Vlogbrothers
They Hacked Me
Thank you to Sherri Davidoff from LMG Security for helping me both with this video and also with recovering from my hack. If you're thinking "I won't get hacked, I'm not a public person like Hank," that does NOT protect you. Most hacks...
Curated Video
Get Started with Linux Commands
This video will teach you the basic commands we will use in this course
Curated Video
Cracking WPA and WPA2 new 2
This video will explain the difference between two famous wireless protocols, and will show you a technique on cracking the passwords by deauthenticating users connected to a specific SSID
Curated Video
Android Dynamic Malware Analysis
In this tutorial, you will learn how to perform dynamic malware analysis for an APK file using MobSF or Mobile Security Framework, which is a super handy tool for analyzing Android applications.
Curated Video
Threat Modeling
Threat modeling is a process by which potential threats, such as structural vulnerabilities or the absence of appropriate safeguards, can be identified, enumerated, and mitigations can be prioritized. In this video, you will learn about...
Curated Video
SE Attack Vectors
This video will explain the various attack vectors used in social engineering
Curated Video
Open-source Intelligence (OSINT)
In this video, you will learn about OSINT (Open-source intelligence), which is a multi-methods methodology for collecting, analyzing and making decisions about data accessible in publicly available sources to be used in an intelligence...
Curated Video
Web Applications Security Overview
This video will highlight the security concerns when it comes to web applications
Curated Video
Reverse Engineer an Android Application
This is a hands on tutorial on how to reverse engineer an Android application
Curated Video
Understand Color Codings
This video will teach you the difference in Linux terminal color coding
Curated Video
Mobile Attack Surface
In this video, you will get an overview on the different types of threats that affect a mobile application.
Curated Video
Web Applications Attack Surface
This video will shed the light on all possible attack vectors for web applications
Curated Video
Steps to plan a successfull pentest
This video will teach you how to plan for a penetration testing engagement, and what are the phases you will go through
Curated Video
Hack Facebook, Twitter, and Gmail Accounts
We will use the SET tool to setup a phishing campaign in order to hack social media accounts
Curated Video
Mobile Attacks Surface
This video will shed the light on all possible attack vectors for mobile phones
Curated Video
Crack Passwords with Rainbow Tables
This video will explain the concept of Rainbow tables, and how you can use them to expedite password cracking time
Curated Video
The Powerful Armitage Tool
This video will demonstrate the powerful armitage tool, which is a GUI application for the metasploit framework
Curated Video
Root User Color Coding
This video will show you how to change the color of the terminal when using a root user
Curated Video
Identify a DNS Zone Transfer Vulnerability
Learn how to check for the DNS zone transfer vulnerability, a serious weakness that might lead to fully leaking your domain information.
Curated Video
Design Effective Wordlists
Learn how to effectively create wordlists that will aid you in cracking passwords
Curated Video
Who is Selling Your Email Addresses
This video will help you identify those companies you sign up to, who in return sell your email addresses to companies who will spam you. You can easily identify those now.
Curated Video
Getting Started With Powershell Empire
This video will show you how to install Powershell Empire and install a keylogger on a victim's machine. A jump-start tutorial on how to use this tool.
Curated Video
Control a Database Server with SQLMap-2 new
This video will show you how to leverage SQL injection vulnerability to take full control over a Database server