Burp Suite Deep Dive course: https://bit.ly/burpforpros
________________________________________________________________________________________________ Recon in Cybersecurity course: https://bit.ly/cybersecrecon
Python Basics course: http://bit.ly/37cmhlx
Python for Pentesters course: http://bit.ly/2I0sRkm
Join me and other cybergeeks on discord: http://bit.ly/2KH6aST
Join my SQUAD (for discounts'n'stuff): http://bit.ly/2xhSvM2
Hire me as a penetration tester: https://dgtsec.com/penetrationtestin...
101 Pentesting Training: https://dgtsec.com/cybersecpentestin...
101 Cybersecurity Consulting: https://dgtsec.com/cybersecpentestin...
Connect with me:
Help me continue creating videos: https://www.buymeacoffee.com/cristivlad
Linkedin: / cristivlad
Twitter: / cristivlad25
Facebook page: / cristivladz
Facebook group: / cybersecpros
Hackthebox: https://www.hackthebox.eu/profile/27034
Tryhackme: https://tryhackme.com/p/cristi
Peerlyst: https://www.peerlyst.com/users/cristi...
Discord: https://disboard.org/server/608756357...
Books I recommend for Penetration Testing and Ethical Hacking:
1. TJ O'Connor Violent Python: https://amzn.to/31vH2GB
2. Dafydd Stuttard Web App Hacker' s Handbook (2nd Ed): https://amzn.to/2MRcjk3
3. Peter Yaworski Web Hacking 101: https://amzn.to/2KTvJSy
4. Jon Erickson Hacking: The Art of Exploitation (2nd Ed):
https://amzn.to/2WHr3BD
5. Peter Kim The Hacker Playbook 3 (2018): https://amzn.to/2MQiTXK
6. Peter Yaworski RealWorld Bug Hunting: https://amzn.to/37GB87K
It helps me tremendously if you support these educational videos:
/ cristivlad
My course Developing Ethical Hacking Tools with Python on Cybrary: http://bit.ly/2J5USbC
If you're a Youtuber, how can you survive without TubeBuddy? http://bit.ly/37dgFYr
Learn handson pentesting (free trial): http://bit.ly/2LzKrPJ
Hacker Wearables: http://bit.ly/2IDAQEo
Paperspace credit: https://paperspace.io/&R=FMXH1BN
DigitalOcean credit: https://m.do.co/c/efe4365e60bd
Shortclips via: https://mixkit.co/
__________
Whatever type of tests you're doing, only perform them in safe and legal environments and with the appropriate permissions.
__________
In this video I show you how I use netcat to transfer files between systems in my penetration testing practice and training.
Only perform these types of engagements in safe and legal environments and with the appropriate permissions. This video is for educational purposes only.