Channel Avatar

CyberTodd @UCkil3SMyUI2hJLfuSOlmu8Q@youtube.com

1.3K subscribers - no pronouns :c

Welcome to CyberTodd, your go-to destination for all things


10:11
Custom Rules | THM Series: John the Ripper #7
08:48
Single Crack Mode | THM Series: John the Ripper #6
07:43
Cracking /etc/shadow Hashes | THM Series: John the Ripper #5
05:48
Cracking Windows Authentication Hashes | THM Series: John the Ripper #4
12:41
Cracking Basic Hashes | THM Series: John the Ripper #3
05:02
Setting Up Your System | THM Series: John the Ripper #2
04:30
Basic Terms | THM Series: John the Ripper #1
03:06
Hashing for integrity checking | THM Series: Cryptography #6
08:13
Password Cracking | THM Series: Cryptography #5
04:51
Recognising password hashes | THM Series: Cryptography #4
07:11
Uses for hashing | THM Series: Cryptography #3
05:30
What is a hash function? | THM Series: Cryptography #2
05:34
Key Terms | THM Series: Cryptography #1
25:25
Turn Rick back into a human! - Pickle Rick THM CTF Challenge
20:37
Challenge | THM Series: Upload Vulnerabilities #11
05:15
Example Methodology | THM Series: Upload Vulnerabilities #10
10:06
Bypassing Server-Side Filtering: Magic Numbers | THM Series: Upload Vulnerabilities #9
12:14
Bypassing Server-Side Filtering: File Extensions | THM Series: Upload Vulnerabilities #8
16:07
Bypassing Client-Side Filtering | THM Series: Upload Vulnerabilities #7
09:29
Filtering | THM Series: Upload Vulnerabilities #6
11:45
Remote Code Execution | THM Series: Upload Vulnerabilities #5
09:26
Overwriting Existing Files | THM Series: Upload Vulnerabilities #4
03:18
General Methodology | THM Series: Upload Vulnerabilities #3
19:58
Practice and Examples - Pre-Requisite: What the Shell? #13
03:26
Next Steps - Pre-Requisite: What the Shell? #12
04:38
WebShells - Pre-Requisite: What the Shell? #11
05:06
Metasploit multi/handler - Pre-Requisite: What the Shell? #10
12:02
msfvenom - Pre-Requisite: What the Shell? #9
08:06
Common Shell Payloads - Pre-Requisite: What the Shell? #8
06:52
Socat Encrypted Shells - Pre-Requisite: What the Shell? #7
08:32
Socat - Pre-Requisite: What the Shell? #6
09:00
Netcat Shell Stabilisation - Pre-Requisite: What the Shell? #5
03:43
Netcat - Pre-Requisite: What the Shell? #4
09:38
Types of Shell - Pre-Requisite: What the Shell? #3
05:45
Tools - Pre-Requisite: What the Shell? #2
02:32
What is a shell? - Pre-Requisite: What the Shell? #1
02:08
Conclusion - Pre-Requisite: Web Enumeration #13
04:12
Nikto Practical (Deploy 3) - Pre-Requisite: Web Enumeration #12
09:26
Nikto Modes - Pre-Requisite: Web Enumeration #11
02:24
Introduction to Nikto - Pre-Requisite: Web Enumeration #10
05:23
Practical: WPScan (Deploy 2) - Pre-Requisite: Web Enumeration #9
12:30
WPScan Modes - Pre-Requisite: Web Enumeration #8
03:46
Introduction to WPScan - Pre-Requisite: Web Enumeration #7
05:24
Practical: Gobuster (Deploy 1) - Pre-Requisite: Web Enumeration #6
03:40
Useful Wordlists - Pre-Requisite: Web Enumeration #5
14:12
Gobuster Modes - Pre-Requisite: Web Enumeration #4
04:32
Introduction to Gobuster - Pre-Requisite: Web Enumeration #3
03:15
Manual Enumeration - Pre-Requisite: Web Enumeration #2
01:52
Introduction - Pre-Requisite: Web Enumeration #1
10:18
Server Side Request Forgery (SSRF) | THM Series: Web Hacking Fundamentals #21
05:22
Security Logging and Monitoring Failures | THM Series: Web Hacking Fundamentals #20
11:24
Data Integrity Failures | THM Series: Web Hacking Fundamentals #19
03:33
Software Integrity Failures | THM Series: Web Hacking Fundamentals #18
05:17
Software and Data Integrity Failures | THM Series: Web Hacking Fundamentals #17
04:10
Identification and Authentication Failures Practical | THM Series: Web Hacking Fundamentals #16
04:50
Identification and Authentication Failures | THM Series: Web Hacking Fundamentals #15
07:30
Vulnerable and Outdated Components - Lab | THM Series: Web Hacking Fundamentals #14
04:12
Vulnerable and Outdated Components - Exploit | THM Series: Web Hacking Fundamentals #13
01:46
Vulnerable and Outdated Components | THM Series: Web Hacking Fundamentals #12
07:13
Security Misconfiguration | THM Series: Web Hacking Fundamentals #11