Ethical Hacking in 15 Hours - 2023 Edition - Learn to Hack! (Part 1)

Ethical Hacking in 15 Hours - 2023 Edition - Learn to Hack! (Part 1)

The Cyber Mentor

1 год назад

2,360,605 Просмотров

Ссылки и html тэги не поддерживаются


Комментарии:

Amit gupta
Amit gupta - 23.09.2023 17:35

Hii you doing amazing work on YT keet it up and thanxx love from Bharat (India) ❤❤❤❤❤

Ответить
praveen aketi
praveen aketi - 23.09.2023 10:33

plz send me the notefeed pdf

Ответить
Reahl Allen
Reahl Allen - 22.09.2023 06:35

that subnetting cheat sheet is a blessing

Ответить
Mr Derino
Mr Derino - 22.09.2023 04:37

Do you have a link for your excel sheet? I could not seem to find it

Ответить
rootsoft
rootsoft - 21.09.2023 18:15

What certification does this prepare you for? I will be starting soon.

Ответить
Энхболд Энхтайван
Энхболд Энхтайван - 21.09.2023 11:44

do i have to learn somethingbefore start learning this

Ответить
4c00h
4c00h - 21.09.2023 00:53

Hey guys if you want to "skip" over parts you know without skipping it, you can watch them at 3.5x which you can still understand what is being said. Simply open the console with Ctrl+Shift+J and put this code in:

var videoElement = document.querySelector("video");
videoElement.playbackRate = 3.5;

You can change the multiplier to your liking.

Ответить
lilkrunkies
lilkrunkies - 19.09.2023 20:38

omg ffs i wrote everything down in cherrytree and i was tired and i forgot to save and i turned laptop off
all my notes and everythin is gone

Ответить
denbon 5691
denbon 5691 - 18.09.2023 23:13

I want to hack an IG account or other social media with propose to track the location and to take it under of my control is anybody there to help me? Unfortunately, I don’t have pc

Ответить
tentimesful
tentimesful - 18.09.2023 17:38

windows is the worst as they have System app to accept smb and setup your internet connection.... smb is a way to access your pc from elsewhere... meaning if they have your username and password they can enter your pc and get all your data, they can even delete files if they want... I tested it with a linux pc to windows smb and it worked.... crazy... what you can do is block the smb port for System...

Ответить
T K
T K - 18.09.2023 15:19

Can I use dual boot instead of virtual machine

Ответить
Ezekiel
Ezekiel - 18.09.2023 06:36

Does anybody know which software did he use in his videos to make those reports he made which had tree-like structures in his videos of recon.
:'))))

Ответить
Unnatural Atrophy
Unnatural Atrophy - 18.09.2023 04:11

So lost on subnetting.

Ответить
Michael Frietsch
Michael Frietsch - 17.09.2023 22:34

brand new to this but have been wanting to get started for a few years tbh. really had no idea what i wanted to do with my life yet in college. Tech savvy but no official IT background of any kind. I think this is a fresh start for me plan on getting this done in the next couple days

Ответить
Jorn Shyti
Jorn Shyti - 16.09.2023 21:48

I studied a bit of python last year.
Once we got into python i just made a whole ass program that assigns an order to a customer........God i love coding
Thanks for reigniting my joy for this

Ответить
prabhat tripathi
prabhat tripathi - 10.09.2023 13:43

thank you sir for explaining everyting

Ответить
I Am RestnPieces
I Am RestnPieces - 10.09.2023 06:24

my updates from the installing tools section has been going for over an hour. Did anyone else take this long?

Ответить
ilovehorses
ilovehorses - 09.09.2023 16:43

Thank u!! U hiring? 😊😅

Ответить
Shuregi Lover
Shuregi Lover - 08.09.2023 21:26

what is the program that he uses to find his ip?

Ответить
Nehemiah Chandler
Nehemiah Chandler - 08.09.2023 15:42

Hi can you update this with a VM that works for Mac m1 and m2 chips. Sadly virtual box is no longer compatible

Ответить
Tejus Neeralakatti
Tejus Neeralakatti - 08.09.2023 13:09

PDNTSPA : Pizza Delivery Ninja Turtle's Secret Pizza Adventure

Ответить
Fresnow
Fresnow - 06.09.2023 13:53

Is it possible to get acsses and download your notebook?

Ответить
FightingWolf95
FightingWolf95 - 05.09.2023 02:38

I like Obsidian. Was just super easy for me to pickup.

Ответить
Dom Patten
Dom Patten - 04.09.2023 22:35

I know how to hack

Ответить
Rood Jerry Murat
Rood Jerry Murat - 04.09.2023 21:27

This course is perfect except you were right about one thing, you are not the best teacher for the subnetting part😂😂😂 but really, thank you man

Ответить
QuickChange
QuickChange - 04.09.2023 21:11

Thx

Ответить
appliancemechanical
appliancemechanical - 04.09.2023 04:45

What will be the outcome if, after almost finishing downloading the final question, yes or no, I choose yes, which is what I did?

Ответить
Navid_16
Navid_16 - 03.09.2023 13:59

Really helpful tutorial! I was wondering if we could use javascript instead of python

Ответить
patrick kube
patrick kube - 02.09.2023 13:28

ALL PEOPLE SEEMS TO NEED DATA PRESENTATION

Ответить
Sam.
Sam. - 02.09.2023 12:07

I watch these but never try it out 💀

Ответить
Dan Farfan
Dan Farfan - 02.09.2023 02:52

Wow. You went from "I'm going to tell you what a netmask is and why it's important" to explaining binary digits (again) then... ".. depending how the ones and zeros are switched on and off determines a lot of things for us at that's why the netmask is important." "a lot of things" doesn't cash in on what it is or why it's important. My suggestion is to rewrite the intro to this section. with something like this... "In order for messages to get routed to the correct computer on a network, the equipment that moves those messages must know a couple of things... specifically, it has to know X and Y and Z. To know that we have ...." Then, give a counter example if there was no such thing as a netmask. "Let's say your IP address is .... Without any routing information a message with an address of ... might show up but have nowhere to go..." Think of it this way. If you were going to try to teach someone to play chess... at what point in the lesson would you use the definitive phrase that characterizes arguably the most important element of any game? "The object of the game is to..." You went from how each piece moves to opening strategies and castling and pawn promotion but forgot about capturing the king! "The purpose of the netmask is to... " (and to complete that sentence, you don't need the phrase "binary digits" or 1's and 0's, or the spreadsheet.. all that comes after).

Ответить
Shamase Musawandile
Shamase Musawandile - 31.08.2023 01:52

My lecture used this way 🤣🤣

7 A -> all
6 P -> people
5 S -> seem
4 T -> to
3 N -> need
2 D -> data
1 P -> processing

Ответить
Thorburn Paulsen
Thorburn Paulsen - 30.08.2023 01:42

Agrees to might be giving away his first child😭😭😭✋️

Ответить
prabhat tripathi
prabhat tripathi - 29.08.2023 00:48

U have my upmost respect for teaching us all for free

Ответить
BISHWA LIMBOO
BISHWA LIMBOO - 27.08.2023 02:34

This is a whole package. I am really enjoying :D Thank you for making this video for all of us. Really appreciated.

Ответить
Euseph Johnson
Euseph Johnson - 25.08.2023 17:07

Is it okay to have basic or average knowledge of computers and systems while studying this?

Ответить
will guerin
will guerin - 25.08.2023 16:37

Your video is very helpful. Im new to all of this and pretty excited to get going. One issue that has come up is apparently Oracle Virtualbox does not support Mac M1/M2 computers. What would be the next best option for me to run Linux?

Ответить
Soul Soothing Channel
Soul Soothing Channel - 25.08.2023 12:11

Just getting on it but I really appreciate the effort

Ответить
Edgy
Edgy - 25.08.2023 00:46

I just wanna know if this is worth watching to become a hacker

Ответить
Amy-Joe
Amy-Joe - 24.08.2023 16:44

These hackers should go after DHL they are crooked

Ответить