@amalpb1811

Course Contents
(0:00)-Course Introduction/whoami
(6:12) - Part 1: Introduction, Notekeeping, and
Introductory Linux
(1:43:45) - Part 2: Python 101
(3:10:05) - Part 3: Python 102 (Building a Terrible Port
Scanner)
(4:23:14) - Part 4: Passive OSINT
(5:41:41) Part 5: Scanning Tools & Tactics
(6:56:42) - Part 6: Enumeration
(8:31:22) - Part 7: Exploitation, Shells, and Some
Credential Stuffing
(9:57:15) - Part 8: Building an AD Lab, LLMNR
Poisoning, and NTLMV2 Cracking with Hashcat
(11:13:20) - Part 9: NTLM Relay, Token Impersonation,
Pass the Hash, PsExec, and more
(12:40:46) - Part 10: MS17-010, GPP/cPasswords,
and Kerberoasting
(13:32:33) - Part 11: File Transfers, Pivoting, Report
Writing, and Career Advice
Thanks for the likes its right there on the description tho😅

@HandledToaster2

Wow, can't believe you skipped over the chapter where you have to wear a black hoodie and type words into a black screen with green text in the dark, it's the most important part

@charlie3k

FIFTEEN hours on ethical hacking tutorials, for free? You guys are amazing!

@bud384

4:34 => passive recon (target validation, finding subs, fingerprinting, data breaches)
4:45:46, 4:48:15, 4:51:11-4:57:40 => password analysis repo, the parser for that repo, and testing
5:11:57 => theharverster

@MrTVx99

Parents: You can watch one video before you go to bed

@emittlame8095

It's crazy we live in a time where this information is so accessible. I love it.

@dordan9987

Imagine putting 15 hours plus editing time plus set up and whatever else just to help people get into something you like. What a cool guy

@technicalknownledge1121

⌨ (0:00) - Course Introduction/whoami
⌨ (6:12) -  Part 1: Introduction, Notekeeping, and Introductory Linux
⌨ (1:43:45) - Part 2: Python 101
⌨ (3:10:05) - Part 3: Python 102 (Building a Terrible Port Scanner)
⌨ (4:23:14) - Part 4: Passive OSINT
⌨ (5:41:41) - Part 5: Scanning Tools & Tactics
⌨ (6:56:42) - Part 6: Enumeration
⌨ (8:31:22) - Part 7: Exploitation, Shells, and Some Credential Stuffing
⌨ (9:57:15) - Part 8: Building an AD Lab, LLMNR Poisoning, and NTLMv2 Cracking with Hashcat
⌨ (11:13:20) - Part 9: NTLM Relay, Token Impersonation, Pass the Hash, PsExec, and more
⌨ (12:40:46) - Part 10: MS17-010, GPP/cPasswords, and Kerberoasting
⌨ (13:32:33) - Part 11: File Transfers, Pivoting, Report Writing, and Career Advice 
❤❤

@yasspmc

I can't believe we're getting this for free.

@torpezaincreible8692

I just learned how to print("hello world") and I'm watching this

@dg9158

God bless you, there are so many people trying to learn because they don't have the resources to pay for education and people like you that put this stuff up for free are really a blessing. Thank you very much.

@raphaeldouglas9361

Successful people don't become that way overnight. What most people see at a glance-wealth, a great career, purpose-is the result of hard work and hustle over time.

@IndustryOfMagic

My first pause after 8 hours in. 
Note to self: I don't remember anything, don't do it again.
Improvement tip: Watch in parts of 1-2 hours each time.

@BSimone95

So, what did you do today?
Nothing much, watched a video on youtube and went to bed.

@siphyshu2690

25:32 new default username-password for kali 2020.1:  kali and kali

@DatYpsi

Thank you a lot for this video! 
Hint: The reason why you get the "cannot open display" error if you are on a shell with root user is: you are calling the applications as root user. There is no gnome session open for root. You just have to call the applications with your default logged in user.

@alexandersokolov7001

When mom checks your browsing history and sees *penetration testing”

@blowsmoke7218

Thank you for this.... My girl friend is very pleased with my new found capabilities of penetration.

@Ashukhan-vq6et

Damm, in my life is 27years using YouTube since I was in high school, i found this channel very useful..... And really very useful love you bro