Zero to Hero Pentesting: Episode 6 - Enumeration (Kioptrix & Hack The Box)
Zero to Hero:
0:00 - Welcomes
3:13 - Discussing the lesson plan, Kioptrix, and Hack the Box
9:50 - Using netdiscover to find Kioptrix
12:58 - Scanning with Nessus
15:10 - Scanning with Nmap
17:00 - Reviewing what's found so far
21:00 - Reviewing Nmap scan
25:15 - Enumerating port 80/443
1:10:00 - Enumerating port 139
1:22:05 - Enumerating a random HTB machine (OneTwoSeven)
1:41:40 - Giving away a Bash Bunny!
1:47:16 - User request to review "testssl.sh" tool
Q&A / AMA
1:52:22 - Do you run Windows as a main OS?
1:53:35 - Lego Bugattis
1:54:00 - How old are you, brah?
1:54:36 - How can I solve …
Watch on YouTube ↗
(saves to browser)
Chapters (45)
Welcomes
3:13
Discussing the lesson plan, Kioptrix, and Hack the Box
9:50
Using netdiscover to find Kioptrix
12:58
Scanning with Nessus
15:10
Scanning with Nmap
17:00
Reviewing what's found so far
21:00
Reviewing Nmap scan
25:15
Enumerating port 80/443
1:10:00
Enumerating port 139
1:22:05
Enumerating a random HTB machine (OneTwoSeven)
1:41:40
Giving away a Bash Bunny!
1:47:16
User request to review "testssl.sh" tool
1:52:22
Do you run Windows as a main OS?
1:53:35
Lego Bugattis
1:54:00
How old are you, brah?
1:54:36
How can I solve HTB and other CTFs?
1:55:43
What sort of work did you do day to day on help desk?
1:57:25
SANS Holiday Hack challenges
1:57:44
Do you find Maltego useful?
1:58:09
How do I learn web app?
1:58:38
How do blue and red teams interact?
2:00:00
User coworker drama
2:00:30
Empire vs Metasploit / EternalBlue part 1
2:03:30
Automated pentesting?
2:04:05
"Hacking" video games
2:05:40
CarolinaCon
2:08:15
Whats that tattoo?
2:08:55
Infinity War/Endgame/GoT discussion
2:13:20
CISSP vs Security+
2:14:00
EternalBlue part 2 (Troubleshooting a payload)
2:23:18
Remembering tool flags for interviews
2:25:52
Microservices? part 1
2:26:35
How Responder works / tactics
2:27:40
OSCP registration, pre-reqs, when to purchase, etc.
2:35:00
Thoughts on MCSA?
2:35:40
Microservices part 2
2:37:10
Do you plan on taking the AWAE?
2:37:50
Thoughts on eLearnSecurity courses?
2:38:33
What are some successful study habits?
2:40:00
Do you work for a company?
2:41:05
Studying revisited
2:42:00
What is a MSP?
2:44:00
How old were you when you started IT?
2:46:45
Would you go back to college in hindsight?
2:47:10
Favorite hacker movie?
Playlist
Uploads from The Cyber Mentor · The Cyber Mentor · 33 of 60
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
▶
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
Buffer Overflows Made Easy - Part 1: Introduction
The Cyber Mentor
Buffer Overflows Made Easy - Part 2: Spiking
The Cyber Mentor
Buffer Overflows Made Easy - Part 3: Fuzzing
The Cyber Mentor
Buffer Overflows Made Easy - Part 4: Finding the Offset
The Cyber Mentor
Buffer Overflows Made Easy - Part 5: Overwriting the EIP
The Cyber Mentor
Buffer Overflows Made Easy - Part 6: Finding Bad Characters
The Cyber Mentor
Buffer Overflows Made Easy - Part 7: Finding the Right Module
The Cyber Mentor
Buffer Overflows Made Easy - Part 8: Generating Shellcode and Gaining Shells
The Cyber Mentor
HackTheBox - Sunday Walkthrough (Re-Up)
The Cyber Mentor
Networking for Ethical Hackers - TCP, UDP, and the Three-Way Handshake (Re-Up)
The Cyber Mentor
Networking for Ethical Hackers - Network Subnetting (Re-Up)
The Cyber Mentor
Networking for Ethical Hackers - Network Subnetting Part 2: The Challenge (Re-Up)
The Cyber Mentor
Networking for Ethical Hackers - Building A Basic Network with Cisco Packet Tracer (Re-Up)
The Cyber Mentor
HackTheBox - Fighter Walkthrough (Re-Up)
The Cyber Mentor
Beginner Linux for Ethical Hackers - Navigating the File System
The Cyber Mentor
Beginner Linux for Ethical Hackers - Users and Privileges
The Cyber Mentor
Beginner Linux for Ethical Hackers - Common Network Commands
The Cyber Mentor
Beginner Linux for Ethical Hackers - Viewing, Creating, and Editing Files
The Cyber Mentor
Beginner Linux for Ethical Hackers - Controlling Kali Services
The Cyber Mentor
Beginner Linux for Ethical Hackers - Scripting with Bash
The Cyber Mentor
Beginner Linux for Ethical Hackers - Installing and Updating Tools
The Cyber Mentor
Cracking Linux Password Hashes with Hashcat
The Cyber Mentor
Reminder: Twitch Hacking Live Stream Tonight! 2/26/19 at 8PM EST
The Cyber Mentor
Hacking Live Stream: Episode 1 - Kioptrix Level 1, HackTheBox Jerry, and Career Q&A / AMA
The Cyber Mentor
Hacking Live Stream: Episode 2 - HackTheBox Active, Vulnserver Buffer Overflow, and Career Q&A / AMA
The Cyber Mentor
Hacking Live Stream: Episode 3 - Hack The Box Blue, Devel, and Career Q&A / AMA
The Cyber Mentor
New Zero to Hero Pentest Course, New Website, and 2K Subs?!
The Cyber Mentor
Zero to Hero Pentesting: Episode 1 - Course Introduction, Notekeeping, Introductory Linux, and AMA
The Cyber Mentor
Zero to Hero Pentesting: Episode 2 - Python 101
The Cyber Mentor
Zero to Hero Pentesting: Episode 3 - Python 102, Building a Terrible Port Scanner, and a Giveaway
The Cyber Mentor
Zero to Hero Pentesting: Episode 4 - Five Phases of Hacking + Passive OSINT
The Cyber Mentor
Zero to Hero Pentesting: Episode 5 - Scanning Tools (Nmap, Nessus, BurpSuite, etc.) & Tactics
The Cyber Mentor
Zero to Hero Pentesting: Episode 6 - Enumeration (Kioptrix & Hack The Box)
The Cyber Mentor
Zero to Hero Pentesting: Episode 7 - Exploitation, Shells, and Some Credential Stuffing
The Cyber Mentor
Installing Windows Server 2016 on VMWare in 5 Minutes
The Cyber Mentor
Zero to Hero: Week 8 - Building an AD Lab, LLMNR Poisoning, and NTLMv2 Cracking with Hashcat
The Cyber Mentor
A Day in the Life of an Ethical Hacker / Penetration Tester
The Cyber Mentor
Active Directory Exploitation - LLMNR/NBT-NS Poisoning
The Cyber Mentor
Zero to Hero: Week 9 - NTLM Relay, Token Impersonation, Pass the Hash, PsExec, and more
The Cyber Mentor
Zero to Hero: Episode 10 - MS17-010/EternalBlue, GPP/cPasswords, and Kerberoasting
The Cyber Mentor
Writing a Pentest Report
The Cyber Mentor
Zero to Hero: Week 11 - File Transfers, Pivoting, and Reporting Writing
The Cyber Mentor
The Complete Linux for Ethical Hackers Course for 2019
The Cyber Mentor
Full Ethical Hacking Course - Beginner Network Penetration Testing (2019)
The Cyber Mentor
Popping a Shell with SMB Relay and Empire
The Cyber Mentor
Pentesting for n00bs: Episode 1 - Legacy (hackthebox)
The Cyber Mentor
Pentesting for n00bs: Episode 2 - Lame
The Cyber Mentor
Pentesting for n00bs: Episode 3 - Blue
The Cyber Mentor
Web App Testing: Episode 1 - Enumeration
The Cyber Mentor
Pentesting for n00bs: Episode 4 - Devel
The Cyber Mentor
Pentesting for n00bs: Episode 5 - Jerry
The Cyber Mentor
Web App Testing: Episode 2 - Enumeration, XSS, and UI Bypassing
The Cyber Mentor
Pentesting for n00bs: Episode 6 - Nibbles
The Cyber Mentor
Web App Testing: Episode 3 - XSS, SQL Injection, and Broken Access Control
The Cyber Mentor
How NOT to Approach a Cybersecurity Mentor
The Cyber Mentor
Web App Testing: Episode 4 - XXE, Input Validation, Broken Access Control, and More XSS
The Cyber Mentor
Pentesting for n00bs: Episode 7 - Optimum (hackthebox)
The Cyber Mentor
Pentesting for n00bs: Episode 8 - Bashed (hackthebox)
The Cyber Mentor
Pentesting for n00bs: Episode 9 - Grandpa
The Cyber Mentor
Top 5 Internal Pentesting Methods
The Cyber Mentor
DeepCamp AI