Tutorials

How To: Change / Reset forgoten root mysql password

Download HERE

27 comments:

  1. Great site, and I love the videos on u-tube.

    ReplyDelete
  2. I purchased Mastering Wireless Penetration Testing for Highly-Secured Environments by Aaron Johns through the Packt Publishing web site. I have just finished reading this book and I thought that it was great. I found the information presented by the author to be clear, concise, and well organized. I would definitely recommend this book to anyone that has an interest in penetration testing, or an interest in protecting themselves from an intrusion. That was one of the things that I really liked about this book, not only does it cover how to penetrate a secure environment, it also explains the necessary steps to take in hardening your network from the techniques used by hackers to compromise your system. Again this was an excellent read! I am new to this site, and to penetration testing in general. I just felt like sharing a good experience that I had in learning with the community!

    ReplyDelete
  3. Hello
    I am looking for someone to help me on my journey to become a successful pen tester/ethical hacker
    I'd like to learn how to find vulnerabilities in websites, using such SQL and XSS
    I have a large amount of knowledge in brute forcing and DOS

    ReplyDelete
    Replies
    1. Hi. We will be offering online courses in all of those areas and more starting in 2016!

      Delete
    2. hi there uknown im looking for pretty much the same thing you are intending to do im inspiring to be an ethical hacker although i have random knowledge about sql injection xss i would love to be your frieind or walk with you on your journey ! here is my email i would love from you to write me back martllaww@hotmail.com ! peace out

      Delete
    3. i am a begginer in this hacking world please guide me thanx zee_m@hotmail.com

      Delete
    4. This comment has been removed by the author.

      Delete
    5. This comment has been removed by the author.

      Delete
  4. Just want to say Thank you for all the awesome videos and tutorials......as a career changer and in my early 50's I have decided to get into penetration testing after doing tons of research and of course the fact I love doing computer stuff. You videos and insight into this fascinating field has truly inspired me even more...............Keep up the superb work!!!

    ReplyDelete
  5. I teach digital forensics at Eastern Florida State College. I am prepping a lecture on proxy chains, VPNs, and Tor. If you don't mind, I wanted to ask you a few questions for reference. I watched your video on combining an online SSH shell account with Tor using that free SSH service, however that service is now offline. Do you have another tutorial (or point me in the direction of one) that could do something similar? I wanted another way of combining a VPN or SSH service with the capability of Tor.

    Could you possibly E-mail your advice to me? My address is jdude35@hotmail.com . I am using my non school E-mail for my research. I will cite you as a reference in my lecture if you wish.

    ReplyDelete
  6. Hello Afterburn
    You are doing great work, I want to ask when are staring online course ?

    ReplyDelete
  7. Hello NetSecNow, I have a few simple questions about the online course you will be offering soon. First, will the course be both instructional and informative? I am the kind of person who likes to know how and why things work. Second, what will the course cost? I know that some online network security / penetration courses can be rather expensive, like all of the Offensive Security courses. Also, will there be grades? (joking btw) I would very much appreciate it if you could answer my two questions because I am very eager to sign up for these online classes.

    Thanks, - Joe

    ReplyDelete
  8. Hi all,

    just found the videos on youtube. Great Stuff.
    Just one Question to Afterburn.
    Are there any Certifications you can recommand. I found
    http://www.securitytube.net/ from Vivek R. which looks like to giva alot of info for a suitable price.
    Any ideas to that?
    BR from germany
    Tom

    ReplyDelete
  9. Hey there, anyone have a cuda command to brute force a 16 character long password? Im attempting to crack my wifi via a captured hccap file, and the password consists of numbers and uppercase letters. Thanks!

    ReplyDelete
  10. hwllo my man i am from san andres island and i love your videos , i will like to know if you have a tutorial that you can sell me in orther to dedicated my live to it , i am loking for new views but all the videos that i found ond youtube they are not interested , sow i decide to send this comment to you to se if you can help me sorry for my dramatica, i am not so good reating , thank you and have a good day

    ReplyDelete
  11. Hpwdy, What kinds of course materials do you, or are you going to require for your classes? Network security and hacking are some areas that I'm interested in, and if this is a good source to get my foot in the door i'm willing to try it, I would just like to know what kind of a price range I should start budgeting for. thanks in advance! love the vids!

    ReplyDelete
  12. I like your blog, I think it is quite different concept but quite knowledgeable but I am aware with one more website which is famous for Free Classified Ads Posting Sites www.helpadya.com  www.helpadya.com

    ReplyDelete
  13. you had have published,it is very short

    ReplyDelete
  14. This comment has been removed by the author.

    ReplyDelete