Enhance Office 365 | Self Service Demonstration thumbnail

Enhance Office 365 | Self Service Demonstration

You already encryption offered by Microsoft’s Office 365, but you need more flexibility to meet your list of diverse business cases. But you don’t need a new message platform. Through its multiple secure delivery methods, seamless authentication, and rich branding, OneWorld offers comprehensive natural extensions to the Office 365 environment, for more flexibility, more options…

What Is an SSL Certificate? Do You Need One? thumbnail

What Is an SSL Certificate? Do You Need One?

What Is an SSL Certificate and Do You Need One?✅Read about it here ➜ https://bit.ly/2q1KTgp SSL certificates are quickly becoming the fabric of the new web. It helps ensure that the web has a base level of privacy and integrity while ensuring that information is transferred from point A to point B securely. It’s one…

Def Con 27 - Brent Stone - Reverse Engineering  17+ Cars in Less than 10 Minutes thumbnail

Def Con 27 – Brent Stone – Reverse Engineering 17+ Cars in Less than 10 Minutes

Brent provides a live demonstration reversing engineering 17 or more unknown passenger vehicle CAN networks in under 10 minutes using new automated techniques. These unsupervised techniques are over 90% accurate and consistent when tested using production CAN networks and different driving conditions. He then introduces the Python and R code used for the demo and…

How to Exploit Cron Jobs for Privilege Escalation thumbnail

How to Exploit Cron Jobs for Privilege Escalation

101 Pentesting Training: https://dgtsec.com/cybersec-pentesting-training/ Python Basics course (coupon applied): http://bit.ly/2Gfx8Qh Join my SQUAD for free (for more discounts): http://bit.ly/2xhSvM2 Cristi’s Youtube: https://www.youtube.com/user/cristivlad25 In this video I’m gonna show you how cron jobs can be exploited for privilege escalation purposes. I’m Chris, I’m a penetration tester and I do a lot of cybersecurity videos. Video Thread:…

Popping a Shell with SMB Relay and Empire thumbnail

Popping a Shell with SMB Relay and Empire

LLMNR Poisoning video: https://youtu.be/Fg2gvk0qgjM ❓Info❓ ___________________________________________ Hire me: https://tcm-sec.com Contact (professional inquiries only, please): [email protected] 📱Social Media📱 ___________________________________________ Website: https://thecybermentor.com Twitter: https://twitter.com/thecybermentor Twitch: https://www.twitch.tv/thecybermentor Discord: https://discord.gg/REfpPJB LinkedIn: https://www.linkedin.com/in/heathadams 💸Donate💸 ___________________________________________ Like the channel? Please consider supporting me on Patreon: https://www.patreon.com/thecybermentor

Teaching My Wife to Hack...Maybe (Part 2) thumbnail

Teaching My Wife to Hack…Maybe (Part 2)

0:00 – Introducing the next box 1:56 – Five steps of hacking 3:05 – Scanning with Nmap 4:15 – Stealth scan review 6:20 – Scanning methodologies 7:35 – Reviewing the Nmap scan 11:25 – Googling for exploits 14:35 – Using Metasploit for the win 26:00 – Advanced Metasploit discussion ❓Info❓ ___________________________________________ Hire me: https://tcm-sec.com Course…

Teaching My Wife to Hack...Maybe thumbnail

Teaching My Wife to Hack…Maybe

0:00 – Just chattin’ 2:45 – Introduction….HackTheBox Legacy 5:25 – The 5 steps of hacking 7:10 – What are ports? 8:26 – TCP vs UDP / The 3-way handshake 10:18 – Stealth scan “handshake” 11:25 – Setting up Nmap scan / hacking pop quiz 18:00 – Reviewing our Nmap scan / enumeration 23:15 – Using…