NOTE: Anyone who is having trouble with connecting metasploitable with browser in kali 1) go to the metasploitable network settings in your hypervisor( virtual machine monitor or VMM) like virtual box 2) change to the adapter from NAT to Bridge thats all like so more people can see it
Though bridge gives an easier option to setting the network..but I would prefer you use host network ..it does the same but it has an added advantage..it doesn’t expose your vms to other people on the internet only your host can access them…bridge exposes your vms to other people on the network
sorry to be so offtopic but does anybody know of a tool to log back into an Instagram account?? I was stupid lost my login password. I would appreciate any assistance you can give me
As someone in the field, would you advice me to take this course? Is there an important gap between the content of this course and real work or is it very close please? (I am a complete beginner in cybersecurity)
@@ThisIsAli_Off I don't think you can simply watch 2 hours of video and suddenly become a professional. Especially not with computer given the huge amount of things to learn
@@w花b Yup, this is especially true for cybersecurity. Every time I think I start "mastering" the basics, I discover a totally new topic that I don't know anything about. It can be very intimidating to start cybersec when you see how large the field is and how hard it is.
You don't really know what penetration is until one day you find out that there is a back-door on your system that won't let you in! Hopefully this video will show the way to a better Internet experience!!!
Thank you so much for this video! I really appreciate, I was referred by Ted, he helped me throughout the whole process with no extra cost. This is my referral as promised mx076 on wickr or telegram.
why didn't this start with a thorough explanation or intro to what web penetration is? it seemed to be more about the tools used and not penetration testing as a discipline... Just a little feedback. who is the target audience for this btw?
Great video in which you have really given a lot of effort to explain everything in detail. I have a question about the DirBuster is there a way to get a list from a cloud instead of a local computer? regards -- Danny
I have 2 questions: 1) What is the purpose of setting the proxy? Why we set the proxy to localhost? Using this proxy I'm not able to reach a web resource. 2) I can't select the checkbox in the App, under the 'Proxy' -> 'Options' -> Running 4:59
Proxy servers act as a firewall and web filter, provide shared network connections, and cache data to speed up common requests. People generally use these proxy servers to make the website thing that this ip address didn't visit their site before.
Thanks for explaining the difference between the two but I’m new to cyber security I’m wondering which one to do first the pen-testing or vulnerability scanning? Any advise is welcomed as I’m looking for a book camp after I take a couple of online classes
Well... Am not beginner at all I know how to disvover open redirect vulnerabilities, csrf, xss, hpp, LFI, RFI and much much more and I feel am not achieving anything
I am running Kali in VirtualBox. It does not have a button to add an exception. Firefox was probably updated in the newer Kali. Does anyone know how to create the exception a different way?
hi, thanks for the videos. I have a question at bruteforce. When i go to response/render it shows Unable to render response! Why is this happening? any clue anyone?
@@curacao7546 @ 피모 haha yeah, just a programmers joke... kinda... ok a lousy attempt @ one hehe! That && 2much NOS intake in one day!!! but not enough actually.. *chuckle*
could one help please, Burp Suite would not open on a new Parrot security 5.3 installation ; also noticed chrome for Linux after freshly installed is behaving the same way and not starting ?
I am overwhelmed by the value this channel offers
this channel is a goldmine of knowledge
Same here.
This is from hackersploit, search it up
This guy is not only knowledgeable and a good teacher... he's extremely funny too....
NOTE:
Anyone who is having trouble with connecting metasploitable with browser in kali
1) go to the metasploitable network settings in your hypervisor( virtual machine monitor or VMM) like virtual box
2) change to the adapter from NAT to Bridge
thats all
like so more people can see it
Though bridge gives an easier option to setting the network..but I would prefer you use host network ..it does the same but it has an added advantage..it doesn’t expose your vms to other people on the internet only your host can access them…bridge exposes your vms to other people on the network
Thinks bro u are great ❤️
@@nathanielahaohello, I’m stuck, can we communicate please?
no i dont think opening metasploitable as bridged is safe for your home network
This is really amazing to hear hackersploit voice.
is it possible for you to create new playlist of cyber security because course is too old and lot have changed
Thank you a lot for the content, I appreciate a lot you taking the time to pass your knowledge forward
Thank you very much
hackerlouis05 on Instagram is the best when it comes to hacking
He's services are fast and legit and he doesn't charge much
sorry to be so offtopic but does anybody know of a tool to log back into an Instagram account??
I was stupid lost my login password. I would appreciate any assistance you can give me
is that video from hackersploit channel cause i heard hackersploit tag in the begening
Yes. We were so excited that Hackersploit gave us permission to post this great course.
@@freecodecamp a1
hackerlouis05 on Instagram is the best when it comes to hacking
He's services are fast and legit and he doesn't charge much
In the business for a while and was just curious. Well explained and presented. Cheers.
As someone in the field, would you advice me to take this course? Is there an important gap between the content of this course and real work or is it very close please? (I am a complete beginner in cybersecurity)
@@ThisIsAli_Off i would like to know this too
@@ThisIsAli_Off I don't think you can simply watch 2 hours of video and suddenly become a professional. Especially not with computer given the huge amount of things to learn
@@w花b Yup, this is especially true for cybersecurity. Every time I think I start "mastering" the basics, I discover a totally new topic that I don't know anything about. It can be very intimidating to start cybersec when you see how large the field is and how hard it is.
Amazing I learn a lot from this video thanks for sharing this knowledge with us on TH-cam.
Thank you so much Sir !!! You're a great Teacher! Be blessed!
Youre awesome teacher, can you please do a video on how to find the login username and password for a router gateway url? Please and thank you!!
even tho u speak faster but u still one of my best teacher. bless u
Thank you from Melbourne Australia
You don't really know what penetration is until one day you find out that there is a back-door on your system that won't let you in!
Hopefully this video will show the way to a better Internet experience!!!
I'm watching this nearly after 2 years
but it is still much more informative 👍
Finally ! Something with PARROT OS, There is no books available about parrot os. 😢
Thank you so much for this video! I really appreciate, I was referred by Ted, he helped me throughout the whole process with no extra cost. This is my referral as promised
mx076 on wickr or telegram.
@@asmerdam5126 thanks alot for sharing this!
@@asmerdam5126 just contacted him! hoping for the best
omg! this is an awesome video. 3 hours? yep. the longest video i ever seen.
Check out start hacking today
I love this org and youtube channel
doing this. been wanting this for a long time
Thank you Tesfay. Such a great video for study purpose.
"really really really really really really really really really really " "all good stuff"
irregardless
You need to have pro version of burpsuite right, mine doesnt have few of the important options like spider and all.
Sick cant wait to dive into this!
So explanatory. Thanks alot.
But can one of these methods be used to bypass otp verification code...If you could do a video on that
why didn't this start with a thorough explanation or intro to what web penetration is? it seemed to be more about the tools used and not penetration testing as a discipline... Just a little feedback. who is the target audience for this btw?
This is amazing stuff for beginners. Thank You
"really really really really really really really really really really " "all good stuff"
Hey Hashim! Do I need to learn anything prior for this course? And where can learn it (paid/free). Thanks
@@parmeet8455 depends on your study background.
nice and recommended indeed bravo work😍
Great video in which you have really given a lot of effort to explain everything in detail.
I have a question about the DirBuster is there a way to get a list from a cloud instead of a local computer?
regards
-- Danny
Strong title, great content.
So easy to follow thx
I'm going to quite CSGO and start this tutorial from today....
I recommend English lesson first
@@aronpop1447 hahah..
The first thing you have to do is learn Proxy Chaining before you try to hack anything. Just a thought
thank you so much for this video, makes everything so clear : thank you!
I have 2 questions:
1) What is the purpose of setting the proxy? Why we set the proxy to localhost? Using this proxy I'm not able to reach a web resource.
2) I can't select the checkbox in the App, under the 'Proxy' -> 'Options' -> Running 4:59
Check settings, you can reach everything, proxy is only intercept the request/response
Proxy servers act as a firewall and web filter, provide shared network connections, and cache data to speed up common requests.
People generally use these proxy servers to make the website thing that this ip address didn't visit their site before.
46:32 timestamp for me
It's been 6 months ago..how is it going? Was the information in the video outdated?
@@mozart0 nobody ever rep loss for updates lol
a wesone but knowledge of socket programming in python is a must
If you want to learn to make a port scanner faster than Nmap here it is: th-cam.com/video/g73Lkv3-MbA/w-d-xo.html
@@spyrosdev2533 that video was removed, have you any links/other vids on the subject?
this better not be illegal i woke up to this video
I think I have to take Hasking
Thanks for explaining the difference between the two but I’m new to cyber security I’m wondering which one to do first the pen-testing or vulnerability scanning? Any advise is welcomed as I’m looking for a book camp after I take a couple of online classes
vulnerability scanning bro
the best lesson you need to learn in this tutorial 2:12:25
How to learn ethical hacking as a beginner without having prior knowledge? Please tell step by step process. Where to start? Thanks
@bang zoel explain please
I wish you did the video in a better quality, better for our eyes :)
TH-cam is still processing. Should get better soon.
@@freecodecamp Thank you! I'll return later to watch it. I look forward to it!
how great you are man! i salute you. you make me believe!
Thank you, many source used money for acces
Thanks Brother .....its very useful to me
Being that Burp no longer offers the spidering functionality, What are some of you out there using as an alternative? ZAP?
Is it legal to use your website to learn along the way with the video ? By letting Burpsuite at it ?
Any prerequisites for this course?
How can i do web app testing for any website given?
Thanks for this ❤
really helpful video for bigginer
very good
Just curious, what are the prerequisites to get into this one?
Understanding of how the internet works and linux maybe some python js html and css
Brilliant, thank you 👍
Is this done on a virtual enviroment?
When are you going to make an advanced course?
не может
'alert("Awesome content man .. love it")
Most Wanted video
why there is no spider branch on latest version of burp suite
Thanks Alexis
The thumbnail title could be taken another way
Many thanks for this video. DO you have next video in this series?
I wanted to learn, but my comprehension ability was weak
I wanted to learn, but I got distracted by penetration testing my girlfriend in an org-y to plug all her holes... if you know what I mean. xD
@@BillAnt 😂😂
Well... Am not beginner at all I know how to disvover open redirect vulnerabilities, csrf, xss, hpp, LFI, RFI and much much more and I feel am not achieving anything
I am running Kali in VirtualBox. It does not have a button to add an exception. Firefox was probably updated in the newer Kali. Does anyone know how to create the exception a different way?
I had the same problem.But I installed parrot os,and the problem is solved
You can use an usb for runnig kali linux in your pc :)
What happened to the spider tab in burp suite? It doesn't seem to exist in burp suite 2020.
This is really awesome
pause at 1:25:27 and shake your screen (if you are on your phone).
It's saying that the proxy server is refusing the connection on firefox. What should I do now?
hi, thanks for the videos. I have a question at bruteforce. When i go to response/render it shows Unable to render response! Why is this happening? any clue anyone?
im not able to find the spider section in burpsuite??
as they have removed it and its there in the premium version now
Doing a cyber security course 3 mins in this is a security prompt sayingnits not safe" don't worrie about this"
I am looking for a course to start to be a bug bounty hunter someday this is great, the hacker101 courses are suck so boring full of slides
How can I become a web server penetration tester?
Prerequisites?
Same question here bud
@@sithmasterstarkiller7781 Are you ok? Amen, brother!
@@curacao7546 @ 피모 haha yeah, just a programmers joke... kinda... ok a lousy attempt @ one hehe! That && 2much NOS intake in one day!!! but not enough actually.. *chuckle*
@@sithmasterstarkiller7781 Lol..
thank you very much
excellent choice, alexis FTW
Africa to the world!
Good
Hello sir,
I would like to know Which programming language would be beneficial for cyber security?
Python is nice
@@anthony-jt2mv thanks a lot 😀😀😀
@@anthony-jt2mv after learning python what is the next step and can u pls explain difference between bug bounty , penetrating, and hacking please bro?
Are we able to use zap in bug bounty programs ? If no, how to use it legally
They have removed spidering option from the community edition now. Any alternatives for this?
OWASP ZAP has spidering for free. Use this instead
Yes
Ok
Hello, how can i get firewall name and version, tried wawoof, but its giving a wrong name. any other way?
there is no spidering in the burp suite.
Spidering is not in the new version of burp
How to set metasploitable 2 ?
Struggling with same problem atm
Google...
Buen contenido ⭐⭐👋👋
صلوا على الحبيب المصطفى صلى الله عليه وسلم.
alas, there's no more Spider in Burp in 2020...
anyways, great lesson
?
could one help please, Burp Suite would not open on a new Parrot security 5.3 installation ; also noticed chrome for Linux after freshly installed is behaving the same way and not starting ?
Yea u are going to
good
I have a problem where he says manually setting up firefox proxy in 22:00 , it doesn't allow me to visit any site. What can I do to solve it?
i dont know but ill like your comment so that it can get to the right person
@@leafytreegaming4168 Thanks a lot, I found the answer though.
Parrot Os?
Algofukmerithm!
I need some CEH-V10 tutorial please..
Hello my name is jerome Davis from Microsoft.
Is it enough for bug bounty
instruction not clear,why fbi is in front of my door?
Getting to the chopper.
can i know if i do it without virtual machine... do my ip will get blocked? why cant we perform such attacks from our own OS like windows 10 n etc?