Channel Avatar

Joseph McCray @UCwy-MdTJ7tKz7IkniV9MsEA@youtube.com

5.8K subscribers - no pronouns :c

Joe McCray is an IT Security Consultant and Trainer. He is t


02:32:59
Command Line Log File Analysis
08:46
Getting ready for a Capture The Flag Hacking Competition - Part 3
47:56
Getting ready for a Capture The Flag Hacking Competition - Part 2
01:03:24
Getting ready for a Capture The Flag Hacking Competition - Part 1
01:11:38
Getting ready for a Capture The Flag Hacking Competition - Part 3
01:05:26
How To Build Your Own Low Cost HackLab
01:44:17
Everything you need to know to become a penetration tester....
56:19
Analyzing Logs with Powershell
52:46
Powershell basics and intro to Windows event log analysis with Powershell
26:31
Powershell for security tasks and Metasploit
01:17:14
Day 5 of Pentester Lab Network Walk-Through
44:58
Web services testing with Burp Suite
01:05:21
Burp suite basics each of the tabs
44:45
Finding vulnerabilities with Burp suite and using more features
52:41
Application Architecture Fundamentals and web services testing
01:05:09
Application Development Fundamentals
51:33
Class Intro, WebApp sec basics, and burp suite basics
01:27:14
Day 4 of Pentester Lab Network Walk-Through
58:31
Automating static analysis with Python
33:47
Automating static analysis continued and analyzing macro embedded office documents
01:09:25
PCAP analysis and memory analysis with volatility
33:53
Introduction to static analysis of Windows executables in Linux
38:55
Analyzing malware with Yara, and creating your own malware database
50:47
Day 3 of Pentester Lab Network Walk-Through
56:23
Day 2 of Pentester Lab Network Walk-Through
39:12
Day 1 Section 1: Class Intro, installing VMWare, Ruby and Ruby basics
57:56
Day 1 Section 2: Ruby classes, objects, methods, and operators
53:48
Day 1 Section 3: Ruby loops, and array arrays stacks
51:24
Day 1 Section 4: Ruby scripts Metasploit layout
25:29
Day 1 Section 5: Attacking Windows 7
42:29
Day 2 Section 1: Basics Post Exploitation
36:21
Day 2 Section 2: Post Exploitation and privilege escalation
50:47
Day 2 Section 3: Post Exploitation and privilege escalation pivot and lateral movement
01:34:17
Day 2 Section 4: Post Exploitation and Writing Meterpreter Scripts
33:56
Day 2 Section 5: Using RC Files
01:12:46
Day 3 Section 1: Bypassing Antivirus
13:54
Day 3 Section 2: Bypassing Antivirus continued
02:53:27
Day 4 Section 1: Exploit development basics
07:01
Reverse Engineering
51:14
Shmoocon Epilogue 2013 CG & Joe McCray The Evolution of Pentesting High Security Environments
01:05:00
Web App Security For Mere Mortals
50:53
Hacktivity 2012 Joe McCray Web Application Security
01:21:10
Python for Security Professionals class
04:48:34
Pentesting Workshop
01:33:04
Exploit Dev Night School Day 2
01:52:04
Web App Pentester Night School Day 1