Home
Videos uploaded by user “Network Heros”
How to check Windows Genuine or Cracked ? (windows 10 genuine or not)
 
03:07
In this video, I demonstrate you how to know if your Windows Operating system is Genuine or cracked or activated using a activator software. You might wonder how you can find the difference between activated and genuine operating system. Just watch it till the end, you will be amazed to know your Windows Operating system. Generally, we check for product id and license status of our windows operating system by right clicking on ‘This PC’ or My Computer icon and clicking on the ‘Properties’. There, at the end in ‘Windows activation’ section we can see that this Windows is activated and given is the product ID. This is activated windows using KMS activator software. All windows, whether it is genuine or activated, it looks like the same in the system properties window. So how to know the actual status. Just watch it ! I will show you everything. Type slmgr.vbs /dli and press enter. Here slmgr stands for Software License Manager and the .vbs stands for Visual Basic Script. You can see the license status is ‘Licensed’ and Volume activation expiration is 88 thousand 503 minutes which means 62 days. If the time, expiration date, renewal interval and these types of information is given in the script, you should know that the windows is activated using an activator software. If you see only ‘Partial Product Key’ and the ‘License Status’ is displayed. No expiration time or anything else. From this you should understand that the Windows Operating system is Genuine. For more: Visit our Website for other articles : http://networkheros.com/ Like us on Facebook : https://www.facebook.com/NetworkHeros/ Twitter: https://twitter.com/NetworkHeros Find my courses on Udemy : https://www.udemy.com/prepare-rhcsa-ex-200-exams-with-real-exam-practice-test/
Views: 9175 Network Heros
RHCSA : Reset root password in RHEL 7 (very easy steps)
 
02:47
In this lecture, you will learn how to reset root password in RHEL 7. You will interrupt boot process and reset new password as you want to. In the real exam, you will have to break the root password of RHEL7 virtual machine and set hostname and IP addresses to get the questions.
Views: 1741 Network Heros
Ethical Hacking (CEH v10) : RouterSploit Framework | Assess Router Vulnerability |  Exploit Router
 
07:47
Hi guys! welcome to yet another video of Ethical Hacking training series. In this video I am going to demonstrate you how to user RouterSploit Framework to find vulnerabilities in a router. The RouterSploit Framework is an open-source exploitation framework. It consists of various modules that performs router penetration testing operations like, exploits, credentials, scanners, payload and generic. -Get the Framework from github : https://github.com/threat9/routersploit -Git clone in your Kali Linux Machine -Before running the framework, you need to have ‘python’ installed as a prerequisite because the framework is developed in python programming language. So install the python3. -Now install some of the dependencies of RouterSploit framework. For this, python3 -m pip install -r requirements.txt. Here, -m means library module, pip is the tool for installing and managing python packages, -r for install from the given requirements file. So the command says that install the dependencies as stated in the requirements file. -Search autopwn. Autopwn is a metasploit browser that is used to test browser vulnerabilities. You can see it’s under Scanners. Use it. -Search for the exploits or credentials or anything else that is available for my router brand that is ‘tplink’. Run the ‘ssh default credentials finding script. Now, type ‘use’ copy and paste the script and hit enter. For more watch the video till the end. For other video tutorials and articles : Visit our Website for other articles : http://networkheros.com/ Like us on Facebook : https://www.facebook.com/NetworkHeros/ Twitter: https://twitter.com/NetworkHeros Find my courses on Udemy : https://www.udemy.com/prepare-rhcsa-ex-200-exams-with-real-exam-practice-test/
Views: 6349 Network Heros
Ethical Hacking (CEHv10) : Configure Proxychains in Kali 2018.2
 
09:57
In this Ethical hacking tutorial, I demonstrate how to configure Proxychains in Kali 2018.2. Proxychains is one of the most commonly used methodology to stay anonymous while pentesting or testing a network or system of a company. Well, Proxy server is a server that acts as a middleman between you and the end server you are requesting services from. During a HTTP connection, your IP address is necessarily transmitted as a source IP in order to get information from the destination server. The destination network or the server can gather your personal information through your unique IP given to you by your service provider (ISP). By the information, they can monitor your interest upon requesting the server, spy upon you and log your requests for further analysis. Here the proxy server hides your actual unique IP. Instead of directly forwarding your requests to the end server, your browser contacts the proxy server and proxy server forwards your request to the actual server. In the similar fashion, the end server also responses back to the proxy server and proxy server sends reply to your server. This prevents direct communication between the client and the destination server. So you can’t be traced. If anyone wants to trace you with the end server logs, they can only trace the logs of the proxy server if it stores otherwise NOT. So, anonymous proxy server can protect your identity. So, what is the difference between proxy server and proxychains ? Proxy server is actually a HTTP proxy which will basically anonymize http connections or web connections or the things that you are doing on the internet, whereas proxychains or Socks proxy anonymize socket connections operating at an application level. That means proxychains anonymize all the things that you are doing. Now, let’s see how to configure proxychains in Kali Linux. Here, you can see, proxychains version 3.1, this allows HTTP, SOCK4 and SOCK5 tunnelling. The dynamic chain means that each connection will be done via chained proxies. All proxies chained in the order as they appear in the list and at least one proxy must be online. With dynamic chain there is no possibility of being disconnected with proxies. So it is one of the most preferable ones. So, let’s uncomment ‘dynamic_chain’. It works only when you uncomment it by removing the hash. With ‘strict_chain’ there is possibility of loosing connection with proxies since all the proxies must be online throughout the connection. ‘Random_chain’ is considered as the worst proxy configuration type so disable it. Okay, that’s all for now. Hope you guys found it useful. Thank you for watching this video, see you in the next, until then have a nice time good bye.
Views: 1446 Network Heros
RHCSA : Install Red Hat 7 ( GNOME Desktop Packages )
 
05:36
Easy step by step guide to install red hat 7 GUI. I am teaching here very easily and clearly to install GNOME Desktop packages in Red Hat Enterprise Linux 7.
Views: 2370 Network Heros
Hack with zANTI Vulnerability Assessment & MITM (Android Hacking) #Part-II
 
04:58
In this Ethical Hacking (CEH v10) video tutorial series, I will show you how to perform Man-In-The-Middle attack with an android phone and an application named zANTI. This video is part 2 of zANTI. For zANTI installation and scanning vulnerabilities, please refer to the part-I video. The link of part-I video is : https://www.youtube.com/watch?v=Xl3rgXEwbp8 Always use this for penetration testing on your own network or do it after getting permission from authorized person.
Views: 1226 Network Heros
Ethical Hacking (CEH v10) : Metasploit (Basic Commands) | System Hacking
 
06:06
We are in the Metasploit Section and in this video, I am going to demonstrate you some basics of Metasploit Framework. It is mostly used for system hacking. Metasploit is the world’s most used penetration testing framework developed by Rapid7 which helps you to act like the attacker. With this framework, you can uncover weaknesses in your defenses, focus on the highest risks and improve your security. In addition to this, you can test your target as a black hat hacker being white hat hacker. Metasploit is a tool for developing and executing exploit code against a remote target machine. So, let’s know the basics of the Metasploit framework by running it’s basic commands. To run the framework, type ‘msfconsole’ in the Kali Terminal. To see the framework version, type ‘version’. The framework is 4.16.48 and the same is the console. Type ‘help’ to see the overview of Metasploit core and backend command with their description. To change the banner, type banner and hit enter.. For information and usage of ‘show’ command, type ‘show -p’ option. Here, you can see the valid parameters with the ‘show’ command that are , all, encoders, nops, exploits, payloads, auxiliary, plugins and some others. Also, show option can be used inside some module-specific parameters like targets, actions and so on. If you want to see all the exploits, type ‘show exploits’. Similarly run ‘show payloads’ to show all the payloads available in the Metasploit. You can see payload lists for different Operating System platforms with different architecture, protocols and versions. The ‘show’ is very useful command in Metasploit Framework. Another very useful command is ‘search’.Run search command with -h option. Here, you can see the keywords that become helpful while searching the specific thing. You can customize your search with a parameter with these keywords. We can see example about this at the end of the keywords. For more : Please watch the video tutorial till the end. For More about us : Visit our Website for other articles : http://networkheros.com/ Like us on Facebook : https://www.facebook.com/NetworkHeros/ Twitter: https://twitter.com/NetworkHeros Find my courses on Udemy : https://www.udemy.com/prepare-rhcsa-ex-200-exams-with-real-exam-practice-test/
Views: 706 Network Heros
Inject Undetectable (100%) payload into an EXE File (Windows 10 Hacking)
 
08:42
Hi ! Welcome to Ethical Hacking (CEH v10). In this video, I am going to demonstrate you how to combine or inject a payload in an exe file. I will use shelter program for this. You can easily hack windows 10 using this method. The payload you use is undetectable to any Anti-Virus Program. Download shellter from the official website which is shellterproject.com : https://www.shellterproject.com/download/ Shellter is a dynamic shellcode injection tool. It can be used in order to inject shellcode into native Windows applications such as winrar or any other executable program. The shellcode can be something yours or something generated through a framework, such as Metasploit. We will inject a payload generated by using veil into an executable file. With shelter, when you combine a payload, you will be able to get the reverse connection from the target computer once the target user executes it. Steps:- -Download shellter and run it with wine program -Download an EXE file and use shellter to inject it's code into the EXE file -Set Listener with msfconsole -Deliver the file to the target. -Let the target execute the program -You will get full control over the target system. For more others: Visit our Website for other articles : http://networkheros.com/ Like us on Facebook : https://www.facebook.com/NetworkHeros/ Twitter: https://twitter.com/NetworkHeros Find my courses on Udemy : https://www.udemy.com/prepare-rhcsa-ex-200-exams-with-real-exam-practice-test/
Views: 1128 Network Heros
Ethical Hacking (CEH v10) : IP Spoofing with Colasoft Packet Builder | Create custom packets
 
05:38
Welcome to Networkheros.com. In this video I am going to show you how attacker use ping spoofing. I am going to use Colasoft packet builder tool for this demonstration. Using the colasoft tool, attackers not send ICMP request with an spoofed IP address but also can create custom network packets and send over a network as a valid request. This tool is not useful only for attackers but also is very useful for security professionals to check their network protection against attacks and intruders. In this demonstration, I will show you how to use the colasoft tool and how to spoof ping request and send it to the target. Let me make it clear from this topology about what I am going to show you. Here I have 3 hosts in the same network. The PC2 with the IP address 192.168.132.130 is the attacker and the PC 1 with IP address 192.168.132.132 is the target machine. The PC 3 with IP address 192.168.132.64 is a valid user in the network. The attacker will capture ICMP packets heading towards PC1, modify the packets source IP address with another IP and check if the target sends ICMP echo reply. So, let’s see how it happens. I am in the Windows 10 machine which I am using as the attacker machine and if I check the IP address of the machine, it’s 192.168.132.130. Here I have another machine, Windows Server 2012 which I assume is the target machine. Let me check the IP address of the target machine. It’s 192.168.132.132. Now from the Windows 10 machine, let’s capture some packets going towards the Server machine. Let’s open Wireshark. Click on the blue button to start capturing packets. Open command prompt window and generate some ICMP echo request packets to the Windows Server 2012. Go back to wireshark window, stop capturing, Click on to ‘Save the capture’ to a file, give it a name and save. You can see the capture file in the desktop. Now Right click on the Colasoft short -cut icon in the desktop, Click on ‘Run as Administrator’, Click on ‘Yes’, Close the advertisement. Click on Import button, select the ping_capture file and open it. Let me maximize the window. Here I am going to remove all the other packets except the ICMP Echo request. I remove the TCP and HTTPS packets. Also, remove the ICMP echo reply packets because I don’t want to send reply packets. I get rid of the ARP response packets as well and I remove two of the ARP requests and put only one ARP request. Now, I am going to modify the source address 132.132 to 132.64. Click on the source number 1, find ‘Source IP” in the Decode Editor and replace it with 192.168.132.64. Similarly, go to the second packet, replace the last number 132 with 64. Do the same for packet number 3 and 4. Now for the ARP packet as well, change it’s source IP as dot 64. Select all the packets. Go to the target machine i.e. windows server 2012 and run the wireshark program. Click on the blue button to start capturing. Again, go back to Windows 10 machine, In the colasoft window, click on ‘Send All’ button. Click on select to choose the Interface. The correct interface is already selected. Click on OK and then click on ‘start’ button. Now, go to Windows server, analyze the packets in wireshark. As you can see, the host is replying to the host with dot 64 IP address. But actually, the packet is being generated from dot 130. Okay friends ! This is just a simple example of how spoofing is done. In the similar way attackers can spoof custom packets to gather information from the target host or network. So security professional should be aware of it and implement spoofing detection mechanism. That’s all for now. Thank you very much for watching this video. See you in the next. Until then have a nice time goodbye !
Views: 209 Network Heros
Ethical Hacking (CEHv10) :Intercept HTTPS (SSL) traffic with Burpsuite
 
03:14
In this Ethical Hacking video tutorial, I am going to show you how to configure Burp suite and our browser to intercept HTTPS traffic. You can intercept SSL traffic using Burp suite easily. For this, you have to export an ssl certificate and add it to the browser. Please refer to the previous video for installing burpsuite and configure proxy in it. I would like to thank you very much for watching this video. Hope you guys found it useful. Please comment your feedback and subscribe our channel. See you in the next video, until then have a nice time good bye.
Views: 351 Network Heros
RHCSA : Install Red Hat Enterprise 7 (baseline)
 
03:21
RHCSA : Easy steps to install Red Hat Enterprise Linux 7 as a virtual machine in VMWare workstation 12. Recommended hardware specifications are also discussed. The rhel 7 installation is with iso image file.
Views: 692 Network Heros
Delete a Logical Volume, Volume Group, Physical Volume & Partition (RHEL 7 / CentOS 7)
 
06:33
In this video tutorial, you learn to Delete a Logical Volume, Volume Group, Physical Volume & Partition in RHEL 7 / CentOS 7. There are some cool techniques to perform deletion. Visit : https:networkheros.com
Views: 526 Network Heros
Can't ping from VM to physical host ?
 
01:46
In this short demonstration, I solve one of your problems i.e can't ping from VM to physical host. However, the vm can ping to any other VMs in the same network and the internet. The physical pc can ping to the OS in the VM but VM PC can't ping to physical Computer. watch the video for how to. for more : ttp://networkheros.com/ Like us on Facebook : https://www.facebook.com/NetworkHeros/ Twitter: https://twitter.com/NetworkHeros Find my courses on Udemy : https://www.udemy.com/prepare-rhcsa-ex-200-exams-with-real-exam-practice-test/
Views: 410 Network Heros
CCNA (R&S) with GNS3 Lab-1: Install GNS3 with GNS3VM
 
15:31
How to install gns3 on windows? Follow the steps in the video after having the required steps, you will be shocked to get the powerful tool installed and working fine in your computer. Then you will be able to do all the labs that your want to. You can not only practice CCNA labs, but also other labs like Mikrotik, Juniper, etc. Download Link : https://goo.gl/1Q5m9G
Views: 1846 Network Heros
Ethical Hacking (CEH v10) : Undetectable payload with veil | Hack any Windows 10
 
08:56
In this Ethical Hacking (CEH v10) video tutorial, I am going to demonstrate you how to create an undetectable payload using veil-evasion in Kali Linux and hack windows 10 operating system. Veil is a tool designed to generate metasploit payloads that bypass common anti-virus solutions. A payload is a component of a computer virus that performs malicious activity. For an instance, when it is executed in the target computer, it allows an attacker access to the system. The more powerful is the payload the more it is harmful. We (attackers or penetration testers) use readymade payloads to get access to the target computer through reverse connection and escalate privilege. So, to generate Metasploit payload we use the Veil Evasion tool.
Views: 609 Network Heros
Basic Commands : Red Hat Linux 7 Basic commands (part 1)
 
11:12
Welcome to https:networkheros.com. Today, in this tutorial, I will show you working with some basic commands in Red Hat Enterprise Linux 7. In this video lecture you will learn : Run and execute commands in bash terminal Set the terminal to full screen, increase the size of font, decrease the font size Identify types of users in Red hat, switch user Launch multiple sessions Switch to the virtual console and graphical console To check current logon user Finding calendar of any day, month and year Display time & date in different formats Change hostname, timezone, etc Various commands to shutdown, halt and reboot the system. More in another part. Thank You Visit : https://networkheros.com
Views: 882 Network Heros
RHCSA : Working with files in Red Hat Linux (read, copy, move, rename, delete)
 
05:45
You will be perfect to working with files in Red Hat Linux 7. You will read Linux files with cat, head, less and copy, move, rename and delete files in Red Hat Enterprise Linux 7. Working with files in CentOS is also the exactly same. Visit : https://networkheros.com
Views: 155 Network Heros
Red Hat Practice Test  Part-1 (11 Questions Solved !)
 
08:42
Here in this tutorial -- Red Hat Practice Test Part-1, I have created some 11 questions and solved them. If you practice them, you will feel different in your current Linux skills. I have solved the following questions: Question 1 : Change your hostname as yourname.example.com Question 2 : Change time zone as your place's timezone. (For e.g. Asia/Kathmandu) Question 3 : Open terminal, zoom in, zoom out, set the terminal to full screen. Also open another terminal and switch between terminals. Question 4 : Switch to the virtual console Question 5 : Switch back to the graphical console. Question 6 : Find uptime of our system. Question 7 : Display full calendar of 2018. Display calendar of the date 1st January 2018. Question 8 : Close all the terminals with keyboard short-cut key. Question 9 : Long list all of the directory /etc/yum.repos.d/ including hidden. Question 10 : Long list all of the directory /etc/yum.repos.d/ in human readable format. Question 11 : Print number of lines, words and characters of the file For e.g. a.repo which is inside /etc/yum.repos.d/
Views: 407 Network Heros
RHCSA Basics : List files & directories ( Redhat 7)
 
08:06
In this tutorial, I will make you familiar with listing files and folder in Red Hat Linux. The way and the command is the same in CentOs as well. You will use listing command so many times while working with Linux environment. In this tutorial, you will learn : Printing working directory Change the current directory, go back to the home directly directly. List all files & folders including hidden List files & folders with block size List files & folders in reverse order, sort files and folders by modification time, size, etc. List files and folders in alphabetical order Counting lines, words and characters of a file
Views: 281 Network Heros
RHCSA : User Administration in RHEL7/CentOS7 (create, modify, delete user account and setting)
 
17:48
In this video, I will demonstrate about user administration in Red Hat Enterprise Linux 7. Basically, there are three types of users in Linux: Root user, Normal user or Standard user and System user (or pseudo user). The root account is the equivalent of the Administrator or Enterprise Admin account in the Windows world. It is the most powerful account on the system and has access to everything. Normal user accounts have no write access to anything on the system except their home directory which is created when the user account is added. However, they can read and explore much of the system. A system account is similar to a normal user account. The main difference is that system users normally don’t have a home directory and can’t log in the way normal users do. Many system users are created or associated with applications or services to help run them more securely. Thank you for watching, Please leave a comment if you have any confusion or anything to ask. See you in the next lecture until then have a nice time, Goodbye ! For more : https://networkheros.com
Views: 297 Network Heros
how to see wifi password on android phone 100 % successful (2018)
 
03:52
Watch this video and follow the steps to see wifi password on android phone. It works on any android phone without root.
Views: 131598 Network Heros
Ethical Hacking (CEHv10): Footprinting with Windows Command Line Utility
 
16:53
Hello Friends, Welcome to Module 2 of Certified Ethical Hacking Version 10 (CEHv10). The objectives of this Lab demonstration are : - to gather Open Source Information Using Windows Command Line Utility. -To demonstrate How to Use ping, nslookup and tracert utilities to gather information about a target. And the agendas are : -Understanding ‘ping’ utility and It’s output -Find IP Address of a Target Organization’s Domain -Find the maximum frame size for the network -Identify ICMP type and code for echo request & response packets -Find Authoritative name server & its IP Address Press Windows key and the ‘r’ to open ‘run’ utility. Type ‘cmd’ to open Windows Command Line Utility. Then, ping your target domain. For this demonstration purpose, I am going to show it with Microsoft.com thought it’s not my target domain. You should type the target domain name. We see, we get the replies from the domain and the IP address of www.microsoft.com is 23.2.7.144.104. From the output, we can also see ping statistics like packets sent, packets received, packets lost, minimum & maximum approximate round trip time. Before actually moving into further demonstration, let’s understand about ‘ping’ utility and its output statics. I assume you already know about it. If you know, you can simply skip it, otherwise, I hope you will have clear understanding from my explanation. Understanding Ping and it’s output. Ping stands for Packet Internet Groper. It’s a computer network administration software utility used to test the reachability of a host on an Internet Protocol (IP) network. I wanted to test the reachability between my computer to the host ‘www.microsoft.com’, so I used ping. It measures the round-trip time for messages sent from the originating host (my host) to a destination computer (www.microsoft.com) that are echoed back to the source (my host). Ping operates by sending Internet Control Message Protocol (ICMP) echo request packets to the target host and waiting for an ICMP echo reply. Okay, that’s all for now. I hope you guys enjoyed the video and learned something new. I would like to thank you for watching this video, hope to see you again in the next, until then have a nice time good bye.
Views: 901 Network Heros
Configure gmail in outlook 2016 (Step by step guide)
 
08:50
Here is a step by step guide to configure Gmail in Outlook 2016. In this tutorial, you will know the necessity to set up gmail in outlook, enable less secure apps to access your gmail, configure imap, smtp mail servers, choose imap and smtp ssl/tls ports and many more. At the end of this tutorial, you will be able to configure your gmail in outlook application easily. Visit our website for step by step guide : https:/networkheros.com
Views: 5397 Network Heros
Kali Linux basic commands (Every ethical hacker must know in 2018)
 
11:40
In this tutorial I show you the kali linux basic commands that every ethical hacker must know. If you know the basic linux commands, you can go further in your hacking & pentesting journey. Kali is Linux based hacking & pentesting operating system. During your ethical hacking process, you most often run so many commands and tools in Kali Operating System. In this video you will learn the basic commands to change directory, create and delete user, set system time and date, create file & folder, copy, paste, rename, move and delete files and directories in Kali Operating System. Furthermore, you will learn the commands to find IP address, subnet mask, interface status, and so on.
Views: 1206 Network Heros
Hack Windows 10 with an Excel File  | Inject Payload into a MS Excel File
 
12:23
Hey guys! welcome back to another very interesting video tutorial on Ethical Hacking (CEH v10). This is another hacking tutorial on Windows 10. In this video I’m gonna show you how to inject veil payload into a Microsoft Excel file and hack anything including the facebook password from the target system. This video is just for education and training purpose, I will not be responsible for any damage caused by you to anyone after the influence of this video. Just do on your own risk. During the video, I will follow the following steps in order to accomplish the task: - Generate a meterpreter/reverse_https payload in a .bat extension using veil framework. - Convert the bat payload to excel or doc script - Inject the script into the excel file - Send the file to the target and hack his facebook username and password - Also I will disable his keyboard and mouse. I have already taught you how to install and create Veil payloads in the previous videos, if you haven’t watched them, please pause this video, find those videos and come back here later, then only you will be successful with this task. Similarly, use keyscan tool to capture keys pressed on the target system. Type keyscan_start and press enter. Go to the target machine, minimize the excel sheet, open a browser, and open ‘facebook’, Enter facebook id and password and hit enter. Then come back to Kali machine. In the meterpreter console, type ‘keyscan_dump’ and hit enter. You will see the keyboard pressed keys are captured. You will also see the facebook account username and password. Fore more, please visit : https://networkheors.com
Views: 398 Network Heros
Creating and Editing files in RHEL 7 / CentOS 7 (touch, vim, nano and gedit)
 
08:53
Learn Creating and Editing files with different text editors in RHEL 7 CentOs 7. You will be familiar with different text editors such as touch, vim, nano and gedit in Linux. Please visit : https://networkheros.com
Views: 306 Network Heros
Windows Server 2016 : Unattended Installation with ADK, MDT & WDS
 
20:06
Hello Friends! Welcome to Windows Server 2016 Administration video tutorial series. In this video demonstration I am going to show you how to perform Unattended Windows deployment. For this, we require the following tools: Windows ADK (Assessment Deployment kit) and Microsoft Deployment Tool kit So, let’s download them from the internet.
Views: 401 Network Heros
RHCE EX300: Configure Send only Email Service (RHEL 7 / CentOS 7)
 
10:16
In this video you will configure rhel 7 / centOS 7 to transmit all email through an unauthenticated SMTP gateway. Linux Servers also send email, usually for automatic purposes or to report errors to an administrator. They generally use, directly or indirectly, a standard program called /usr/sbin/sendmail (provided in RHEL7 by Postfix) to send these messages. A null client is a client machine that runs a local mail server which forwards all emails to an outbound mail relay. Users may run mail clients on the null client to read and send emails. In this section, we will look at how to configure a RHEL 7 / CentOS 7 server as a Postfix null client, which will use sendmail and the SMTP protocol to transmit mail messages to the outside world through an existing mail server.
Views: 218 Network Heros
How to Recover BitLocker Corrupted Drive (100% Guarantee)
 
04:26
Today, in this video I am going to show you how to recover the BitLocker Encrypted Drive after it is corrupted. Sometimes, the volume D: or E: or like that gets corrupted due to various reasons such as virus, bad sector, etc. Even if you have BitLocker password you will not be able to open the drive. You can not also access to that data that you have saved in the drive. In this case, you can easily recover it with the simple tricks that I am now going to show you. Visit: networkheros.com Software Link : https://goo.gl/TLh4kU
Views: 870 Network Heros
Hack with zANTI 3.18 : Vulnerability Assessment & MITM (Android Hacking) #Part-1
 
07:22
Hi Guys ! Welcome to my Ethical Hacking (CEH v10) video training series. In this video I am going to demonstrate you how to install the most useful android hacking application zanti, assess vulnerability with it, perform ‘Man in The Middle attack’ and hack a remote PC to work as we instruct. Without any further delay let’s start to see the magic of zanti. -First of all, install the zanti in your android phone. For this, open a browser, search for zanti, Enter an email address. You will get a download link in your email. Download and install it on your android phone. As in the information about zanti provided in its official site. It’s a mobile penetration testing toolkit that let’s security managers assess the risk level of network with the push of button. This easy to use mobile toolkit enables IT security administrators to simulate an advanced attacker to identify the malicious techniques they use in the wild to compromise the corporate network. You can conduct network scans, in different intensity levels in order to identify devices, their properties and their vulnerabilities. But, while conducting scans and performing attack on a network make sure you have acquired permission to do so or you run on your own network. Zanti also enables security officers to easily evaluate an organization’s network and automatically diagnose vulnerabilities within mobile devices or websites using a host penetration tests including, man-in-the-middle, password cracking and Metasploit. . To sum up, you can easily find out security holes and exploit them. You can even intercept http traffic, redirect a http browsing to a site you desire, replace images of your own in remote hosts and many more. Follow the video series for more. Okay friends this is how the zanti can be used to assess vulnerabilities. That’s all for now. Hope you guys found this video useful. In the next video, we will perform Man-In-The-Middle attack to a remote host in my network. Thanks for watching ! Please leave a feedback, and subscribe our channel. See you in the next video, until then have a nice time, goodbye !
Views: 6681 Network Heros
Download YouTube videos in one click (Get download button in Youtube)
 
05:54
The easiest way to download YouTube videos to your computer in one click. After watching this video, and doing with me, you will get a download button below the video in chrome browser. Click on the Download button, select the quality and save in your computer. Visit : networkheros.com
Views: 439 Network Heros
Ethical Hacking (CEHv10): Finding sub-domains with Knockpy
 
03:45
In this Certified Ethical Hacking (CEHv10) video demonstration, I show you the most useful technique to footprinting domain. This is a part of Footprinting & Reconnaissance phase of Ethical hacking. This technique will find sub-domains with Knockpy. You will be able to find all the sub-domains in a domain using brute-force method. You will be amazed to see the output. For more : Visit our Website for other articles : http://networkheros.com/ Like us on Facebook : https://www.facebook.com/NetworkHeros/ Twitter: https://twitter.com/NetworkHeros Find my courses on Udemy : https://www.udemy.com/prepare-rhcsa-ex-200-exams-with-real-exam-practice-test/
Views: 129 Network Heros
Ethical Hacking (CEHv10) : Footprinting & Reconnassiance concepts
 
07:15
In this video series of Certified Ethical hacker version 10, I l explain you what is footprinting, what is reconnaissance, what is the difference between them and what actually attackers gather during Footprinting & Reconnaissance phase of ethical hacking. I have also explained what information is gathered about the target, during footprinting & reconnaissance phase of pen testing. We can classify this into three : Network Information, System Information, Organizations Information. - While collecting Network Information, attackers generally collect Domain Name, Internal Domain Name, Network blocks, Live systems, Private websites, Running TCP/UDP Services - Access Control Lists - Networking Protocols - VPN Points - Running IDSs - Authentication Mechanism - System Enumeration and - Telephone Numbers - Likewise, during the information gathering process, attackers collect system information like System Names - Passwords - Remote System Type - User and group Names - System Banners - SNMP information - Routing Tables and - System Architecture And finally, they collect information of the target organization like : - Employee Details - Organization’s Website - Location Details - Company Directory - Address & Contact details - Comments in HTML code - Security Policies Implemented - Webserver Links - Background of the organization - News Articles - Press releases These are the fields, attackers generally gather information about. It might not be possible to get all the information of every target company, but as an ethical hacker, we should try to gather as much as possible Information using every possible way. Also you need to create a document of the found information that will help you in other phases of pen testing. That’s all for now. I would like to thank you for watching this video. See you in the next, until then have a nice time goodbye. For more : Visit our Website for other articles : http://networkheros.com/ Like us on Facebook : https://www.facebook.com/NetworkHeros/ Twitter: https://twitter.com/NetworkHeros Find my courses on Udemy : https://www.udemy.com/prepare-rhcsa-ex-200-exams-with-real-exam-practice-test/
Views: 271 Network Heros
RHCSA : Overview of RHEL 7 Desktop GUI
 
12:20
In this video, you will be familiar with RHEL 7 Desktop GUI. I have explained. In other words, I will introduce you with the Red Hat Enterprise Linux 7 (RHEL 7) GNOME desktop. You can also call it as Red Hat GUI or Graphical User Interface. You don’t get this Graphical Mode unless you install it. To know how to install GNOME desktop in redhat 7, please refer my previous video. You can see the Full name of currently logged on User, current day and time, the network icon, volume icon or the volume manager. In the Application and in the Favorites, the most used applications or default applications that are likely to be used most are listed. The firefox is the default browser of the Red Hat. We can also see the file manager named Files, there we can see the user default and later created files and folders. You can create, edit or delete file and folder there. Also, we can see some files and folders locked. That means they are locked for this user and to open them, administrator privilege is required. Inside the folder, if you try to view the contents of the ‘web’ directory, you are prompted with a message “This location could not be displayed, You do not have the permission necessary to view the contentes of ‘Web’. Just click on OK, go back steps and then close the windows. To open the terminal, go to Applications and then click on Terminal. The terminal is opened. We have nothing to do now, so let’s close it. Now, let’s go to the Applications, go to System tools and then Settings. This is quite equivalent with the control panel in Windows Operating systems. You can see there the Personal, hardware and system tools. Down, below in the system, we can see users, if you double click on it, you can see the user information. Currently regmisan user is logged in. There are other accounts as well, if you click on them, you can read their properties and their status. You can also easily lock or unlock an user. Let’s close and get out of this window. In the Applications, then go to System tools then Disks, we can see the available device blocks—hard drives, CD /DVD drives or any disk or drive attached to the system. Currently there are 3 drives, we can see their size, name, partitioning type, file system, their mount point directory and whole bunch of things. Likewise, in the system tools, we can see another very important section, that is ‘System Monitor’ liket that of ‘Task Manager’ in Windows System. Let’s double click on system monitor to monitor our system. We can see the processes that are currently running. We can see so many services are running with their process id, and appropriate priority. Click on Refresh to get fresh processes. If you click on the ‘view’ drop-down menu, you can see the four items, the ‘all processes’ lists the processes used by all the users in the system. You can see the first process is of the user ‘regmisan’ and the second and some other are of root user. The ‘My Processes’ is for the currently logged on user’s process. And the ‘active processes’ list the processes that are currently active in the system. If you want to kill a process, just select the process and click on ‘End Process’ at the end of the interface. You get a prompt to verify. Just click on ‘End process’. The system monitor interface is closes because, we just ended the process. Finally, Once again go the ‘System Monitor’ GUI then Go to the Resources tab, here we can see the current CPU utilization, Memory or Ram and Swap memory usage and Network utilization or history. In the File System tab, we can see the devices, their name, their mount point directory, total capacity, available and used. From these three tabs, we can monitor our Red Hat system easily. Like wise, from the System Tools, we can see the system logs, which is another most important monitoring tools. If you are not a root user, you will have to enter the password to see the logs. All the history and errors can be seen here. Last but not least, we can also customize startup applications from the system tools. We can add in the list if we want a program to run at boot time or we can remove from this list to stop running the program at boot time. Okay friends, this is the end of this session, I hope you became quiet familiar with the Red hat Graphical User Interface. We will however, administer the system, almost everything from the bash terminal. We will be familiar with that too, in the coming sessions. Thank you for watching the video. Please comment below if you find anything confusing. Also Like and subscribe my channel to get immediately, I upload another tutorial. Have a nice time, Good bye.
Views: 325 Network Heros
RHCE EX300 : Configure Kerberos Enabled NFS share in RHEL 7 and CentOS 7 (File Based Storage)
 
22:18
In this rhce video tutorial, I will show you how to export file systems to client using NFS with Kerberos authenticated in RHEL 7 and CentOS 7 server. Kerberos enabled NFS exports The NFS server does not require authentication and only enforces access restriction based on the IP address or host name of the client by default. To remedy this, the NFS server provides options to secure access to files using a number of methods: none, sys, krb5, krb5i and krb5p. The NFS server can choose to offer a single method or multiple methods for each exported share. NFS clients must connect to the exported share using one of the methods mandated for that share, specified as a mount option sec=method. Visit our Website for other articles : http://networkheros.com/ Like us on Facebook : https://www.facebook.com/NetworkHeros/ Twitter: https://twitter.com/NetworkHeros Find my courses on Udemy : https://www.udemy.com/prepare-rhcsa-ex-200-exams-with-real-exam-practice-test/
Views: 309 Network Heros
Ethical Hacking (CEHv10):Google Hacking Techniques
 
13:44
In this Ethical Hacking (CEHv10) video tutorial, I demonstrate how to find specific sites and specific words in the site. This makes you easy and saves your time during footprinting (information gathering). In addition to this, from these techniques you can find easily files or credentials that are very difficult to find via normal search techniques. The advanced google search techniques also makes you skilled in finding anything in the web by using Google search engine database query. For more : Visit our Website for other articles : http://networkheros.com/ Like us on Facebook : https://www.facebook.com/NetworkHeros/ Twitter: https://twitter.com/NetworkHeros Find my courses on Udemy : https://www.udemy.com/prepare-rhcsa-ex-200-exams-with-real-exam-practice-test/
Views: 340 Network Heros
RHCSA : Working with directories in RHEL 7 / CentOs 7 (create, copy,rename,move & delete)
 
08:44
Learn perfect ideas to working with directories in RHEL 7 / CentoOs 7. In this session, you will learn to list directories in different locations, create normal directory and collaborative directory in Red hat 7, list directories in hierarchical form, copy a directory to a different destination, recursive verbose options, move a directory, rename directory to new name, delete directories forcefully. Please visit : https://networkheros.com
Views: 149 Network Heros
Windows Server 2016 | Windows Deployment Service (WDS) | Network Installation
 
09:32
Hello Friends ! Welcome to Networkheros.com. We are in the video series of Windows Server 2016 Administration. This video tutorial is a part of Microsoft Certified Solutions Associate (MCSA). In this video, I am going to demonstrate you how to perform Network Installation of Windows Server 2016 or any other Windows Operating System. I will use the Windows Deployment Service (WDS) feature to perform network installation of windows server 2016 in other machines. Here I am in the Windows Server 2016. This is installed as a Virtual Machine in VMware workstation 14.0. For Windows Deployment, you need to install Windows Deployment Service (WDS) in the source server. For this, open the Server Manager, Click on Manage, Click on add Roles and Features. Network installation can be done using Windows Deployment Service (WDS) Install WDS Role in the server In the server manager , Tools , Windows deployment Services , Click on Servers , Right click on the server , Configure Server , Next , Integrated with Active Directory , Browse , Create a New folder , Next , Yes , Respond to all , Next , Uncheck Add image , Finish Now, right click on the Install Images , Add Image Group , Give a name to the group (i.e. Server2016) Right click on the image (Server2016) , Add Install Image , Browse , open DVD drive , sources , install.wim , Next , Choose the server edition , Next , Next , Finish [Note : If you are doing in the virtual environment and have an ISO image of Windows Server 2016, you should mount it. ] Right click on the Boot Image , Add Boot Image , Browse , Open DVD , sources , boot.wim , Next , Next , Finish Again, right click on Server2016 , Boot , Require the user to press F12 , Finish OK Now create a New Virtual machine (with use iso image later) Power on the Virtual Machine , Press f12 , Install WDS Boot Manager. For more in detail: Watch the Video.
Views: 127 Network Heros
Disable Network Boot VMware (Network Boot form Intel)
 
02:14
After watching this video, you will be able to solve network boot problems in Vmware. You will edit a file to disable network boot in vmware. You will fix client mac addr error in vmware. For more: Visit our Website for other articles : http://networkheros.com/ Like us on Facebook : https://www.facebook.com/NetworkHeros/ Twitter: https://twitter.com/NetworkHeros Find my courses on Udemy : https://www.udemy.com/prepare-rhcsa-ex-200-exams-with-real-exam-practice-test/
Views: 1345 Network Heros
Ethical Hacking (CEHv10): Network Scanning with NMAP (Most useful NMAP commands)
 
13:29
In this Ethical Hacking (CEHv10) Video tutorial, I demonstrate Network Scanning with NMAP. It's the most useful tool to scanning network and system, finding open, closed, filtered, unfiltered, open | filtered, closed | filtered TCP or UDP ports. In addition to this, I will demonstrate how to find version of the Operating system, Live hosts in the target network, device types, running Operating Systems, CPE, OS details, uptime guess, network distance, TCP sequence prediction, IP ID, etc. You will also know how to enumerate hosts surrounding to a target, live hosts operating system detection, etc.
Views: 190 Network Heros
Create a normal partition, format with xfs, mount and automount (RHEL 7 /
 
15:06
In this video tutorial of Red Hat Certified System Administrator (rhcsa), you will learn to create a normal partition in CentOS 7 / RHEL 7, format the partition to xfs file system, mount the partition to a mount point directory and make use of the partition. In the final section of the video, you will learn to unmount and delete the partition.
Views: 256 Network Heros
RHCE EX200 : Configure Kerberos KDC in RHEL 7 & CentOS 7 (File based Storage in Linux)
 
12:22
In this RHCE tutorial, I will show you how to configure Kerberos KDC in RHEL 7 and CentOS 7. Watch the video and try in your Lab environment. You will be more happier. Visit our Website for other articles : http://networkheros.com/ Like us on Facebook : https://www.facebook.com/NetworkHeros/ Twitter: https://twitter.com/NetworkHeros Find my courses on Udemy : https://www.udemy.com/prepare-rhcsa-ex-200-exams-with-real-exam-practice-test/
Views: 111 Network Heros
RHCE EX200 : Configure NFS Export (RHEL 7 and CentOS 7)
 
10:01
In this video, I show you how to export file systems to client systems using Network File System (NFS), controlling access by IP Address. What is NFS ? NFS is a network file system commonly used by UNIX systems and network-attached storage devices to allow multiple clients to share access to files over the network. It provides access to shared directories or files from client systems. Warning ! The NFS protocol transmits data in clear text over the network. In addition to this, server relies on the client to identify users. It is not recommended to export directories with sensitive information without the use of Kerberos authentication and encryption, which we will see in the next video. Visit our Website for other articles : http://networkheros.com/ Like us on Facebook : https://www.facebook.com/NetworkHeros/ Twitter: https://twitter.com/NetworkHeros Find my courses on Udemy : https://www.udemy.com/prepare-rhcsa-ex-200-exams-with-real-exam-practice-test/
Views: 109 Network Heros
Ethical Hacking (CEHv10): Footprinting with Maltego
 
06:41
In this Ethical Hacking Training Video, I have demonstrated how to use Maltego to gather information against the target domain. Maltego is a graphical user interface (GUI) based tool to footprint and gather information of the target. With Maltego you can gather a lot of information about the target domain, DNS, subdomains, emails, personal information, phone numbers, netbocks and so many other things.
Views: 175 Network Heros
Configure RIPv2 with Subnetting (VLSM) : CCNA (R&S) with GNS3 Lab-4
 
18:13
In this video, I demonstrate how to configure RIPv2. Routing Information Protocol (RIP) is one of the distance vector dynamic routing protocols. It is an open standard protocol which is applicable for small organizations since its maximum hop count is 15 that means only sixteen routers. RIP comes in two versions with IPV4; RIPv1 and RIPv2. RIPv1 is class full routing protocol which does not support Subnetting whereas RIPV2 is classless and supports VLSM or Subnetting. In RIPv1 updates are broadcasted via the broadcast address 255.255.255.255 whereas RIPv2 . With RIP, you can perform load balancing up to 4 equal paths. It's administrative distance is 120. RIP exchanges entire routing table for every 30 seconds, which we can say as periodic updates. RIP v1 does not support for authentication but RIPv2 supports authentication.
Views: 603 Network Heros
Ethical Hacking (CEHv10): Scanning with Advanced IP Scanner (see the magic)
 
06:14
In this video tutorial, I have demonstrated how to perform scanning with advanced IP Scanner. You will see the magic of this tool which finds all the live hosts in a network, their IP addresses, MAC address, device manufacturer company, uptime and so many other things. You can even find the shared files and folders in the network and explore into it. This tool makes network engineers and ethical hackers work very easy at their work. Please watch the video to see the magic of Advanced IP Scanner. For more : http://networkheros.com/ Like us on Facebook : https://www.facebook.com/NetworkHeros/ Twitter: https://twitter.com/NetworkHeros Find my courses on Udemy : https://www.udemy.com/prepare-rhcsa-ex-200-exams-with-real-exam-practice-test/
Views: 169 Network Heros
Ethical hacking (CEHv10) :Footprinting Operating Systems
 
04:56
In this CEH tutorial I will use a couple of search engine tools to identify the target company’s operating system and their address. First of all I will use Netcraft to determine the Operating Systems used by the target organization. Just go to your browser and type ‘netcraft.com’. Secondly, I will use Shodan. In your browser, type shodan.io and press enter. Shodan is a search engine for the Internet of Things such as the surveillance camera that can be operated and managed remotely using the internet. This search engine is also for security. Click on the ‘Explore’ button and wait for the results. We can see some webcam, surveillance cameras connected to internet are found. If you click on that , you may find some vulnerable cameras. Not only Cameras, but also the default passwords of different devices. I am going to open the default passwords. We can see host IP addresses and their password which is set to default. Similarly, you can see so many other hosts with their IP address on which default password is set. Finally, These two tools are mostly used during Footprinting and reconnaissance phase of Ethical Hacking in order to gather information of the target organization. For more : Visit our Website for other articles : http://networkheros.com/ Like us on Facebook : https://www.facebook.com/NetworkHeros/ Twitter: https://twitter.com/NetworkHeros Find my courses on Udemy : https://www.udemy.com/prepare-rhcsa-ex-200-exams-with-real-exam-practice-test/
Views: 250 Network Heros
EX 70-740: Windows Server 2016 Overview | Best New Features | Min & Recommended Hardware Requirement
 
13:28
===Overview of Windows Server 2016==== More robust and more secure than Windows Server 2008 & Server 2012 Equipped with the best technologies of both worlds and the newest inventions in the Windows Server Environment The first server Operating System designed specially for the cloud for shaping the new era of computing i.e. cloud computing. Best New Features in Windows Server 2016 Nano Server Containers Linux Secure Boot Resilient File System (ReFS) Storage Spaces direct ADFS v4 (Active Directory Federation Services) Nested Virtualization Hyper-V Hot-Add Virtual Hardware PowerShell Direct Shielded VMs Windows Server 2016 editions Windows Server 2016 Datacenter: This edition is designed for enterprises that own highly-virtualized data centers or act as cloud providers. Windows Server 2016 Standard: This edition is designed for medium-sized businesses that use servers on-premises to run their network services. Windows Server 2016 Essentials: This edition is designed for small businesses that run a single server in their IT infrastructure. Minimum & Recommended Hardware Requirements to install Windows Server 2016: Minimum: Processor: 1.4 GHz with 64-bit architecture RAM: 512 MB HDD: 32 GB Monitor: It must support Super VGA (1024 x 768) resolution and above Other hardware: Has support for optical disk drives such as DVDs and support for SSDs with USB, keyboard, and mouse Internet connection: cable or DSL connection Recommended: Processor: 2.0 GHz or higher RAM: 32 GB or higher HDD: 1 TB Monitor: It must support Super VGA (1024 x 768) resolution and above Other hardware: Has support for optical disk drives such as DVDs, support for SSDs with USB, keyboard, and mouse Internet connection: cable or DSL connection Network access: at least one Gigabit Ethernet NIC Downloading Windows Server 2016 Download and explore all the new improvements of Windows Server 2016 as evaluation software from the given link: https://www.microsoft.com/en-us/evalcenter/ Installing Windows Server 2016 Clean installation Installation over a network using Windows Deployment Service (WDS) Unattended installation Upgrade and migration Understanding partition schemes Master Boot Record (MBR): It operates on a 512-byte disk sector with a maximum of four primary partitions, or three primary partitions and one extended partition. An extended partition can have up to 26 logical partitions. The MBR uses logical block addressing (LBA) to support disks up to 2 TB. GUID Partition Table (GPT): The globally unique identifier (GUID) in a GPT is a 128-bit number that Microsoft uses to identify resources. In a GPT, block sizes from 512 bytes and up are supported, where the most common default these days is 4K or 4,096 bytes, and the size of the partition entry is 128 bytes. The GPT is part of the Unified Extensible Firmware Interface (UEFI) standard that replaces the old basic input/output system (BIOS) to support modern hardware. GPT is fault tolerant and supports up to 18 EB disk storage, and up to 128 partitions on each disk. Desktop Experience vs Server Core vs Nano Server Installation Options Desktop Experience: contains everything from Windows Server 2016 hardware needs to exceed the minimum requirements specification in order to benefit from the full-featured Graphical User Interface (GUI). Server Core: recommended by Microsoft due to its minimal hardware resource consumption and higher security. The roles and features can be installed locally through Windows PowerShell, or remotely through Server Manager. Nano Server: This is a replacement for Server Core that takes up far fewer hardware resources, has fewer updates, and supports only 64-bit applications. It is administered remotely since it has no local login capabilities. In a few words, this installation option is best understood as set it and forget it.
Views: 125 Network Heros
Ethical Hacking (CEHv10): BurpSuite install and configure proxy
 
05:08
In this video, I am going to show you how to install Burpsuite and configure it to intercept traffic. You will see how I intercept HTTP traffic and capture username and password. First of all, search for Burpsuite in Google, download and install it. Although the free version has significantly reduced functionality, it was developed to provide a comprehensive solution for web application security checks. Now burpsuite only listens and intercepts http traffic only but not HTTPS. In the next video I will show you how to configure burpsuite and the browser for intercepting HTTPS traffic. Thank you for watching this video, see you in the next, until then have a nice time good bye.
Views: 149 Network Heros
Logical Volume Manager in Linux (Red hat 7 /CentOS 7)
 
17:25
Learn to create Logical Volumes in Linux Based Operating System. Logical volumes are the dynamic volumes that are created from volume group of different physical partitions from different hard drives.
Views: 251 Network Heros