Channel Avatar

Unarmed Warriors @UCUe_ifoicyIE5hmjVXhDLkQ@youtube.com

9 subscribers - no pronouns :c

"A world where every person has access to equal opportunitie


01:17
AI & Marketing: The Future is Now
01:02
How AI Changing The Marketing Landscape
01:49
What is the roles are carried out by the Domain Controller? (multiple choice)
02:03
Active Directory can be exploited without using patchable exploits?
02:31
How is Active Directory authentication handled?
02:05
What step comes after controlling the EIP?
01:37
What is the aim of spiking?
01:34
During a Buffer Overflow attack, once the buffer space is full, what can we potentially overwrite?
01:41
What does a tool like FoxyProxy let us do?
01:30
What methods of exploitation use weak or known credentials? (multiple choice)
02:24
Which of the following are staged payloads? (multiple choice)
01:27
Which of the following does Nessus support? (multiple choice)
01:40
What tools can be used for researching vulnerabilities? (multiple choice)
01:17
In Metasploit, which module option should be used to assign your target address?
01:39
Dirbuster is a tool that can discover directories available on a web server
01:58
What service does nikto typically target?
01:48
Which flag can we use to initiate a UDP scan with nmap?
01:46
What popular tool can we use to intercept and modify website traffic?
01:30
What can the browser add-on Wappalyzer potentially allow us to see? (multiple choice)
01:24
What can the browser add-on Wappalyzer potentially allow us to see? (multiple choice)
01:30
What can we use hunter.io to find?
01:54
If the Rules of Engagement state that google.com is in scope which of the following legally attack?
01:37
Which of the following tools can be used for target validation? (multiple choice)
01:16
After Scanning & Enumeration, the next step is…
05:02
How AI Generates New Customers and Icreases Total Income - Poker
01:18
Which of the following are types of reconnaissance? (multiple choice)
01:05
Which of the following are immutable?
01:26
How can we add the comment ‘this prints hello world’ to a python script?
01:05
What command can be used to install the package lolcat?
01:20
What command can be used to start a web server with Python?
01:02
What command can be used to start a web server running Apache?
01:48
Which command can we use to achieve the permissions of `rwx --x --x`?
01:07
What does the file permission `rwxr- -r- - kali kali` mean?
01:32
How can you see your previous commands? (multiple choice)
01:09
What command can we use to find out more about the command `time`?
01:11
How can we clear the current terminal? (multiple choice)
01:13
What does the command `pwd` do?
01:18
What is the default login for Kali Linux?
01:24
What flavor of linux is Kali based on?
01:06
What popular software can we use to run virtual machines? (multiple choice)
01:33
Which two addresses would be typically reserved in the IP range 192.168.0.1/24?
01:45
The subnet mask for /16 is…
01:10
As the CIDR number increases (e.g. from /24 to /25), the number of hosts in a subnet…
01:40
What is the correct order for the OSI model?
01:21
If your router is both layer 2 and 3, which two functions it performing?
01:05
Which TCP protocol is commonly found on port 21?
01:45
Which of the following demonstrates the three-way handshake?
01:20
Which protocol is connectionless?
01:31
The first six hexadecimal digits of a mac address tell you…
01:37
Which layer of the OSI model do Media Access Control (MAC) addresses use?
01:11
Which class of network is 10.0.0.0?
01:36
Which technology prevents us from running out of IPv4 addresses?
01:37
Which layer of the OSI model do IP addresses use?
01:23
Why is it important to take good notes? (multiple choice)
01:52
When is the best time to take notes? (multiple choice)
01:24
Physical pentests can be conducted remotely over the internet
01:44
Wireless pentests focus on…
02:23
Which guideline can we use for web application penetration testing?
01:42
Internal pentests focus heavily on…
01:31
An internal pentest is…