How I Would Hack You: Methods Used to Attack and How to Defend Against Them [YouTube Release]

Additional Resources:

Forum post with links and further learning discussed in video:

Connecting With Us

Lawrence Systems Shirts and Swag

►👕 https://teespring.com/stores/lawrence-technology-services

AFFILIATES & REFERRAL LINKS

Amazon Affiliate Store
:shopping_cart: Lawrence Systems's Amazon Page

Ubiquiti Affiliate
:shopping_cart: Ubiquiti Store USA – Ubiquiti Inc.

All Of Our Affiliates that help us out and can get you discounts!
:shopping_cart: Affiliates We Love - Lawrence Technology Services

Gear we use on Kit
:shopping_cart: Kit

Try ITProTV free of charge and get 30% off!
:shopping_cart: Learn technology and pass IT certifications with ITProTV

Use OfferCode LTSERVICES to get 10% off your order at
:shopping_cart: Tech Supply Direct | Shop Workstations, Servers, Storage, and More

Digital Ocean Offer Code
:shopping_cart: DigitalOcean – The developer cloud

HostiFi UniFi Cloud Hosting Service
:shopping_cart: HostiFi - UniFi Cloud Hosting

Protect you privacy with a VPN from Private Internet Access
:shopping_cart: Buy VPN with Credit Card or PayPal | Private Internet Access

Patreon
:moneybag: lawrencesystems is creating Tech Tutorials & Reviews | Patreon

:stopwatch: Timestamps :stopwatch:
00:00 How I would hack you
01:01 Shave That Beard For Charity!
04:01 Who Is The Target?
08:02 Using crt.sh
09:28 DNS Dumpster
14:59 Exploit DB
23:05 Pen Test Guide Book
23:58 Using AITM to Steal Auth Tokens
29:30 Protecting Against Auth Tokens Theft
31:39 Attack using evilginx
35:54 Deep Fakes and Fake Resumes
39:37 Enterprise Application Registration Attack
45:14 kitploit.com

#hacker #msp #osint