Curated Video
The Powerful Armitage Tool
This video will demonstrate the powerful armitage tool, which is a GUI application for the metasploit framework
Curated Video
Getting Started With Powershell Empire
This video will show you how to install Powershell Empire and install a keylogger on a victim's machine. A jump-start tutorial on how to use this tool.
Curated Video
Control a Database Server with SQLMap-2 new
This video will show you how to leverage SQL injection vulnerability to take full control over a Database server
Curated Video
Analysis of Code4hk APK
This video will deep dive into the analysis of a malicious APK file named Code4hk, and wil show you how hackers can inject an APK within another APK's resources.
Curated Video
Dissecting FTP
In this tutorial, you will learn the modes FTP functions under as well as their security architecture.
Curated Video
Records Of Processing Activities
This section provides information that will help participants gain knowledge on the GDPR requirements on the records of processing activities, the steps of creating records, and the importance of keeping up-to-date records of processing...
Curated Video
Execute an Offline Password Attack on Windows
Learn how to plan an execute an offline password attack on Windows using John The Ripper tool
Curated Video
Keyword Search Tecniques
This video will guide you on how to use keyword search techniques in spotting malicious code within an APK
Curated Video
Execute a Phishing Attack
In this video, you will learn how to plan and execute a phishing attack using the SET tool
Curated Video
Wireshark D5 V2 - HTTP analysisFTP analysis
DAY FIVE - Learn how to capture application layer protocol packets and perform deep packet inspection, along with detecting network issues - Video 2: FTP analysis
Curated Video
Sender Framework Policy (SPF)
In this tutorial, you will learn about SPF and how to set it up on your DNS server.
Curated Video
Takeover a Database Server
In this tutorial, you will learn how to exploit a web application using SQLMAP in order to control a Database Server fully. Use this technique ethically.
Curated Video
Hashing in a Nutshell
In this video, you will learn the basics of hashing and the various ways it can be used for password storage, file verification, and indexing.
Curated Video
Execute an Offline Password Attack in Linux
Learn how to plan an execute an offline password attack on Linux using the HashCat powerful tool
Curated Video
Wireshark D2 V4 - View Menu
DAY TWO - We will explore Wireshark interface in details - Video 4: View menu
Curated Video
Hacking with Termux
A simple tool for ethical hacking is Termux. There are numerous tools for Termux available online, so we've compiled a list of the top hacking tools for Termux along with instructions on how to use each one.
Curated Video
Wireshark D2 V1 - File Menu
DAY TWO - We will explore Wireshark interface in details - Video 1: File menu
Curated Video
Password Spraying
Learn how to spray passwords across many accounts. Password spraying is an attack that attempts to access a large number of accounts (usernames) with a few commonly used passwords. It is different from the traditional brute-force attacks...
Curated Video
Offline Password Attack on Linux
In this video, you will learn how to extract and identify password hashes on a Linux machine. Use the powerful Hashcat tool to crack those hashes.
Curated Video
WiFi Password Cracking
Exploiting security flaws in wireless networks to gain unwanted access is known as cracking. Exploits on networks that employ WEP to establish security restrictions are referred to as WEP cracking.
Curated Video
Hack WPA2 Wireless Networks
In this tutorial, you will learn how to crack into WPA and WPA2 wireless networks using various tools like aircrack-ng.
Curated Video
Lab 1 Task 4 LTSPICE Models and Library
Lab 1 Task 4 LTSPICE Models and Library Walid Issa
Curated Video
50 Sports and Activities Signs in ASL
Today we're teaching you about 50 sports and activities signs including a few sentences that you can practice using these signs with. Most sports signs are iconic, meaning the signs look like your acting out the action of that word. If...
Curated Video
How to Write an Information Report
An introduction to writing information reports. This video details the structure of an information report (introduction, body, conclusion, bibliography) as well as the language features used within an information report (present tense,...