InfoSec
-
Proxmox
Como Instalar Windows Server 2022 (LAB)
Neste vídeo, vamos mostrar passo a passo como instalar o Windows Server 2022, utilizando o VirtualBox e o Proxmox como plataformas de virtualização para construir nosso laboratório de estudos. Vamos abordar desde o download da ISO, criação das VMs e diferentes tipos de instalação, até as configurações pós-instalação do Windows Server. 🚀 Se você é entusiasta de cibersegurança e quer…
Read More » -
VMware
WinRAR Exploited To Encrypt Windows & Linux – New Ransomware Strategy?!
Researchers have uncovered a critical vulnerability in the widely used WinRAR tool that hackers are exploiting to deploy ransomware across both Windows and Linux systems. In this video, we dive into how hacktivist group Head Mare is using this flaw, known as CVE-2023-38831, to encrypt data, targeting industries in Russia and Belarus with sophisticated ransomware like LockBit and Babuk. We’ll…
Read More » -
Linux
“Kali Linux 2024: | Quick Tips for Ethical Hacking Beginners” #shorts #viral #kalilinux #computer
Here’s a concise and engaging description for a Kali Linux shorts video on the MMOC YouTube channel: Unlock the Power of Kali Linux in 60 Seconds! | MMOC Shorts Dive into the world of Kali Linux with this quick guide! Learn the top commands, tools, and tricks every ethical hacker needs to know. Whether you’re a beginner or an expert,…
Read More » -
workstation
How to install Kali Linux 2024.3 Latest on VMware Windows | Step-by-Step Guide
In this video, I’ll walk you through the entire process of installing the latest Kali Linux 2024.3 on VMware. Whether you’re new to virtual machines or just looking to get the latest version of Kali Linux running, this detailed step-by-step tutorial will make it easy. From downloading the ISO to setting up the virtual machine and customizing hardware settings, we’ve…
Read More » -
Linux
Demonstrating the New Linux Exploit (9.9 CVSS)
A deep dive into CVE-2024-47176, CVE-2024-47076, CVE-2024-47175, and CVE-2024-47177. A remote unauthenticated attacker can silently replace existing printers or install new ones with a malicious one, resulting in arbitrary command execution (on the computer) when a print job is started. Timestamps: 0:00 – Introduction 1:45 – Vulnerability Overview 5:50 – Shodan Impact 7:04 – What is CUPS? 8:15 – The…
Read More » -
Linux
#2 How to build a HACKING lab : Install Kali Linux in Minutes!
🚀 Welcome to Your Hacking Journey! 🚀 In this video, we’ll guide you through the entire process of installing Kali Linux—the go-to operating system for ethical hackers and cybersecurity professionals. Whether you’re a complete beginner or looking to refresh your skills, this tutorial is designed to be straightforward and easy to follow. 🌐 Why Kali Linux? Kali Linux is equipped…
Read More »