could you consider making a video about intel managment engine. that works even of computer is on powered off state, that have an entirely os 'minix' and dedicated network card that uses seperate resources from operating system.
evil twin can be the same as the evil portal, but the information sent through the network accually makes it to the real website e.g. fake google but you accually get signed in etc.. This can also be done with the dnsspoof module
@WinDS A proxy server is a computer system or router that functions as a relay between client and server. It helps prevent an attacker from invading a private network and is one of several tools used to build a firewall. Thats the defenision. It can also be used for attackers.
@U X agreed i have 4 years experience of it and i can say thats it better to start with programming, networking and linux knowledge but still its great to see those videos just for fun
@U X yeah ...but can you guys help me with starting to learn hacking...and sources or something like that
0 likes
Fu des2020-09-17 18:09:50 (edited 2020-09-17 18:10:20 )
@pranay thammineni just type "ethical hacking" on google and start learning, but still its better to start with programming, python is the best for cybersec
"Don't connect to public Wi-Fi" is like the "Stranger Danger" of the 21st century except this time it's more dangerous
17 likesOnce the modules are already installed on your device how do you get them off? I feel like I've been a victim of this.
0 likesAlso if you try to reverse-shell into a honeypot get ready to lose your machine.
1 likecould you consider making a video about intel managment engine.
0 likesthat works even of computer is on powered off state, that have an entirely os 'minix' and dedicated network card that uses seperate resources from operating system.
WE MOSTLY NEED LONG Infographic VIDEOS MAANN..
0 likesNice now am ganna go and connect to public wifi with my non existing laptop
2 likesHey! Can i contact you in DMs about some stuff, i want to get into this kind of stuff but need some help <3
0 likesPlease make tutorial videos...
1 likeWhat If They Connect To An Https Website ? Will U Still Be Able To Capture Cookies , Fingerprints Etc ?
1 likeHey crypto do you have any course available?
2 likesHey Crypto, is this the same thing as the "evil twin?"
1 likeReplies (2)
evil twin can be the same as the evil portal, but the information sent through the network accually makes it to the real website e.g. fake google but you accually get signed in etc.. This can also be done with the dnsspoof module
1 like@New Species Got it, thanks.
0 likesBro, you are amazing!!
1 likeAmazing broo
0 likesYou are the best in youtube sir do you have any course ?
4 likesokay now i am hooked
1 likeHello , matrix terminal effect tutorial please
1 likeReplies (1)
1.Apt install cmatrix
0 likes2.Cmatrix
I just got my Mark VII Tactical today
1 likeTl;dw, use a VPN, always
6 likesReplies (6)
Also proxy's for extra safety
0 likesusing self-hosted VPN is always a better option, too.
1 likebut beware, always update the VPN package on the server.
@Shiny 345 Ok thanks dude
1 like@MEAT AND POTATOES Whats a proxy? If you don't mind telling me and giving an example 👀
0 likes@WinDS A proxy server is a computer system or router that functions as a relay between client and server. It helps prevent an attacker from invading a private network and is one of several tools used to build a firewall.
0 likesThats the defenision. It can also be used for attackers.
@MEAT AND POTATOES Thank you man!!
0 likesWanna learn from you, do you have a tutorial on hacking?
2 likesReplies (9)
go watch nullbyte, hackersploit, john hammond
0 likes@U X agreed i have 4 years experience of it and i can say thats it better to start with programming, networking and linux knowledge but still its great to see those videos just for fun
2 likes@U X yeah ...but can you guys help me with starting to learn hacking...and sources or something like that
0 likes@pranay thammineni just type "ethical hacking" on google and start learning, but still its better to start with programming, python is the best for cybersec
1 like@pranay thammineni and after you know how to code, then learn hacking
0 likes@Fu des but is there a certain standard of programming or just need to have some knowledge of programming..?
0 likes@pranay thammineni just basics can fit, but i recommend you to have like medium level knowledge to know whats going on
0 likes@U X totally agree with your point 🙃
0 likes@Fu des thanks already followed them weeks ago
0 likesAnd...what's that useless matrix for ?
2 likesReplies (2)
Visual effects
1 likeIts called c matrix( a script for visual effects)
1 likeCrypto First !!!
2 likesReplies (1)
U r 2nd
1 likeI am from Bangladesh 🇧🇩
1 likeGo analog
1 likeFace reveal
2 likesReplies (1)
Seriously man ? Just look at his pic...
0 likesBhai kya batana chahta ho
1 likeSo early 20 seconds
2 likesReplies (1)
i got in 6 sec
2 likes