Proxmox

he hacked my websites



🔥🔥Join the NetworkChuck Academy!:

In my last video, I built 24 websites in 24 hours. 🚀 But with such a rapid development sprint, I knew security might have taken a backseat. So in this video, I decided to don my hacker hat and attempt to penetrate my own sites using tools like Nikto, OWASP Zap, Burp Suite, and Snyk. Spoiler alert: I didn’t find much. 😅

Realizing my limitations, I called in reinforcements—my friend and professional ethical hacker Tyler Ramsbey. Tyler took the wheel and performed a thorough penetration test on my websites, uncovering vulnerabilities I had completely overlooked. From exposed API keys to cross-site scripting (XSS) and even accessing hidden admin panels, Tyler shows us how a real hacker would exploit these weaknesses. 😱

Along the way, we discuss how tools like LLMs (Large Language Models) can be both a blessing and a curse in cybersecurity, aiding both defenders and attackers. 🛡️⚔️

Subscribe to Tyler Ramsbey:

SUPPORT NETWORKCHUCK
—————————————————
➡️NetworkChuck membership:
☕☕ COFFEE and MERCH:

Check out my new channel:

🆘🆘NEED HELP?? Join the Discord Server:

STUDY WITH ME on Twitch:

READY TO LEARN??
—————————————————
-Learn Python:
-Get your CCNA:

FOLLOW ME EVERYWHERE
—————————————————
Instagram:
Twitter:
Facebook:
Join the Discord server:

AFFILIATES & REFERRALS
—————————————————
(GEAR I USE…STUFF I RECOMMEND)
My network gear:
Amazon Affiliate Store:
Buy a Raspberry Pi:
Do you want to know how I draw on the screen?? Go to and use code NetworkChuck to get 20% off!!
fast and reliable unifi in the cloud:

Ethical hacking tutorial
Penetration testing your own website
Website security vulnerabilities
How to hack your own site ethically
OWASP Zap tutorial
Using Nikto for server scanning
Burp Suite Pro walkthrough
Exposing API keys risks
Cross-site scripting (XSS) explained
SQL injection prevention
Snyk code analysis tool
Static Application Security Testing (SAST)
Guardio browser security extension
Ethical hacking tools and techniques
Preventing data leaks online
Secure coding practices
Vulnerability scanning with Nuclei
WordPress security flaws
Exposed .git directories dangers
Fixing open redirects
Cybersecurity best practices
Learning ethical hacking with Tyler Ramsby
Securing API endpoints
Protecting your website from hackers

#hacking #cybersecurity

[ad_2]

source

Related Articles

49 Comments

  1. 🔥🔥Join the NetworkChuck Academy!: https://ntck.co/NCAcademy

    In my last video, I built 24 websites in 24 hours. 🚀 But with such a rapid development sprint, I knew security might have taken a backseat. So in this video, I decided to don my hacker hat and attempt to penetrate my own sites using tools like Nikto, OWASP Zap, Burp Suite, and Snyk. Spoiler alert: I didn't find much. 😅

    Realizing my limitations, I called in reinforcements—my friend and professional ethical hacker Tyler Ramsbey. Tyler took the wheel and performed a thorough penetration test on my websites, uncovering vulnerabilities I had completely overlooked. From exposed API keys to cross-site scripting (XSS) and even accessing hidden admin panels, Tyler shows us how a real hacker would exploit these weaknesses. 😱

    Along the way, we discuss how tools like LLMs (Large Language Models) can be both a blessing and a curse in cybersecurity, aiding both defenders and attackers. 🛡⚔

    Subscribe to Tyler Ramsbey: https://www.youtube.com/@TylerRamsbey

  2. I learned what "sanitizing user input" meant when I tried to figure out why a now defunct social media site that for some reason allowed HTML in posts would change "Runescape" into Rnotallowed". It was "sanitizing" some javascript.

    That led me into breaking forms and making buttons do different things on the page. Like instead of deleting my vulgar comment, it deleted a group of 30k+ people.

    Teenager me was annoying. And maybe a little criminal. Just ask those old guys that thought I was 12, and female, and needed prepaid cell phone minutes. And then my account logged out and they never saw me again. I was 14, and male. And I did in fact need prepaid cell phone minutes, but not to call them.

  3. Hey Chuck can you make a video on how to find secrets on people like hack in their phones and discover secrets don't worry i just want to learn how because I want to become a ethical hacker

  4. I did a full-blown pen test on a company I consult for. The admins were so pissed at me after I found over 256 vulnerabilities in their system. They were claiming there wasn't any and were adamant that I was wasting my time. Granted some where minor ones but there was some really bad ones. That opened up to get their data stolen. I love doing these especially with self-entitled admins who think they are better than everyone. 🤣🤣

  5. Chuck, you saying you are not allowed to hack me I really don’t like because it makes it sound like you’re saying I can’t access the information you have that is Public but do understand private information

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button