such as transferring an undetectable payload or a worm file to a php server, that will give full access on that machine after lets say successfully bruteforcing the ssh port. Black Hats or any penetration tester should master linux first...
Topics: Youtube, video, Science & Technology, Black Hat Ethical Hacking, SaintDruG, Ethical Hacking, Mr...
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 325

favorite 1

comment 0

Hello Everyone! In this video, we will see the usage of the Armitage tool which is the GUI of Metasploit by Rapid 7, and how to setup it up. Armitage is a cyber-attack management tool for the Metasploit Project. It is Java-based GUI frond-end for the Metasploit Framework and is included in Kali. The usage is the same job with Metasploit but Armitage is a different point of view of experience advanced post-exploitation features in the framework because you can perform many jobs at the same time,...
Topics: Youtube, video, Science & Technology, Black Hat Ethical Hacking, Ethical Hacking, Black Hat,...
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 322

favorite 2

comment 0

Hello Everyone! In today's Armitage Series Part (4), we offer you the opportunity to show you how Armitage is used in general focusing on bruteforcing techniques via SSH. In the previous video we saw how to Elevate from Shell to a Meterpreter Session. In this Hacking Minutes Series we will be talking about BruteForcing Via SSH and how you can do it. There are a few methods of performing an SSH brute-force attack that will ultimately lead to the discovery of valid login credentials, many...
Topics: Youtube, video, Science & Technology, Black Hat Ethical Hacking, Ethical Hacking, Black Hat,...
Hacking and InfoSec stuff
by 13Cubed
movies

eye 118

favorite 0

comment 0

An introduction to Hashcat, a cross-platform CPU and GPU password “recovery” tool. We will start with a basic overview of the minimum required arguments necessary to use Hashcat, and then walk through a series of exercises to recover (crack) NT hashes, starting with a dictionary/wordlist attack, a rule-based variation of that attack, a brute-force attack, and lastly, a combinator attack. The resources used in the video are listed below, in order of appearance. Wordlists (RockYou, et al.):...
Topics: Youtube, video, Science & Technology, Hashcat, oclHashcat, cudaHashcat, crack password, crack...
Hacking and InfoSec stuff
movies

eye 597

favorite 0

comment 0

How to De-cloak & Connect to Devices using a Beacon Swarm Full Tutorial: http://bit.ly/BeacSpam Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie When tracking a target, discovering the device MAC address is essential. However, smartphone manufacturers program their devices to give a randomized MAC address when connecting to a Wi-Fi network. By combining the karma attack, the ESP8266 Beacon Spammer, and research by Mathy Vanhoef, we'll show you how...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 206

favorite 0

comment 0

Recommended Tasks for a New Kali Linux Installation Full Tutorial: http://bit.ly/Kali10 Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Kali Linux is one of the best operating systems to use as a hacker. However, it doesn't come perfectly configured right out of the box. Today, we'll share our list of the top 10 things you should do after installing Kali Linux, on this episode of Cyber Weapons Lab. 1:28 - Install Git 2:40 - Configure Bash Aliases...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 181

favorite 2

comment 0

Why Your Wi-Fi Passwords Aren't Safe Full Video: https://nulb.app/x4kmc Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 133 (Recut - Partial Episode) The WPA and WPA2 Wi-Fi security standards are incredibly easy to crack if the password used isn't strong. That's why it's important to always use a strong password, something you should use for any site or device you log in to, not just your Wi-Fi network. The process of...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 141

favorite 1

comment 0

by SaintDruG / Anon for: Blackhatethicalhacking.com This is for Educational Purpose Only! Anything you do with this that creates bad results is your responsibility! Support our work on Patreon: https://www.patreon.com/blackhatethicalhacking Source: https://www.youtube.com/watch?v=ja60U2K5dsk Uploader: Black Hat Ethical Hacking
Topics: Youtube, video, Education, blackhatethicalhacking, black hat ethical hacking, maltego, hacking, mr...
Hacking and InfoSec stuff
movies

eye 260

favorite 3

comment 0

How to Brute-Force Web App Credentials with Hatch Full Tutorial: http://bit.ly/HatchWin Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Brute-forcing is an essential hacking technique that's easier with certain services than others. Website login pages are frequent victims to attack and today we'll show you how easy it can be, even for a beginner, with a Python tool called Hatch, on this episode of Cyber Weapons Lab. Follow Null Byte on: Twitter:...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 292

favorite 0

comment 0

Hello everyone! This is Godax, Today, we are going to show you how to setup the honeypot "Conpot" to attract hackers using "docker", what the different templates are made for and how you can detect if someone is accessing (or even attacking) it! For more information about the honeypot you can visit the official site at www.conpot.org or you can take a closer look at it on github: https://github.com/mushorg/conpot GitHub mushorg/conpot conpot - ICS/SCADA honeypot Support our...
Topics: Youtube, video, Science & Technology, Black Hat Ethical Hacking, SaintDruG, Ethical Hacking, Mr...
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 272

favorite 1

comment 0

by SaintDruG / Anon for: Blackhatethicalhacking.com This is for Educational Purpose Only! Anything you do with this that creates bad results is your responsibility! Support our work on Patreon: https://www.patreon.com/blackhatethicalhacking Source: https://www.youtube.com/watch?v=rKBHep2-NF8 Uploader: Black Hat Ethical Hacking
Topics: Youtube, video, Education, blackhatethicalhacking, black hat ethical hacking, saintdrug, live...
Hacking and InfoSec stuff
movies

eye 164

favorite 1

comment 0

Get Our Premium Ethical Hacking Bundle (90% Off): https://nulb.app/cwlshop How to Exfiltrate Data from a Mac Using Pictures Full Tutorial: https://nulb.app/x4kw8 Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 170 Compromising a computer is usually just the first part of a larger attack. A hacker must then figure out a way to sneak off with any stolen data without being detected. Today, in this Cyber Weapons Lab, we'll...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
by TheNotSoCivilEngr
movies

eye 248

favorite 2

comment 0

Learn the easiest way to get into lock picking which you can do for free! Source: https://www.youtube.com/watch?v=Gh5raNMlisc Uploader: TheNotSoCivilEngr
Topics: Youtube, video, People & Blogs, lock, lockpicking, pentesting, tubular, key, picking, lock...
Hacking and InfoSec stuff
by Tor Project
movies

eye 219

favorite 1

comment 0

https://blog.torproject.org/blog/releasing-tor-animation See this video in your language: Arabic https://www.youtube.com/watch?v=6v0ga4f2myY English https://www.youtube.com/watch?v=JWII85UlzKw Farsi https://www.youtube.com/watch?v=Y16VGmL5778 French https://www.youtube.com/watch?v=Mnrn3y-Qbyk German https://www.youtube.com/watch?v=fzeBfbHb0ZY Polish https://www.youtube.com/watch?v=Fx7bFE1v5m8 Spanish https://www.youtube.com/watch?v=Sz_J6vJ4MYw Source: https://www.youtube.com/watch?v=6v0ga4f2myY...
Topics: Youtube, video, Education, Online Privacy, Anonymity, Tor (Software), Arabic, Surveillance,...
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 63

favorite 0

comment 0

Learning Linux | rm and rmdir Commands Hello Everyone, Today's Learning Linux Series, offers you the opportunity so we can show you how to use the rm and rmdir commands. - What is the difference between rmdir and rm ? rmdir: can only be used to remove an empty directory. It will not work for non-empty directories. rm: removes both files and non-empty directories with an extra option. For example, you create a directory called test with the command mkdir test. You don't create any files in that...
Topics: Youtube, video, Science & Technology, Black Hat Ethical Hacking, SaintDruG, Ethical Hacking,...
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 133

favorite 2

comment 0

Hello Everyone! This is SaintDruG for Black Hat Ethical Hacking . Todays Hows To Mini Series, involves recon using Nmap Part 2 of 2 Disclaimer: This Video is for Educational Purpose Only, what you do is your responsibility and Black Hat Ethical Hacking, SaintDruG or anyone involved, is not held accounted for if any damage for any reason occurs. The Black Hat Way, See, Reconnaissance, is time consuming. Its the only way to attack without it, you cannot do much. Techniques used by Black Hat, for...
Topics: Youtube, video, Science & Technology, Black Hat Ethical Hacking, SaintDruG, Ethical Hacking, Mr...
Hacking and InfoSec stuff
movies

eye 75

favorite 1

comment 0

How to Hack Bluetooth Devices All Around You Full Tutorial: http://bit.ly/BTbcap Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Bluetooth devices are everywhere. However, hacking these devices can be challenging unless you have a tool that can help you target them specifically. On this episode of Cyber Weapons Lab, we'll show you a module in Bettercap that enables you to scan for and query the services of Bluetooth devices. Even if devices use MAC...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
by The Modern Rogue
movies

eye 214

favorite 1

comment 0

Go to https://getroman.com/rogue for a free online visit and free two-day shipping. Thanks to Roman for sponsoring this video! 🡇 --------------- extra material & accreditation --------------- 🡇 Next time we're going to put on glasses that let you see magnetic influence. Unfortunately it does so by coating your retinas in iron filings, so Jason has to wear two eye patches for the next month to recover. We'll figure it out though, just need a couple more test runs....
Topics: Youtube, video, Entertainment, modern rogue, brian brushwood, jason murphy, credit card...
Hacking and InfoSec stuff
movies

eye 144

favorite 2

comment 0

One Tool That Helps Phish for Wi-Fi Passwords Full Video: https://nulb.app/x3tso Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 078 (Recut - Partial Episode) There are plenty of tools available to hackers to crack passwords, but hackers sometimes take a less direct approach. Social engineering attacks can be very successful assuming the target is tech illiterate. On this episode of Cyber Weapons Lab, we'll show you...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 103

favorite 1

comment 0

Hello Everyone! This is SaintDruG for Black Hat Ethical Hacking . Todays Hows To Mini Series, involves recon using Nmap Part 1 of 2 Disclaimer: This Video is for Educational Purpose Only, what you do is your responsibility and Black Hat Ethical Hacking, SaintDruG or anyone involved, is not held accounted for if any damage for any reason occurs. The Black Hat Way, See, Reconnaissance, is time consuming. Its the only way to attack without it, you cannot do much. Techniques used by Black Hat, for...
Topics: Youtube, video, Science & Technology, Black Hat Ethical Hacking, SaintDruG, Ethical Hacking, Mr...
Hacking and InfoSec stuff
movies

eye 101

favorite 0

comment 0

How to Create Fake Packets Using a Packet Manipulation Tool Full Tutorial: http://bit.ly/Scapy Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Being able to infiltrate communications between devices is extremely valuable to a hacker. On this episode of Cyber Weapons Lab, we'll show you how to create and manipulate packets with a Python tool called Scapy. This is just a quick example of how a hacker could use Scapy to craft packets that allow them to...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
by Null Byte
movies

eye 85

favorite 1

comment 0

Hatch Can Brute-Force Web App Credentials Full Video: https://nulb.app/z4gw5 Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Cyber Weapons Lab, Episode 066 (Recut - Partial Episode) Brute-forcing is an essential hacking technique that's easier with certain services than others. Website login pages are frequent victims to attack. On this episode of Cyber Weapons Lab, we'll show you how easy it can be for a hacker or pentester, even if they're a...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
by aantonop
movies

eye 456

favorite 1

comment 0

In this talk, Andreas examines the sensationalist debate over "fake news," the rising tide of faith-based nation states declaring bitcoin as "fake money," and alternative mechanisms we can build to fill the void left by retired fact-checking departments & central bank authorities. This talk took place at the Silicon Valley Bitcoin meetup on April 11th 2017 at the Plug and Play Tech Center (@PlugandPlayTC) in Sunnyvale, California:...
Topics: Youtube, video, Science & Technology, bitcoin, blockchain, finance, internet, money, network,...
Hacking and InfoSec stuff
movies

eye 193

favorite 1

comment 0

How to Use Wireshark to Hijack Pictures from Wi-Fi Cameras Full Tutorial: http://bit.ly/SecCamShark Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie Wireshark is a powerful Wi-Fi sniffing tool for intercepting communications between devices on a network. Today, we'll show you how to intercept images from a security camera on this episode of Cyber Weapons Lab. Recommended network adapter: https://www.amazon.com/dp/B004Y6MIXS/?tag=whtnb-20 Most people...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 301

favorite 1

comment 0

Hello & Welcome to our "How To" Series. Brought to you by BlackHatEthicalHacking.com by SaintDruG. How to Crack a zip file in less than 2 minutes. Machine Used: Raspberry Pi 3 running Latest Parrot OS with custom config Disclaimer: This Video is for Educational Purpose Only, what you do is your responsibility and Black Hat Ethical Hacking, SaintDruG or anyone involved, is not held accounted for if any damage for any reason occurs. Now that we got the disclaimer out of the way,...
Topics: Youtube, video, Science & Technology, Black Hat Ethical Hacking, SaintDruG, Ethical Hacking, Mr...
Hacking and InfoSec stuff
by TheNotSoCivilEngr
movies

eye 167

favorite 1

comment 0

Today we take a look at killer keys and how I believe they can be used to strategically take locks offline. Source: https://www.youtube.com/watch?v=kHQfn91LWZk Uploader: TheNotSoCivilEngr
Topics: Youtube, video, People & Blogs, lock, lockpicking, pentesting, physical penetration testing,...
Hacking and InfoSec stuff
movies

eye 67

favorite 0

comment 0

Subtitle: Listening in, gathering data and watching for less than $100 It’s 2018 and many people are still using unencrypted wireless communications in critical systems. We will review how to build a robust and open signals intelligence (SIGINT) platform. As a proof of concept we show the platform capturing publicly accessible radio bands and some basic analysis of that data. The talk will focus on how we demodulate, decode and analyze data across many chunks of the spectrum using a Raspberry...
Topics: Youtube, video, Science & Technology, shmoocon, shmoocon 2018, hacking, SIGINT
Hacking and InfoSec stuff
movies

eye 88

favorite 0

comment 0

In this talk, Andreas speaks about Bitcoin as a system of commerce that is the culmination of decades of research into cryptography and digital currencies, and how it achieves digital scarcity through proof-of-work and decentralized consensus. He argues that Bitcoin is powerful because it is where the laws of mathematics prevail to deliver robust security, financial autonomy, and censorship resistance. This talk took place on July 7th 2017 at a Bloktex event hosted by the Wisma BeeOn Group in...
Topics: Youtube, video, Science & Technology, bitcoin, blockchain, finance, networks, network,...
Hacking and InfoSec stuff
movies

eye 211

favorite 1

comment 0

Hello Everyone, Part 1 of 3 This is SaintDruG from blackhatethicalhacking.com Happy New year! Been a while, i know, but the wait is worth it, Been busy lately, but we promise, the new website launch will be worth it soon ! Pause + Read Later. Today will show you, how black hats, real fast, what they can do using their skill, just time it, and each second that passes, they are actually flowing through security protocols, gathering info, so they can prepare the right tool, editing it to their...
Topics: Youtube, video, Howto & Style, Black Hat Ethical Hacking, SaintDruG, Black Hat, Kevin Mitnick,...
Hacking and InfoSec stuff
by TheNotSoCivilEngr
movies

eye 87

favorite 0

comment 0

Today we take a look at how one can snap a quick photo and turn it into a new key. Decoding resources: https://github.com/deviantollam/decoding Source: https://www.youtube.com/watch?v=XaX7Acn78Fk Uploader: TheNotSoCivilEngr
Topics: Youtube, video, People & Blogs, lock, lockpicking, pentesting, physical penetration testing,...
Hacking and InfoSec stuff
movies

eye 450

favorite 1

comment 0

How to Set Up a Hacking Computer with Parrot Security Full Tutorial: http://bit.ly/ParrotSec Subscribe to Null Byte: https://goo.gl/J6wEnH Kody's Twitter: https://twitter.com/KodyKinzie While Kali Linux is the go-to OS for beginners interesting in penetration testing or hacking, Parrot Security OS is a comparable alternative for those looking for a change. On this episode of Cyber Weapons Lab, we'll show you how to download, install, and run Parrot Security on any computer via a virtual...
Topics: Youtube, video, Howto & Style, wht, wonderhowto, nullbyte, null byte, hack, hacking, hacker,...
Hacking and InfoSec stuff
movies

eye 145

favorite 0

comment 0

Today we do a quick voltage test and run some real world scenarios using the hunt pad long range rfid card reader. Build items: Reader: https://www.amazon.com/gp/product/B00UX03TLO/ref=ppx_yo_dt_b_asin_title_o02_s00?ie=UTF8&psc=1 Battery Pack: https://www.amazon.com/gp/product/B00VE7HBMS/ref=ppx_yo_dt_b_asin_title_o04_s00?ie=UTF8&psc=1 ESPKey: https://redteamtools.com/espkey Source: https://www.youtube.com/watch?v=etUdZFeQgmw Uploader: TheNotSoCivilEngr
Topics: Youtube, video, People & Blogs, lock, pentesting, physical penetration testing, tubular, key,...
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 107

favorite 1

comment 0

Executeu Greets You ! This is for Black Hat Ethical Hacking . Today's Learning Linux Series, gives you the opportunity to learn how to Boot in Kali Linux from a USB Storage Device. The process will be implemented in Kali Linux OS which is also achievable in Apple IOS via a Terminal. It will be disseminated into 2 parts. The first will show you how to configure the USB to boot on any machine. The second part will be how to add another layer of security with Encryption. More over we will show you...
Topics: Youtube, video, Science & Technology, Black Hat Ethical Hacking, SaintDruG, Ethical Hacking, Mr...
Hacking and InfoSec stuff
movies

eye 129

favorite 0

comment 0

Linux Kernel 5.3 solves the CR0 write exploit by making that register read only. Today let's discuss how we can write to the SyscallTable directly and not rely on the CR0 write exploit that we have been using. I heard about this method some time ago and I thought it had long been patched and wouldn't work . However as Nasm points out the ptr exploit still works and still has application. https://en.wikipedia.org/wiki/Control_register...
Topics: Youtube, video, Education, x86 CR4 & CR0, pinning, bypass, hacking, rootkit, cr0 wp bit went...
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 90

favorite 0

comment 0

Hello Everyone, Today we will show you, how to configure root SSH on Kali Linux . The SSH protocol (also referred to as Secure Shell) is a method for secure remote login from one computer to another. It provides several alternative options for strong authentication, and it protects the communications security and integrity with strong encryption. Using Linux with different mind set is what sets the difference from a Black Hat, and a traditional Linux user. Let's see how secure shell works ,...
Topics: Youtube, video, Science & Technology, Black Hat Ethical Hacking, SaintDruG, Ethical Hacking, Mr...
Hacking and InfoSec stuff
by Black Hat Ethical Hacking
movies

eye 67

favorite 1

comment 0

Hello Everyone, Today we will show you, how to Split Session over SSH. Behind this fancy term hides a simple concept: Within one terminal window you can open multiple windows and split-views, how if you use remote computer using ssh and you want to open a new terminal tab to start a development server. When you open a new tab, it won’t be connected to the remote machine, which means you would have to ssh and navigate to the appropriate directory each time. Furthermore, if your Internet...
Topics: Youtube, video, Science & Technology, Black Hat Ethical Hacking, SaintDruG, Ethical Hacking, Mr...
Hacking and InfoSec stuff
by Wild West Hackin' Fest
movies

eye 94

favorite 0

comment 0

Prominent and very wise individuals in INFOSEC have published blog posts and offered wisdom to those who seek to enter our industry. One of the best sides of our community is on display when venerable types extend a hand to the next generation. These amazing guides and collections of links and training resources can help guide many hopefuls on the path toward knowledge and perhaps their first of many rewarding jobs. However, what if you aren’t just focusing on your first new job, but instead...
Topics: Youtube, video, People & Blogs, Deviant Ollam, Information Security, Hacking, Career, Wild West...
Hacking and InfoSec stuff
movies

eye 233

favorite 2

comment 0

KeySweeper (http://samy.pl/keysweeper) is a stealthy Arduino-based device, camouflaged as a functioning USB wall charger, that wirelessly and passively sniffs, decrypts, logs and reports back (over GSM) all keystrokes from any Microsoft wireless keyboards (using proprietary 2.4GHz RF) in the area. Keystrokes are sent back to the KeySweeper operator over the Internet via an optional GSM chip, or can be stored on a flash chip and delivered wirelessly when a secondary KeySweeper device comes...
Topics: Youtube, video, Science & Technology, applied hacking, samy kamkar, keysweeper, microsot,...