Vuoi vederlo di nuovo più tardi?
Accedi per aggiungere questo video a una playlist.
Accedi
Get your 10% discount here: https://www.offsec.com/review/david-pwk-2023/
Disclaimer: I was NOT paid for this interview. I wanted to make this video because it affects many of you watching and is a major topic on the OSCP exam. However, OffSec did give me access to Learn One for one year so I could see the course content. This has helped me prepare for the interview. Hopefully I'll be able to make more content covering what is in the PEN 200 course in future :)
// Documentation //
Changes: https://www.offsec.com/offsec/pen-200-2023/
Course: https://www.offsec.com/courses/pen-200/
// Offsec //
Twitter: https://twitter.com/offsectraining
Website: https://www.offsec.com/
LinkedIn: https://www.linkedin.com/company/offsec-training/
// Remi's SOCIAL //
LinkedIn: https://no.linkedin.com/in/remi-solberg-8991b910a
// David's SOCIAL //
Discord: https://discord.gg/davidbombal
Twitter: https://www.twitter.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
TikTok: http://tiktok.com/@davidbombal
// MENU //
00:00 - Coming up
01:31 - Disclaimer
01:57 - Remi Solberg introduction & background
03:37 - Jump to a timestamp (check in description below)
03:57 - Simulated full-scale penetration test demo // Hacking Windows
05:12 - OffSec Learn One discount!
06:22 - Penetration test demo
09:38 - Documentation & enumeration // Prepping for penetration test
23:25 - Penetration test demo // Accessing users
30:10 - Privilege escalation
37:44 - Using ICACLS (Integrity Access Control Access List)
43:59 - Privilege escalation (continued)
52:14 - Getting around obstacles // Social engineering
53:23 - Privilege escalation (continued)
57:19 - Stealing credentials
59:11 - Using Mimikatz tool // Kerberos and NTLM Authentication (theory)
01:07:33 - Mimikatz tool demo
01:06:05 - Penetration test demo (continued) // Exposing passwords & credentials
01:23:25 - What a malicious hacker would do
01:25:55 - The "Golden Ticket" // How to forge a ticket
01:45:07 - Demo summary & tips
01:48:05 - Conclusion
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: [email protected]
oscp
pen-200
offsec
offensive sercurity
pentest
pentester
hack
hacker
hacking
ethical hacking
ethical hacker course
ethical hacker
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
Disclaimer: This video is for educational purposes only.
#hacker #pentester #oscp
Vuoi vederlo di nuovo più tardi?
Accedi per aggiungere questo video a una playlist.
Accedi
When the theoretical physicist Leonard Susskind encountered a head-scratching paradox about black holes, he turned to an unexpected place: computer science. In nature, most self-contained systems eventually reach thermodynamic equilibrium ... but not black holes. The interior volume of a black hole appears to forever expand without limit. But why? Susskind had a suspicion that a concept called computational complexity, which underpins everything from cryptography to quantum computing to the blockchain and AI, might provide an explanation.
He and his colleagues believe that the complexity of quantum entanglement continues to evolve inside a black hole long past the point of what’s called “heat death.” Now Susskind and his collaborator, Adam Brown, have used this insight to propose a new law of physics: the second law of quantum complexity, a quantum analogue of the second law of thermodynamics.
Read the full article at Quanta Magazine: https://www.quantamagazine.org/in-new-paradox-black-holes-appear-to-evade-heat-death-20230606
Also appearing in the video: Xie Chen of CalTech, Adam Bouland of Stanford and Umesh Vazirani of UC Berkeley.
00:00 Intro to a second law of quantum complexity
01:16 Entropy drives most closed systems to thermal equilibrium. Why are black holes different?
03:34 History of the concept of "entropy" and "heat death"
05:01 Quantum complexity and entanglement might explain black holes
07:32 A turn to computational circuit complexity to describe black holes
08:47 Using a block cipher and cryptography to test the theory
10:16 A new law of physics is proposed
11:23 Embracing a quantum universe leads to new insights
12:20 When quantum complexity reaches an end...the universe begins again
Thumbnail / title card image designed by Olena Shmahalo
- VISIT our Website: https://www.quantamagazine.org
- LIKE us on Facebook: https://www.facebook.com/QuantaNews
- FOLLOW us Twitter: https://twitter.com/QuantaMagazine
Quanta Magazine is an editorially independent publication supported by the Simons Foundation: https://www.simonsfoundation.org/
#quantum #blackhole #physics #entanglement #computerscience #cryptography
Vuoi vederlo di nuovo più tardi?
Accedi per aggiungere questo video a una playlist.
Accedi
Check out https://Guard.io/ScammerPayback for a 7 day trial and 20% off your subscription + the ability to protect 5 family members from hackers and scammers!
Help us fight these scammer! Become a member today:
https://www.youtube.com/channel/UCC9EjyMN_hx5NdctLBx5X7w/join
#scammers #scambait #scam
All of our Socials!
Become a member: http://bit.ly/3uRvoEy
Patreon: http://bit.ly/30cINZL
Facebook: https://www.facebook.com/PierogiSP
Twitch: http://bit.ly/3bgVGrX
Twitter: https://bit.ly/3c00Jw5
Instagram: https://bit.ly/3c0ZnkS
Scammers typically target the elderly and attempt to steal money by several means.
1. Your Bank Saving or Checking accounts
2. Investment accounts or 401k retirement funds
3. Credit and Debit cards
4. Purchasing Gift cards
5. Cash withdrawals
6. Cryptocurrency
Scammers are ruthless criminals that have no problem stealing every last dime from their victims bank accounts. Please protect yourself as well as family members who might not be familiar with these type of scams.
Vuoi vederlo di nuovo più tardi?
Accedi per aggiungere questo video a una playlist.
Accedi
Subscribe to our channel - http://bit.ly/ReYOUniverse
Imagine a creature that has three hearts pumping blue blood through the vessels.
Although it has an almost amorphous body resembling a bag of water, it can easily open a bottle, even a baby-proofed one.
It can feel light or even taste with its skin!
It has no ears, but it hears well even in the infra range.
It can instantly change color and texture, becoming indistinguishable from the environment. Even though it doesn’t identify colors at all and sees the world in black and white.
It’s venomous and can be hostile, but at the same time, it’s curious and even playful.
On top of that, it’s highly intelligent and can solve non-trivial problems.
In addition to the main brain, it has EIGHT smaller brains in different parts of the body. And these additional brains make their own decisions!
Who is this monster? Does it come from Earth?
Yes, you got that right.
It’s an octopus.
And, of course, it comes from our planet.
Although… Some scientists entertain another idea.
But first things first.
The Mystery of Octopus.
#octopus #reyouniverse
Vuoi vederlo di nuovo più tardi?
Accedi per aggiungere questo video a una playlist.
Accedi
https://www.facebook.com/carlthepianist
Any electrical spark creates radio waves and acts as a transmitter. You hear sparks on a radio as interference. That's why lighting makes radios crackle, and even the tiny spark in a switch is enough to make a noise on the radio when turning on a light.
Accompanying Sheet:
http://www.secretlifeofmachines.com/images/radioset.gif
Please see http://www.secretlifeofmachines.com for more information
Thanks to Tim Hunkin the creator for allowing these excellent videos to be freely distributed on-line.