Just being in the terminal itself makes people think you're a hacker man. ๐ My mom was thinking I was hacking into the damn whitehouse when I was actually learning how to install Gentoo.
That guy's voice can't be funny even in videos that are supposed to be funny :) Anyway dude, awesome work, been following you since 4 months ago and have learned a lot from you, keep it up๐ช๐ฅ
@Thanos I have a question, I liked the first season, but the ending and Eliot's madness was a little bit awkward to me. Is it worth continuing to watch S2?
The resource has watermark unique to the student ID. If the resource is leaked online, Offensive Security can look at the watermark to trace back who leak the resource.
@Matthew Tallent hackers usually use the terminal on others systems for a limited amount of time through a backdoor, there's literally no time to do all this fancy kiddish work (unlike in the movies). They work in whatever terminal they get access to.
@Default Guy Do you realize that if someone is using a backdoor on another computer, the person is using his computer? It would be possible to access a backdoor with everything pre-configurated. Furthermore, I think that the main point of the video was to show the tilling windows manager.
@SkyLuke not really the backdoor sometimes get access only within limited parameters aka it'll work only when accessed by systems within accepted network range or within company premises. Not everything can be done from the comforts of ur home or ur system.
Just being in the terminal itself makes people think you're a hacker man. ๐ My mom was thinking I was hacking into the damn whitehouse when I was actually learning how to install Gentoo.
0 likesTo be honest, hacking in such an atmosphere makes your feelings less to care about the consequences that u can cause xD
1 likeThat guy's voice can't be funny even in videos that are supposed to be funny :)
0 likesAnyway dude, awesome work, been following you since 4 months ago and have learned a lot from you, keep it up๐ช๐ฅ
Bro your content is lit af ๐ฅ
0 likesHey Crypto , can we have a video on a list of Movies / Tv Shows that depicts realistic cybersecurity ???
3 likesReplies (6)
Maybe Mr. Robot?
1 like@Thanos I have a question, I liked the first season, but the ending and Eliot's madness was a little bit awkward to me. Is it worth continuing to watch S2?
1 like@KEX ' totally , even though first season is on an entirely different league all the other seasons are definitely worth watching
1 like@KEX ' I have completed it you know any similar shows that is as realistic as Mr.Robot
0 likes"How to sell drugs online (fast)" is also a cool german series, it's not a cybersecurity thing but they use actual code in it.
1 like@Parsa Hosseini thanks
0 likesSo how to be a real 1337 hackerman?
0 likesBest , make a tutorial with dnschef to redirect to a localhost site :)
1 likeThanks a lot. From morocco ๐น๐โ
0 likesCan you do a video on computer specifications for a hacking ( ram , processor etc)
1 likeReplies (1)
Except for brute force stuff any computer will do.
1 likeBig fan ..๐๐
0 likesYou can use gotop
0 likesSudo snap install gotop
โCrypto outโ๏ธโ
8 likesIs it possible to wipe a ssd that has a windows in it?
0 likesReplies (1)
MadPieMan yes ofc
1 likeNice
0 likesThanks
0 likesanyone else get "zsh: segmentation fault asciiquarium"?
0 likesReplies (2)
I'm getting
0 likesUnable to locate package asciiquarium
Sam India lmao thatโs because you donโt have it installed
0 likes:)
0 likesCan you pls stop Hacking with hardware it will save your money.
0 likesUse apt install hollywood
0 likes๐ณ
0 likesOk I have a dout god can you help me get the resources for OSPC exam
0 likesReplies (1)
The resource has watermark unique to the student ID. If the resource is leaked online, Offensive Security can look at the watermark to trace back who leak the resource.
0 likeslol actual hackers don't care how their terminals look.
6 likesReplies (8)
its about the fun of it m8 :)
0 likes@Matthew Tallent hackers usually use the terminal on others systems for a limited amount of time through a backdoor, there's literally no time to do all this fancy kiddish work (unlike in the movies). They work in whatever terminal they get access to.
0 likes@Default Guy I mean it's fun for anyone to do
0 likes@Default Guy Do you realize that if someone is using a backdoor on another computer, the person is using his computer? It would be possible to access a backdoor with everything pre-configurated. Furthermore, I think that the main point of the video was to show the tilling windows manager.
0 likes@SkyLuke not really the backdoor sometimes get access only within limited parameters aka it'll work only when accessed by systems within accepted network range or within company premises. Not everything can be done from the comforts of ur home or ur system.
0 likes@Default Guy wouldn't it be easier to set up a VPN and leave? Then technically, you're in the company premises.
0 likes@SkyLuke yes only if u want to be detected and why do u think you'll get an OS to setup a vpn, u may not even get X11 support.
0 likes@Default Guy you could set it in something like a raspberry. It wouldn't look different from a computer.
0 likes