Overview: 0:01Yersinia Overview: 0:58Install Yersinia: 3:08Yersinia options: 4:07Run Yersinia: 4:40Use Putty to view Switch configuration: 5:38Bridge Kali Linux to the physical Ethernet network: 10:28CDP flooding: 11:40Spanning Tree (STP) hacking: 13:49
======================Previous Video:======================Kali Linux installation video: https://youtu.be/AnwgxRtWXLI
======================CCNA content:======================Free CCNA content: https://www.youtube.com/playlist?list=PLhfrWIlLOoKM3niunUBTLjOR4gMt_uR_aCCNA course: http://bit.ly/2PmTVPD
======================Free Network Software:======================Solar-PuTTY: http://bit.ly/SolarPuttySolarWinds TFTP Server: http://bit.ly/2mbtD6jWAN Killer: http://bit.ly/wankillerEngineers Toolset: http://bit.ly/gns3toolsetIP Address Scanner: http://bit.ly/swipscanNetwork Device Scanner: http://bit.ly/swnetscanWifi Heat Map: http://bit.ly/wifiheatWifi Analyzer: http://bit.ly/swwifianalyzerSolarWinds NPM: http://bit.ly/getnpm
c2960-CG#sh runBuilding configuration…
Current configuration : 2984 bytes!version 15.0no service padservice timestamps debug datetime msecservice timestamps log datetime msecno service password-encryption!hostname c2960-CG!boot-start-markerboot-end-marker!enable password cisco!no aaa new-model!ip dhcp pool vlan1 network 10.1.1.0 255.255.255.0 default-router 10.1.1.254 dns-server 10.1.1.254!ip dhcp pool vlan2 network 10.1.2.0 255.255.255.0 default-router 10.1.2.254 dns-server 10.1.2.254!!!!!!spanning-tree mode pvstspanning-tree extend system-id!!!!!!!!!vlan internal allocation policy ascending!!!!!!!!!!!interface GigabitEthernet0/1!interface GigabitEthernet0/2 switchport access vlan 2 switchport mode access spanning-tree portfast!interface GigabitEthernet0/3!interface GigabitEthernet0/4!interface GigabitEthernet0/5!interface GigabitEthernet0/6!interface GigabitEthernet0/7!interface GigabitEthernet0/8!interface GigabitEthernet0/9!interface GigabitEthernet0/10!interface Vlan1 ip address 10.1.1.254 255.255.255.0 no ip route-cache!interface Vlan2 ip address 10.1.2.254 255.255.255.0 no ip route-cache!ip http serverip http authentication localip http secure-server!!!!line con 0line vty 0 4 password cisco login transport input allline vty 5 15 login!end
Great to see you putting out Kali-based material, David. Looking forward to the others!
Thx Mr.David but I haven't a physical switch
You are my admirable teacher.
Thanks David !! Always a pleasure to watch your videos 🙂
Omg I’ve been waiting for this series on your channel for some time. Your content is amazing, I love your channel!
Great David! The best teacher ever!
Great video mate, time for some hacking!
Awesome video… Great start for Ethical Hacking / Pen test. 👍
Hi David…!!!! Nice video….how clear, crisp and deep are your videos…..love them the way you explain….god bless you 😀😀😀😀
David, you're giving too much free game away…nice video.
And it begins 🙂 Thank you David
In this video David said, you do not have to watch my course go watch other youtubers if u want but i assure you watch his tutorials. It will change ur life. (PS:yeah indeed there are a lot of good youtubers, I respect and love them as well). I am a simple guy, how do love hacking and i can tell u after knowing networking I do big steps in cyber security.So my friend, if u want to be a good network pentester (i hope one day aswell)then start with David's tutorials. PS: most of them here in youtube but do not forget go to udemy for more.
are we supposed to use default vlan in cisco switches, as I have learnt that using default vlan is insecure and need to move all un-used ports to another vlan.
please advise. ta.
Hi David, Can I attacking the physical network while I stay connect ?
I didn't usually comment on Youtube….but your videos….loving them..!!!! <3 <3
Excellent Video, Keep it up.I am very crazy these type of videos. I am learning day by day. Your Teaching method and explainaion both are good.
I would request you that please make network diagram using GNS3 / White board with physical topology for better understanding.
Usman From Pakistan
Best of all 👏
Great presentation David, keep up the awesome job you are constantly doing!
Network Admin should shutdown unused ports and apply port security on active switch interface and disable DTP and VTP , change Default vlans and no cde enable on active switch ports other than uplink ports . CCNA teaches all these practices ! -> student at Cisco Networking Academy .
Thank you sir loving your videos, want to have a conversation u in personal pls share ir social website handles if u dont mind
David You are the best teacher i never seen.One day i will bcome as you
Hi David, thanks for making the videos, knowing that you are also using GNS3 with Mac, want to see if you have any recommendation for "chicken of VNC" replacement? It seems will not work anymore on Catalina
Thanks a lot for video David. Very Informative and cool.
many learning channels on the internet, you are very good David. I love your effort for videos and good explaining.
Thanks Dave ….Can this type of hacking work in gns3
Informative video David. Also appreciate your desk / studio. It's eye-catching..
Great start for very interesting series David please keep it up:)
Thanks David, to me what would be helpful now is to know how to shut down or prevent a hack on the switch.
Windows key + break
amazing and informative, please continue this series
Your email address will not be published. Required fields are marked *
Save my name, email, and website in this browser for the next time I comment.