Hacker Videos
🗞 News t.me/PentestingNews 💲 Donate Bitcoin 1EsB5trfvRaSPfWmh1DSA5aggmo1NsytB3
نمایش بیشتر- مشترکین
- پوشش پست
- ER - نسبت تعامل
در حال بارگیری داده...
در حال بارگیری داده...
👩🎓👨🎓 Learn about Large Language Model (LLM) attacks! This lab is vulnerable to indirect prompt injection. The user carlos frequently uses the live chat to ask about the Lightweight "l33t" Leather Jacket product. To solve the lab, we must delete the user carlos. If you're struggling with the concepts covered in this lab, please review
https://portswigger.net/web-security/llm-attacks🧠 🔗 Portswigger challenge:
https://portswigger.net/web-security/llm-attacks/lab-indirect-prompt-injection🧑💻 Sign up and start hacking right now -
https://go.intigriti.com/register👾 Join our Discord -
https://go.intigriti.com/discord🎙️ This show is hosted by
https://twitter.com/_CryptoCat( @_CryptoCat ) &
https://twitter.com/intigriti👕 Do you want some Intigriti Swag? Check out
https://swag.intigriti.comOverview: 0:00 Intro 0:20 Insecure output handling 0:52 Indirect prompt injection 2:20 Lab: Indirect prompt injection 3:05 Explore site functionality 3:42 Probe LLM chatbot 4:29 Launch attacks via review feature 11:00 Conclusion
Check out Snyk's AI hacking workshop on July 25th. Register here to secure a spot: snyk.co/livehacktcm Sponsor a Video:
https://www.tcm.rocks/SponsorsPentests & Security Consulting:
https://tcm-sec.comGet Trained:
https://academy.tcm-sec.comGet Certified:
https://certifications.tcm-sec.comMerch:
https://merch.tcm-sec.com📱Social Media📱 ___________________________________________ Twitter:
https://twitter.com/thecybermentorTwitch:
https://www.twitch.tv/thecybermentorInstagram:
https://instagram.com/thecybermentorLinkedIn:
https://www.linkedin.com/in/heathadamsTikTok:
https://tiktok.com/@thecybermentorDiscord:
https://discord.gg/tcm💸Donate💸 ___________________________________________ Like the channel? Please consider supporting me on Patreon:
https://www.patreon.com/thecybermentorSupport the stream (one-time):
https://streamlabs.com/thecybermentorHacker Books: Penetration Testing: A Hands-On Introduction to Hacking:
https://amzn.to/31GN7iXThe Hacker Playbook 3:
https://amzn.to/34XkIY2Hacking: The Art of Exploitation:
https://amzn.to/2VchDyLThe Web Application Hacker's Handbook:
https://amzn.to/30Fj21SReal-World Bug Hunting: A Field Guide to Web Hacking:
https://amzn.to/2V9srOeSocial Engineering: The Science of Human Hacking:
https://amzn.to/31HAmVxLinux Basics for Hackers:
https://amzn.to/34WvcXPPython Crash Course, 2nd Edition:
https://amzn.to/30gINu0Violent Python:
https://amzn.to/2QoGoJnBlack Hat Python:
https://amzn.to/2V9GpQkMy Build: lg 32gk850g-b 32" Gaming Monitor:
https://amzn.to/30C0qzVdarkFlash Phantom Black ATX Mid-Tower Case:
https://amzn.to/30d1UW1EVGA 2080TI:
https://amzn.to/30d2lj7MSI Z390 MotherBoard:
https://amzn.to/30eu5TLIntel 9700K:
https://amzn.to/2M7hM2pG.SKILL 32GB DDR4 RAM:
https://amzn.to/2M638ZbRazer Nommo Chroma Speakers:
https://amzn.to/30bWjiKRazer BlackWidow Chroma Keyboard:
https://amzn.to/2V7A0orCORSAIR Pro RBG Gaming Mouse:
https://amzn.to/30hvg4PSennheiser RS 175 RF Wireless Headphones:
https://amzn.to/31MOgpuMy Recording Equipment: Panasonic G85 4K Camera:
https://amzn.to/2Mk9vsfLogitech C922x Pro Webcam:
https://amzn.to/2LIRxApAston Origin Microphone:
https://amzn.to/2LFtNNERode VideoMicro:
https://amzn.to/309yLKHMackie PROFX8V2 Mixer:
https://amzn.to/31HKOMBElgato Cam Link 4K:
https://amzn.to/2QlicYxElgate Stream Deck:
https://amzn.to/2OlchA5*We are a participant in the Amazon Services LLC Associates Program, an affiliate advertising program designed to provide a means for us to earn fees by linking to Amazon.com and affiliated sites.
Learn how to mount Linux disk images in Windows using the Windows Subsystem for Linux (WSL). We’ll tackle common issues and their fixes. ⌨️ Command used in the video: sudo mount -o ro,loop,offset=[OFFSET],noload [IMAGE] /mnt/[MOUNTPOINT] If you're mounting images containing Logical Volume Management (LVM) volumes, additional steps are required: ✅ Create a loop device from the disk image: sudo losetup -f -P testimage.dd Here, "-f" tells losetup to find the next available loop device, and "-P" forces the kernel to scan the partition table on the newly created loop device. ✅ Refresh LVM so that the new device appears: sudo pvscan --cache This command clears all existing physical volume online records first, then scans all devices on the system, adding physical volume online records for any physical volumes that are found. ✅ Activate the new volume group and logical volumes: sudo vgchange -ay This command activates all inactive logical volumes in the volume group. "ay" stands for "activate yes." ✅ Locate the new volume group: sudo vgdisplay ✅ Mount the volume group: sudo mount /dev/mapper/[VOLUME_GROUP]--[LOGICAL_VOLUME] /mnt/image Note: Replace [VOLUME_GROUP]--[LOGICAL_VOLUME] with the actual paths derived from the sudo vgdisplay command. 📃 Please reference this article for more information:
https://rich.grundy.io/blog/mounting-lvm-raw-disk-image-on-linux/*** If you enjoy this video, please consider supporting 13Cubed on Patreon at patreon.com/13cubed. *** 📖 Chapters 00:00 - Intro 05:09 - The Solution #Forensics #DigitalForensics #DFIR #ComputerForensics #WindowsForensics #LinuxForensics
|| Jump into Pay What You Can training at whatever cost makes sense for you!
https://jh.live/pwycLearn Cybersecurity - Name Your Price Training with John Hammond:
https://nameyourpricetraining.comLearn Coding:
https://jh.live/codecraftersWATCH MORE: Dark Web & Cybercrime Investigations:
https://www.youtube.com/watch?v=_GD5mPN_URM&list=PL1H1sBF1VAKVmjZZr162aUNCt2Uy5ozAG&index=4Malware & Hacker Tradecraft:
https://www.youtube.com/watch?v=LKR8cdfKeGw&list=PL1H1sBF1VAKWMn_3QPddayIypbbITTGZv&index=5📧JOIN MY NEWSLETTER ➡
https://jh.live/email🙏SUPPORT THE CHANNEL ➡
https://jh.live/patreon🤝 SPONSOR THE CHANNEL ➡
https://jh.live/sponsor🌎FOLLOW ME EVERYWHERE ➡
https://jh.live/twitter↔
https://jh.live/linkedin↔
https://jh.live/discord↔
https://jh.live/instagram↔
https://jh.live/tiktok💥 SEND ME MALWARE ➡
https://jh.live/malware🔥YOUTUBE ALGORITHM ➡ Like, Comment, & Subscribe!
Big shoutout to KASM for sponsoring this video. KASM workspaces supports the OSINT Community Efforts by providing the following products: Kasm Community Edition:
https://kasmweb.com/community-editionKasm Cloud OSINT:
https://kasmweb.com/cloud-personalKasm Workspaces OSINT Platform for Professionals/:
https://kasmweb.com/osintKasm Infrastructure/Apps for OSINT Collection:
https://registry.kasmweb.com/1.0/// MJ Banias’ SOCIALS // LinkedIn:
https://www.linkedin.com/in/mjbaniasCloak and Dagger Podcast (Spotify):
https://open.spotify.com/show/6mT8zDMBq5gOfAVZi47pT3The Debrief:
https://thedebrief.org/podcasts/Instagram:
https://www.instagram.com/mjbanias/X:
https://x.com/mjbaniasWebsite:
https://www.bullshithunting.com/// Ritu Gill’ SOCIALS // LinkedIn:
https://www.linkedin.com/in/ritugill-osinttechniques/OSINT Techniques website:
https://www.osinttechniques.com/Instagram:
https://www.osinttechniques.com/X:
https://x.com/osinttechniquesYouTube:
https://www.youtube.com/@ForensicOSINTForensic OSINT website:
https://www.forensicosint.com/TikTok:
https://www.tiktok.com/@osint.techniques// Rae Baker’s SOCIALS // Website:
https://www.raebaker.net/LinkedIn: linkedin.com/in/raebakerosint X:
https://x.com/wondersmith_rae// Eliot Higgins’ SOCIALS // Bellingcat website:
https://www.bellingcat.com/author/eliothiggins/X:
https://x.com/eliothiggins// Books // The UFO People: A Curious Culture by MJ Banias: USA:
https://amzn.to/3xP5JmeUK:
https://amzn.to/4cOrzoKDeep Dive: Exploring the Real-world Value of Open Source Intelligence by Rae Baker and Micah Hoffman: USA:
https://amzn.to/3xFN9gvUK:
https://amzn.to/3zJSy6zWe Are Bellingcat: Global Crime, Online Sleuths, and the Bold Future of News by Eliot Higgins: USA:
https://amzn.to/3RXNa64UK:
https://amzn.to/4cvYP4B// YouTube video REFERENCE // Top 10 FREE OSINT tools (with demos):
https://youtu.be/PRqOj5qM1icDeep Dive OSINT:
https://youtu.be/dxiNByvkvU8Best Hacking Python Book:
https://youtu.be/2B76CTbi72wShe Hacked Me:
https://youtu.be/U6pDqFhN82I// David's SOCIAL // Discord:
https://discord.com/invite/usKSyzbX:
https://www.twitter.com/davidbombalInstagram:
https://www.instagram.com/davidbombalLinkedIn:
https://www.linkedin.com/in/davidbombalFacebook:
https://www.facebook.com/davidbombal.coTikTok: http://tiktok.com/@davidbombal YouTube:
https://www.youtube.com/@davidbombal// MY STUFF //
https://www.amazon.com/shop/davidbombal// SPONSORS // Interested in sponsoring my videos? Reach out to my team here: [email protected] // MENU // 00:00 - Coming up 00:41 - Sponsored Section: KASM Workspaces demo 06:26 - Intro 06:46 - MJ’s Journey in OSINT 11:14 - Starting an OSINT Company 11:55 - Teaching Background 12:34 - Years in OSINT 13:19 - Advice for People Starting Out 15:44 - What It Means to Do OSINT 16:54 - Recommended Tools for OSINT 19:03 - Meet Ritu Gil 19:09 - Characteristics of a Good OSINT Investigator 20:03 - Knowing When to Give Up 20:43 - Soft Skills vs Technical Skills 22:17 - Ritu’s Advice on How to Get Started 23:24 - Are There Jobs in OSINT? 24:39 - Forensic OSINT Demo 26:41 - Tinder Vulnerabilities 30:51 - Next Guest Intro 32:04 - Rae Baker 32:33 - Tools Rae Uses 34:11 - From Graphic Design to OSINT 37:56 - Volunteering to Learn 39:10 - Next Guest Intro 40:10 - Eliot Higgins 40:19 - Eliot’s Background into OSINT 41:44 - Bellingcat 44:27 - No Degree Needed to Start 45:37 - Useful Tools to Use 47:19 - Advice for People Starting Out 48:36 - Communities to Join 51:50 - Recommended Books 53:03 - How MJ Got the Job 55:53 - MJ Shares an OSINT Story 01:02:44 - Importance of a Team 01:08:15 - Conclusion 01:10:34 - Outro osint open-source intelligence open source intelligence tools osint curious geolocation geolocation game facebook instagram google bing yandex geolocation google geolocation bing you cannot hide social media warning about social media google dorks dorks google osintgram osint framework osint tools osint tv osint ukraine osint tutorial osint course osint instagram osint framework…
In this video walkthrough, we covered an introduction to NoSQL, the difference between NoSQL & SQL and NoSQL operators. We discussed the two basic types of NoSQL injection, mainly syntax based NoSQL injection and Operators-based. We covered the practical scenario from TryHackMe NoSQL Injection for demo purposes. **** Receive Cyber Security Field, Certifications Notes and Special Training Videos
https://www.youtube.com/channel/UCNSdU_1ehXtGclimTVckHmQ/join****** Writeup
https://motasem-notes.net/nosql-injection-for-beginners-tryhackme-nosql-injection/TryHackMe NoSQL Injection
https://tryhackme.com/r/room/nosqlinjectiontutorial******** Google Profile
https://maps.app.goo.gl/eLotQQb7Dm6aiL8z6LinkedIn [1]:
https://www.linkedin.com/in/motasem-hamdan-7673289b/[2]:
https://www.linkedin.com/in/motasem-eldad-ha-bb42481b2/طرح فعلی شما تنها برای 5 کانال تجزیه و تحلیل را مجاز می کند. برای بیشتر، لطفا یک طرح دیگر انتخاب کنید.