TryHackMe Blue - Walkthrough


In this video, I will be showing you how to pwn Blue on TrryHackMe. We will cover the basics of Windows enumeration, post-exploitation, and password cracking.

Our videos are also available on the decentralized platform LBRY: lbry.tv/$/invite/@HackerSploit:26

SUPPORT US:
Patreon: www.patreon.com/hackersploit
Merchandise: teespring.com/en-GB/stores/hackersploitofficial

SOCIAL NETWORKS:
Twitter: twitter.com/HackerSploit
LinkedIn: www.linkedin.com/company/18713892

WHERE YOU CAN FIND US ONLINE:
HackerSploit — Cybersecurity Training Simplified: hackersploit.org/
HackerSploit Forum: forum.hackersploit.org
HackerSploit Academy: www.hackersploit.academy

LISTEN TO THE CYBERTALK PODCAST:
Spotify: open.spotify.com/show/6j0RhRiofxkt39AskIpwP7

We hope you enjoyed the video and found value in the content. We value your feedback. If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms.

Thanks for watching!
Благодарю за просмотр!
Kiitos katsomisesta
Danke fürs Zuschauen!
感谢您观看
Merci davoir regardé
Obrigado por assistir
دیکھنے کے لیے شکریہ
देखने के लिए धन्यवाद
Grazie per la visione
Gracias por ver
شكرا للمشاهدة

#TryHackMe#Pentesting

Getting Started with LIDAR


LIDAR units provided by DFRobot — www.dfrobot.com/
Full Article at dbot.ws/lidar01
More Projects at dronebotworkshop.com

TF Mini LIDAR — www.dfrobot.com/product-1702.html
RPLIDAR — www.dfrobot.com/product-1125.html

Today I’ll be introducing two inexpensive LIDAR devices that you can start experimenting with. These devices were provided courtesy of DFRobot, they are VERY inexpensive considering their capabilities. Visit their store at www.dfrobot.com/ to see these and other LIDAR units.

The first device is the TF Mini, a simple stationary LIDAR devices that uses a focused infrared beam to accurately measure distances from 30 cm to 12 meters (1 to 40 feet). This compact and easy to use unit contains its own processor and can scan up to 100 times a seconds.

I’ll show you how the TF Mini is configured and how to use it with an Arduino, it makes a great addition to a robot and can outperform the usual ultrasonic sensors in many ways.

The second device is no less than amazing, it’s the RPLIDAR device from Robo Peak. This s a full 360 degree scanning LIDAR unit, just like you’ve seen on the top of self-driving vehicles. The possibilities in robotics for a device like this are literally endless.

I’ll first test out my RPLIDAR using a PC and some scanning software. After that I’ll show you the basics of hooking it up to an Arduino and we’ll run a little demo sketch.

Here is what we will be covering today:

Two LIDAR Devices — 3:30
How LIDAR works — 6:08
LIDAR vs. other technologies — 9:02
TF Mini LIDAR — 12:11
Logic Level (Voltage) Converters — 13:52
TF Mini with Arduino — 17:23
RPLIDAR — 23:37
RPLIDAR Scanning Demo — 25:43
RPLIDAR with Arduino — 31:40

This is the first video I’ve done on LIDAR but it will certainly not be the last, nor is it the last time you’ll see these two devices. I’m intending to do a few more videos to demonstrate the capabilities of both devices so stay tuned.

I’d also like to thank the folks at DFROBOT for providing these two LIDAR units. They have a wide selection of inexpensive LIDAR units that you should check out on their store at www.dfrobot.com/

This is the operating system Edward Snowden recommends


Support the channel on Patreon: www.patreon.com/censiclick

Famous NSA whistleblower Edward Snowden for many is a trustworthy source for privacy and security software recommendations. Here are his favorite operating systems, Tails and Qubes OS.
tails.boum.org/
www.qubes-os.org

Twitter: twitter.com/CensiClick
Subscribe to my channel! goo.gl/B8Z9v8
Music by Epidemic Sound: www.epidemicsound.com/referral/3308ry/
Check out more of my videos: www.youtube.com/censiclick/videos

» Credits «
«Edward-Snowden in black-white» image by JohnValeron; Licensed under CC BY 4.0 ( creativecommons.org/licenses/by/4.0/deed.en ); Changes: Brightness, Random distortions
Stock footage provided by Videezy

Most Secure, Private and Usable Linux Distro


Discussing the different Linux distros that are focused on security and privacy but can be used as a daily driver. Which ones are the best and the most usable? What are the problems affecting their usability and how to fix that?

Im the Internet Privacy Guy. Im a public interest technologist. Im here to educate. You are losing your Internet privacy and Internet security every day if you dont fight for it. Your data is collected with endless permanent data mining. Learn about a TOR router, a VPN, antivirus, spyware, firewalls, IP address, wifi triangulation, data privacy regulation, backups and tech tools, and evading mass surveillance from NSA, CIA, FBI. Learn how to be anonymous on the Internet so you are not profiled. Learn to speak freely with pseudo anonymity. Learn more about the dangers of the inernet and the dangers of social media, dangers of email.

I like alternative communication technology like Amateur Radio and data communications using Analog. Im a licensed HAM operator.

Contact Rob on the Brax.Me App (@robbraxman) for encrypted conversations (open source platform)

bytzVPN.com Premium VPN with Cloud-Based TOR Routing

whatthezuck.net Cybersecurity Reference

brax.me Privacy Focused Social Media — Open Source — Encrypted Communications

rob.brax.me Store for BytzVPN, BraxWifi Router, and merchandise

Nmap Tutorial For Beginners - 1 - What is Nmap?


Welcome to Nmap for beginners! Nmap («Network Mapper») is a free and open source (license) utility for network discovery and security auditing.

Our Courses:
Python For Ethical Hacking — Develop Your Own Scripts: www.udemy.com/course/the-complete-python-3-developer-course/?couponCode=TCP3DC2019

The Complete Ethical Hacking Bootcamp: www.udemy.com/course/the-complete-ethical-hacking-bootcamp/?couponCode=TCEHB2019

OS Compatibility: Linux,Windows

The Art of Code - Dylan Beattie


Software and technology has changed every aspect of the world we live in. At one extreme are the ‘mission critical’ applications — the code that runs our banks, our hospitals, our airports and phone networks. Then there’s the code we all use every day to browse the web, watch movies, create spreadsheets… not quite so critical, but still code that solves problems and delivers services.

But what about the code that only exists because somebody wanted to write it? Code created just to make people smile, laugh, maybe even dance? Maybe even code that does nothing at all, created just to see if it was possible?

Join Dylan Beattie — programmer, musician, and creator of the Rockstar programming language — for an entertaining look at the art of code. We’ll look at the origins of programming as an art form, from Conways Game of Life to the 1970s demoscene and the earliest Obfuscated C competitions. We’ll talk about esoteric languages and quines — how DO you create a program that prints its own source code? We’ll look at quine relays, code golf and generative art, and we’ll explore the phenomenon of live coding as performance — from the pioneers of electronic music to modern algoraves and live coding platforms like Sonic Pi.

Check out more of our talks, courses, and conferences in the following links:
ndcconferences.com/
ndc-london.com/

Metasploit For Beginners - #1 - The Basics - Modules, Exploits


Hey, guys HackerSploit here, back again with another video. In this video, we will be starting the Complete Metasploit Course, that will take you from a beginner to expert with Metasploit.
The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development.

Our Courses:
Python For Ethical Hacking — Develop Your Own Scripts: www.udemy.com/course/the-complete-python-3-developer-course/?couponCode=TCP3DC2019

The Complete Ethical Hacking Bootcamp: www.udemy.com/course/the-complete-ethical-hacking-bootcamp/?couponCode=TCEHB2019

I hope you enjoy/enjoyed the video.
If you have any questions or suggestions feel free to ask them in the comments section or on my social networks as well as my blog.

HackerSploit Blog: hsploit.com/

✔️SOCIAL NETWORKS
— Facebook: www.facebook.com/HackerSploit/
Twitter: twitter.com/HackerSploit
Patreon: patreon.com/hackersploit
— Thanks for watching!
Благодаря за гледането
感谢您观看
Merci davoir regardé
Grazie per la visione
Gracias por ver
شكرا للمشاهدة
देखने के लिए धन्यवाद

How To Setup Proxychains In Kali Linux - #1 - Stay Anonymous


How to setup Proxychains in Kali Linux to stay anonymous while hacking. Kali Linux, an Advanced Penetration Testing Linux distribution used for Penetration Testing, Ethical Hacking and network security assessments.
proxychains — a tool that forces any TCP connection made by any given application. to follow through proxy like TOR or any other SOCKS4, SOCKS5 or HTTP(S) proxy. Supported auth-types: «user/pass» for SOCKS4/5, «basic» for HTTP. proxyresolv — DNS resolving. Used to resolve host names via proxy or TOR.

Links:
Kali Linux: www.google.com/url?sa=t

CSI LINUX - монстр для пробива. Операционная система OSINT разведки.


Все ссылки в Telegram:
t.me/black_triangle_tg/662
=====

«Спасти мир» и поддержать канал можно тутЬ:
DonationAlerts: www.donationalerts.com/r/black_triangl
Boosty: boosty.to/black_triangle
Анонимно криптовалютами: notabug.org/Black_Triangle/safe_world

=====
t.me/aliexpress_hacker — хакерское с AliExpress
t.me/komp_ali — компьютерное барахло с Ali
t.me/hi_anon — личный блог
t.me/open_source_friend — интересный софт
www.youtube.com/channel/UCYf_gVlTuMFodRQDsxUdAYg
=====
#OSINT #CSI_LINUX #Черный_треугольник
=====
Автор музыки из видео: «Стереополина» lnk.to/stereopolina