LogoLogo
  • Intro
  • Pre-engagement
  • General methodology
  • OSCP Templates
  • Recon
    • Active
    • Passive OSINT
  • Attack Types
  • Network
    • Linux
    • Windows
    • Active Directory Enumeration
  • Shells
  • Port Forwarding / SSH Tunneling
  • Transferring files
  • Web
  • SQL
  • Password cracking
    • Brute Force - CheatSheet
  • Useful Linux Commands
  • Android
  • Buffer Overflow
  • TCP Dump and Wireshark Commands
  • Cloud Pentesting
    • SQL vs NoSQL Cheetsheet Cloud
    • AWS cli cheatsheet
    • Tools to install
    • Enumeration
    • Cloudgoat
  • Privilege Escalation
    • Linux
      • Loot
    • Windows
      • Loot
  • Kali Configuration
    • My bash Profile Files
    • Terminator Configuration
    • Tmux Configuration
    • Fish Config
    • Useful things to Install
    • VSCode Configuration
  • Automated
    • Tools
  • Videos
    • My Youtube Channel
    • IppSec Videos
    • The Cyber Mentor
  • VMs Similar to OSCP
    • Machines Similar to OSCP
  • Search Ippsec's Videos
    • Search Ippsec's Videos
  • Pcap Analysis
    • Pcap analysis
    • RegEx
  • MSFvenom Cheetsheet
  • Support me
  • Donate
Powered by GitBook
On this page
  • My Entrepreneurial Journey
  • Hacking Live Streams
  • Zero to Hero: A Practical Network Penetration Testing Course
  • Windows AD Lab Setup
  • Networking for Ethical Hackers
  • Beginner Linux for Ethical Hackers
  • Buffer Overflows Made Easy

Was this helpful?

  1. Videos

The Cyber Mentor

updated 21/06/19

Last updated 5 years ago

Was this helpful?

  1. (33:30)

  2. (26:55)

  1. (3:10:33)

  2. (1:56:33)

  3. (1:34:08)

  4. (4:56:19)

  5. (3:33:29)

  6. (2:46:11)

  1. (4:08:48)

  2. (2:49:18)

  3. (2:34:07)

  4. (3:04:10)

  5. (3:07:43)

  6. (2:48:34)

  7. (2:47:50)

  8. (2:16:45)

  9. (2:08:17)

  10. (1:32:55)

  11. (1:25:47)

(4:42)

(8:17)

(7:24)

(21:06)

(6:57)

(19:09)

(12:20)

(9:40)

(6:08)

(6:16)

(7:53)

(4:13)

(19:15)

(8:54)

(10:29)

(6:27)

(5:42)

(3:41)

(6:25)

(8:43)

(7:12)

My Entrepreneurial Journey
My Entrepreneurial Journey - Episode 1: Quitting My 6 Figure Cybersecurity Job to Start a Business
My Entrepreneurial Journey - Episode 2: Week One of Business Ownership
Hacking Live Streams
Hacking Live Stream: Episode 1 - Kioptrix Level 1, HackTheBox Jerry, and Career Q&A / AMA
Hacking Live Stream: Episode 2 - HackTheBox Active, Vulnserver Buffer Overflow, and Career Q&A / AMA
Hacking Live Stream: Episode 3 - Hack The Box Blue, Devel, and Career Q&A / AMA
Introductory Exploit Development Live Stream - x86 Assembly Primer and SEH Overflows w/ Ruri
Exploit Development Live Stream Part 2- More Assembly and some Egghunting w/ Ruri
Drunk Hacking My Own Website (Web App 101)
Zero to Hero: A Practical Network Penetration Testing Course
Zero to Hero Pentesting: Episode 1 - Course Introduction, Notekeeping, Introductory Linux, and AMA
Zero to Hero Pentesting: Episode 2 - Python 101
Zero to Hero Pentesting: Episode 3 - Python 102, Building a Terrible Port Scanner, and a Giveaway
Zero to Hero Pentesting: Episode 4 - Five Phases of Hacking + Passive OSINT
Zero to Hero Pentesting: Episode 5 - Scanning Tools (Nmap, Nessus, BurpSuite, etc.) & Tactics
Zero to Hero Pentesting: Episode 6 - Enumeration (Kioptrix & Hack The Box)
Zero to Hero Pentesting: Episode 7 - Exploitation, Shells, and Some Credential Stuffing
Zero to Hero: Week 8 - Building an AD Lab, LLMNR Poisoning, and NTLMv2 Cracking with Hashcat
Zero to Hero: Week 9 - NTLM Relay, Token Impersonation, Pass the Hash, PsExec, and more
Zero to Hero: Episode 10 - MS17-010/EternalBlue, GPP/cPasswords, and Kerberoasting
Zero to Hero: Week 11 - File Transfers, Pivoting, and Reporting Writing
Windows AD Lab Setup
Installing Windows Server 2016 on VMWare in 5 Minutes
Active Directory Exploitation - LLMNR/NBT-NS Poisoning
Networking for Ethical Hackers
Networking for Ethical Hackers - TCP, UDP, and the Three-Way Handshake (Re-Up)
Networking for Ethical Hackers - Network Subnetting (Re-Up)
Networking for Ethical Hackers - Network Subnetting Part 2: The Challenge (Re-Up)
Networking for Ethical Hackers - Building A Basic Network with Cisco Packet Tracer (Re-Up)
Beginner Linux for Ethical Hackers
Beginner Linux for Ethical Hackers - Navigating the File System
Beginner Linux for Ethical Hackers - Users and Privileges
Beginner Linux for Ethical Hackers - Common Network Commands
Beginner Linux for Ethical Hackers - Viewing, Creating, and Editing Files
Beginner Linux for Ethical Hackers - Installing and Updating Tools
Beginner Linux for Ethical Hackers - Controlling Kali Services
Beginner Linux for Ethical Hackers - Scripting with Bash
Buffer Overflows Made Easy
Buffer Overflows Made Easy - Part 1: Introduction
Buffer Overflows Made Easy - Part 2: Spiking
Buffer Overflows Made Easy - Part 3: Fuzzing
Buffer Overflows Made Easy - Part 4: Finding the Offset
Buffer Overflows Made Easy - Part 5: Overwriting the EIP
Buffer Overflows Made Easy - Part 6: Finding Bad Characters
Buffer Overflows Made Easy - Part 7: Finding the Right Module
Buffer Overflows Made Easy - Part 8: Generating Shellcode and Gaining Shells