Alexis you are rocking your content
hey man im new in this world , nice work please keet it going never stop <3 thx for all ur vids ..
Man this serious is awesome...
you are amazing, and tnq for sharing your knowlage , absolutle better then what I learn in collage XD
Keep going man ... Content is 🔥
Very well explained and informative. In the john the ripper part, there are some hashes that are not valid, so l would delete them before trying the cracking.
Its very informative content. Thanks a lot brother
Love your content. Thanks!
Great content!
nice work bro
Valuable
I think from win 10, they kinda start to encourage people to use their MSFT or Hotmail credentials in order to login into their machines.
As usual, I tested in my lab with the latest updated version of Windows 10. First, it's necessary to make sure to migrate to a 64-bit process with administrator privileges. Initially, I migrated to explorer.exe and nothing worked, then after switching to lsass.exe things changed. In conclusion, I can say that today: Mimikatz, Meterpreter's HashDump command, the Kiwi module, and the credential_collector module work perfectly. The Unattend.xml file is not in the Panther folder. WCE does not work with any parameters. The real problem is creating a payload with MSFvenom that is not detected by Windows Defender to start the attack. Both Shikata Ga Nai and Shellter are immediately detected. Regarding Starkiller, it's easy to evade Windows Defender with Invoke-Obfuscation. The problem is that Windows Defender block the powershell/privesc/bypassuac module. In any case, thank you so much Alexis for this latest fantastic (free) lesson! Your work is invaluable!
sir, I'm not able to install metasploitble 2 on my kali Linux , I've been trying for 3 days, I know there is a tutorial on your channel that how to install metasploitble 2, but that was on windows OS, please make a video on installing ms2 on kali Linux, I've stuck on your series (web app penetration testing). Please solve it for me, thank you ❤️
Make a video on payload crypters to bypass av detection of Android and windows.
My soul is mengheker
Hasn't mimikatz been replaced by or integrated into kiwi?
Now do it on win server 2019
Need Part 1 registration link
@Cybersecomar