William Moody (@bmdyy) 's Twitter Profile
William Moody

@bmdyy

Cybersecurity videos

ID: 1059791371387723777

linkhttps://www.youtube.com/@bmdyy calendar_today06-11-2018 12:55:27

13 Tweet

119 Followers

31 Following

247CTF (@247ctf) 's Twitter Profile Photo

🏆 New 247CTF.com WEB285 challenge released! We are working on a meme upload and messaging service. Can you find any bugs before we add functionality to send the messages? 🏆 🔥 Huge thanks to William Moody for contributing this great challenge! 🔥

William Moody (@bmdyy) 's Twitter Profile Photo

Hi guys, I made this video to talk about my experience passing the recently released CPTS, as well as what the differences are between it and the OSCP👨‍💻 youtube.com/watch?v=dRW1Gx…

William Moody (@bmdyy) 's Twitter Profile Photo

Hey guys, I made this video to demonstrate how simple creating ransomware really is (using Golang) 🥵 Check it out here: youtube.com/watch?v=9B3xas…

William Moody (@bmdyy) 's Twitter Profile Photo

Hi guys, my video reviewing CPTS did well, so I made a similar review of the CBBH certificate by HackTheBox 📦. Check it out here: youtube.com/watch?v=6ISUuM…

William Moody (@bmdyy) 's Twitter Profile Photo

Slightly different video this week; I decided to create a brief 'documentary' of John Hammond's story since he's someone who inspired me to begin my infosec journey. youtube.com/watch?v=p8DFXg…

William Moody (@bmdyy) 's Twitter Profile Photo

How can we exploit blind SQL injections quicker? In this video I implement/compare two common algorithms. youtu.be/zRBFpCvx1uM

William Moody (@bmdyy) 's Twitter Profile Photo

I developed (POC) malware which uses Discord as a C2, to demonstrate one creative way attackers can interact with their victims. Check it out here: youtu.be/O8ZbLodSIv8

William Moody (@bmdyy) 's Twitter Profile Photo

In this video I take apart the Club Penguin network protocol to demonstrate how a simple Card-Jitsu cheat can be made. youtube.com/watch?v=_4V7_W…

William Moody (@bmdyy) 's Twitter Profile Photo

In last week's video I demonstrated a simple Card-Jitsu cheat for Club Penguin. This week, I show how it is possible to deal with encrypted network traffic in order to cheat in the most popular Club Penguin remake, NewCP. youtube.com/watch?v=c3srGW…

William Moody (@bmdyy) 's Twitter Profile Photo

In this video I explain and demonstrate the concept of Process Hollowing, which is a popular technique malware developers use to evade antivirus. youtube.com/watch?v=aQQT-n…

William Moody (@bmdyy) 's Twitter Profile Photo

In this video I demonstrate three different ways to capture NetNTLMv2 hashes (LFI, SQLi, and .LNK files), and how they can be cracked using Hashcat. youtube.com/watch?v=8AUiRq…

William Moody (@bmdyy) 's Twitter Profile Photo

Most corporations are not living inside your walls, they are simply using tracking pixels to spy on you. In this video I will explain and demonstrate this technique, as well as discuss the various protections popular email services use to combat this. youtube.com/watch?v=TC09ml…