@PrivacyMatters517

Get the Pro Hacker's Cheat Sheet:
https://bit.ly/Pro-Hacking-Cheatsheet

@integralyogin

0:00 Introduction
0:18 Disclaimer
0:32 1. Phishing - Email Deception
1:02 2. Malware - Digital Parasites
1:30 3. SQL Injection - Database Vulnerabilities
2:01 4. Cross-Site Scripting (XSS)
2:27 5. Denial of Service (DoS)
2:51 6. Man in the Middle Attacks
3:20 7. Brute Force Attacks
3:43 8. Social Engineering
4:13 9. Zero-Day Exploits
4:42 10. Password Attacks
5:10 11. Ransomware
5:36 12. Keylogging
5:55 13. Session Hijacking
6:22 14. DNS Spoofing
6:48 15. Watering Hole Attacks
7:14 16. Drive-by Downloads
7:38 17. Exploit Kits
8:04 18. Rootkits
8:26 19. Botnets
8:48 20. Packet Sniffing
9:09 21. Replay Attacks
9:26 22. SQL Injection Techniques
9:56 23. Cross-Site Request Forgery
10:24 24. Clickjacking
10:47 25. Credential Stuffing
11:13 26. Session Fixation
11:32 27. Eavesdropping
11:49 28. Privilege Escalation
12:16 29. Backdoors
12:35 30. Typosquatting
12:52 31. Wardriving
13:11 32. Vishing
13:32 33. Evil Twin Attacks
13:48 34. Bait and Switch
14:07 35. SQL Slammer
14:29 36. Rainbow Table Attacks
14:39 37. Logic Bombs
15:02 38. Firmware Hacking
15:26 39. Bluejacking

claude timestamps

@officialanshshrivastava

2:28 DDOS - Denial of Service ❌ Distributed Denial of Service βœ…

@dhiraj6727

It's a great, concise explanation of various hacking techniques. Noice man I like this.

Maybe you could also create another video about various tools used to counter these techniques.

I hope that this payment won't compromise my payment information and bank account information :D

@PrivacyMatters517

Your shortcut to hacking – grab our cheat sheet: https://buymeacoffee.com/PrivacyMatters/e/292971

@Conqueror25

SQL injection was repeated . Once at 9:45 and once before that

@AlphaEligon

4.41 to 4.49: Did you accidentally "press the fastfoward" button during editting? πŸ˜… Otherwise, great video! Hoping to see more content!

@AkiiiMatcha

Is this video AI generated?

@Brecht824

2 factor authentication + very strong passwords eliminate brute force attacks.

@ArivuShodhGyan

Good Video man . Hope to see more videos like this

@iconic_patel

sit back, relax and enjoy is intro of BroCode!!!!!

@iblackfeathers

this is not β€œevery” technique. this is encapsulating common techniques but i am not sure of the order or categories here. maybe start off by defining what you mean by technique because some of these are more like categories and not specific techniques or methods. and it appears to be all over the map.

for example of the order or categorisations, you mentioned xss but then later mentioned cssrf and ssrf which are generally in the vicinity of of each other in discussions.

it’s like throwing the kitchen sink but there are holes. for example, you mentioned firmware hacking but that is a category not a specific technique like fuzzing or glitching. 

generally speaking, new techniques are always being developed and some based off older ones, i would find it hard to make specific distinctions.

physical attacks using various methods of physical security bypass are not mentioned. there is more to it than social engineering. sometimes studying up on building ordinances or using physical recon is a valuable category with various techniques before an actual engagement.

also, security is always changing and you cannot expect there to be all there is, clearly defined.

@NewYork-i2w

It's  good to learn knowledge is power.

@TotalTech2.

Where did you get this stock footage from?

@SCP_Fan

Yo, i realized something with your content like on this video, do you please mind explaining? So at some parts of the video the voice mispronounces or stalls while trying to narrate something, this gave me suspicion that you are using TTS (Text To Speech) and the speed randomly increases at random timestamps of the video, please dont take this comment as something personal i'm just confused and i'm trying to get as much information as i can regarding cyber security and your channel being my top watched one regarding cyber security. Keep up the epic work btw!

@robertklund3201

Add to that rogue wifi hotspots; the opposite war driving.

@bibs998

To become a professional hacker, you most pass through excellent ethical hacking to test your craft before production.

@lilislilit

Good info on the keylogger stuff, was sad to know that I am affected by that:buffering:

@vikrantvijit1436

Thanks πŸ™πŸ‘ for overview of persistent threats in digital hacking engineered social environment shadowing ICT.😊

@hakankosebas2085

What happened in lebonan with pagers? I wanna know technical side of incident from you