Тёмный

BEGINNER’S Guide To HACKING TERMINOLOGY 

crow
Подписаться 88 тыс.
Просмотров 20 тыс.
50% 1

Опубликовано:

 

28 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 67   
@crr0ww
@crr0ww Год назад
happy holidays, everyone! 🎄 let me know what else you’d like to see in the next one :) join our discord server! dsc.gg/crow-academy (also the freaking hats at 3:02; take that image with a grain of salt (it's never that dramatic LOL) LANTERN CORP HACKERS OR SOME SH*T IDK)
@crr0ww
@crr0ww Год назад
@@donmo1461 maybe one day ;)
@АртемКудрявцев-э7ю
can you show why http is insecure?
@crr0ww
@crr0ww Год назад
@@АртемКудрявцев-э7ю awesome suggestion! i’ll definitely make sure to cover that :)
@irvingirving6275
@irvingirving6275 Год назад
Respect. You can communicate clearly complex ideas and make it funny so the knowledge absorption is a lot better. Thank you very much for your work man. You got yourself a subscriber!
@harsh2314
@harsh2314 Год назад
No cap you are one of the best content creator in this field... I watched buffer overflow video first and am in love with the way you make content
@crr0ww
@crr0ww Год назад
this is the sweetest comment ever 😭❤️ THANK YOU SO MUCH, im so glad you enjoyed it! 🥹
@Xzurii
@Xzurii Год назад
Kerning City in the bg, i think im in love
@RendonJr
@RendonJr 7 месяцев назад
Just what i was looking for. Good content 🎉
@yousefsammar176
@yousefsammar176 Год назад
What a wonderful day to find this channel
@inchane4933
@inchane4933 Год назад
dude please keep creating content
@crr0ww
@crr0ww Год назад
of course :p !! tysm for commenting :)
@noorkhara1429
@noorkhara1429 Год назад
how much honey comes in a honeypot
@crr0ww
@crr0ww Год назад
hmmm 🤔 5.84!
@konstantinrebrov675
@konstantinrebrov675 Год назад
Enough to feed Pooh bear till he falls over.
@AnkitSharma-cs6ez
@AnkitSharma-cs6ez 7 месяцев назад
@@crr0ww?? What is 5.84
@georgevinueza7249
@georgevinueza7249 Год назад
holy maplestory bg music :)
@leefhuh
@leefhuh 8 месяцев назад
is that maplestory music i hear?
@retsu1957
@retsu1957 Год назад
Nice content. This helps me a lot.
@Zooiest
@Zooiest Год назад
I'd say most (D)DoS attacks are done via actual exploits nowadays. Like forcing a Minecraft server to constantly load chunks where you shouldn't be allowed to
@piyushpatil6874
@piyushpatil6874 Год назад
Really Helpfull !
@astranger4810
@astranger4810 Год назад
Knowledge 😮
@crr0ww
@crr0ww Год назад
:o
@zetsu6566
@zetsu6566 Год назад
keep doing it
@Abdirahmaann
@Abdirahmaann Год назад
What is your type role in IT??
@crr0ww
@crr0ww Год назад
i'm trained as a penetration tester : ) i hope that's what you mean! although i'm trying to shift more onto the red-teaming side of things; thank you for your comment! :D
@Abdirahmaann
@Abdirahmaann Год назад
@@crr0ww thank bro welcome and subscribed
@crr0ww
@crr0ww Год назад
@@Abdirahmaann thank you so much! :D
@zer0day463
@zer0day463 Год назад
Noice video
@crr0ww
@crr0ww Год назад
thank you so much!! :)
@zer0day463
@zer0day463 Год назад
@@crr0ww your belcome
@skeletron9505
@skeletron9505 Год назад
el barto was here.
@sinatra02
@sinatra02 Год назад
log are u ben parker 🥴
@crr0ww
@crr0ww Год назад
with great secrets comes no transparency 🤫🤐
@0x2fd
@0x2fd Год назад
Do you have a job now brother?
@danielrivas3444
@danielrivas3444 Год назад
after watching this i now, too want to hack
@crr0ww
@crr0ww Год назад
:) ❤️
@phantompuma228
@phantompuma228 Год назад
This is really cool! The terminology has some similarities to investigations and security, and was super easy to follow and understand, Merry belated Christmas!
@crr0ww
@crr0ww Год назад
thank you so much :D it’s always nice when you can find similarities in different fields like that :))
@nightlockhayze
@nightlockhayze Год назад
Hello mate, it is i, Nightlock
@crr0ww
@crr0ww Год назад
WHY HELLO ZEUS ❤️❤️
@nightlockhayze
@nightlockhayze Год назад
@@crr0ww ZEUS TREE :D
@Artym_Q
@Artym_Q Год назад
you cool man
@crr0ww
@crr0ww Год назад
NAH! YOURE COOL :D TYSM ❤️🥹
@Zihad
@Zihad Год назад
great video! btw 10:58 Tbps is terabit per second right? And TBps terabyte?
@crr0ww
@crr0ww Год назад
thank you so much!! and yeah, you got it :D Tbps = terabits/sec, TBps = terabytes/sec
@janoslaszlovasik9161
@janoslaszlovasik9161 Год назад
Fyi there's also TiB meaning tebibyte, not the same as the previous two.
@abrahamcamarilloloza4882
@abrahamcamarilloloza4882 Год назад
Can you make a video on VPNs? I think this was a super simple way of understanding some concepts, and I would really like your approach to this. Great video! hope RU-vid highlights more your channel
@crr0ww
@crr0ww Год назад
yes of course! i’ll definitely add VPNs in the next part :) thank you so much ❤️
@HTWwpzIuqaObMt
@HTWwpzIuqaObMt Год назад
Happy holidays! Maybe make a video about exploit development or on how to improve your own anonimity. Would be interestinf to lots of beginners
@crr0ww
@crr0ww Год назад
sounds good! i have a whole binary exploitation playlist planned but i’ll def cover anonymity :) thank you for your comment!
@HTWwpzIuqaObMt
@HTWwpzIuqaObMt Год назад
@@crr0ww As a side topic you could do a brief introduction to OS hardening. This will open the way to more blue team based content that could be combined with offensive security to highlight both sides of pen testing engagements
@crr0ww
@crr0ww Год назад
@@HTWwpzIuqaObMt yes! i was actually planning on covering a lot more of the blue-teaming side; things like digital forensics and reverse engineering, etc. i can def add in a section or two about os hardening as well :) ty for the suggestion!
@HTWwpzIuqaObMt
@HTWwpzIuqaObMt Год назад
@@crr0ww oh awesome! Do you have any other social media by any chance? Perhaps discord
@crr0ww
@crr0ww Год назад
@@HTWwpzIuqaObMt yes! i’ve added in my discord to the description of all my videos; you can find me there
@doofus989
@doofus989 Год назад
system or network - they do have user honey pots now days or files when open leak your ip address -- like fake spn user accounts on active directory
@crr0ww
@crr0ww Год назад
oh yeah, most definitely! one of my instructors, nikhil mittal (dude who wrote nishang) has some super cool tools on his github made especially for this purpose :)
@doofus989
@doofus989 Год назад
i would love to know how many companies actually use honeypots this way - doesnt seem like many tho
@crr0ww
@crr0ww Год назад
most fortune companies actually do use active directory with pretty big defensive systems set in place, from things like looking at changes in the registry, general traffic, event ids; which include ids denoting changes to users as well and some crazy things like kerberos auth reqs and stuff (although with some kerberos most of this stuff is hard to discern since the domain controller sends sooooo many of these requests out, but like things 100% still do stick out, for instance, using RC4/NTLM hashes for auth instead of AES, that’ll stick out like a sore thumb, among other things) so it’s a lot more prevalent than people might think! although the super hollywood-esque decoy i’d say is pretty scarce. i’d imagine most threat actors, upon discovering a suspiciously out of place user with domain admin privileges would be a bit more cautious, knowing all the defences in place now a days :)
@doofus989
@doofus989 Год назад
@@crr0ww yeah, i wasnt sure tho since groups like Guacamaya, phineas fisher make things look easy for bad guys
@Yurkari
@Yurkari Год назад
beast asf
@crr0ww
@crr0ww Год назад
appreciate cha
@n.w.r5411
@n.w.r5411 Год назад
man you're pretty funny
@hemiilisreal
@hemiilisreal Год назад
i like video very naice , i didnt get the port part a lot but still rest is well explained :)
@legion465
@legion465 Год назад
very good Respect From Armenian Hackers Group LEGION
Далее
START HACKING: 10 Skills For BEGINNERS!
19:07
Просмотров 57 тыс.
Malware Development: Processes, Threads, and Handles
31:29
100 Identical Twins Fight For $250,000
35:40
Просмотров 32 млн
Meni yerga urdingda
00:20
Просмотров 422 тыс.
Дикий Бармалей разозлил всех!
01:00
Самая сложная маска…
00:32
Просмотров 1,2 млн
When you Accidentally Compromise every CPU on Earth
15:59
How To Secure and Anonymize Your Online Activity
25:10
Просмотров 466 тыс.
Phone Phreaking: Innovation at 2600Hz
17:46
Просмотров 53 тыс.
An Introduction to Malware Analysis
1:10:01
Просмотров 45 тыс.
Pieter Levels - Indie Hacking is Dead. Now what?
1:11:13
Malware Development: Process Injection
1:06:21
Просмотров 206 тыс.
The Secret step-by-step Guide to learn Hacking
14:42
Просмотров 3,3 млн
Tactics of Physical Pen Testers
44:17
Просмотров 903 тыс.
100 Identical Twins Fight For $250,000
35:40
Просмотров 32 млн