@@csmeby I will say though, it won’t qualify you for the cert. you need to take an updated one. Mine for example covers CEH 9 and they are on 10 now. All knowledge no cert.
Awesome video. Quick and easy overview of the process and tools. My only criticism is that you should include steps to cover your tracks (clear logs, command history, etc on the target machine)
I'm studying Cyber Security, at a government run College in Australia and I missed my Pen Testing class today due to illness, so I am just curious as to what I have missed, and how it works.
Allow me to remind you of the first and most important step, legal documentation. This includes a Business Impact Analysis (BIA), Rules of Engagement (ROE), and so on.
@Da Boss There are a lot of companies looking for pentesters and technical security people. However most companies tend to hire people who studied. OSCP is nice to have, but you must have luck to find a company willing to give them a chance. Best thing to do is to do an IT bachelor (or master, even better) and then get the OSCP certificate.
Forest River Yeah I’m sure you should be a black hat hacker and parade it around. Luckily there are real specialized people who are taking care of their work, instead of internet heroes.
I tried to run nmap -sV -p 80 on my terminal but it shows error says the term 'nmap' is not recognised as the name of cmdlet, .... someone tell me why?
A lot of these videos I see are already on the network, let's say you're not on the local network already how would you begin? Reason I ask is my manager has asked me to run a pentest as "someone who parked outside our office on a Saturday with a laptop and mobile hotspot. Appreciate the help!
You have monitor tools that detect some kind of behavior that can be associated to different hack technique. You can monitor your .log server file or directly the network traffic inside a network especially if you search for inside attack.
I don't understand why you say that SSH is usually associated with port 80. The SSH default port is 22, while 80 is Http default port. Anyhow, I enjoyed your video, really interesting.
Bro im currently in the process of making a program out of cmd (cuz thats currently my only coding tool i know how to use). Currently with it you can track ips, ping ips, and manually shutdown computers on the same router as you. What do you suggest i add to it next?
Hey if you’re still interested, search up how to get kali Linux in a virtual machine I suggest virtual box and it gives you many tools to hack and such but you can use some of them for creating a program
Hi bro. I am using kali in vmware in my laptop with contains Intel chip in it . When I try to run apache2 server in kali, it's not working. I have tried to restart it by uninstalling & installing it again. Can you help ee with this bro.
Hi, 2 things to help your skin, eat beats (sometimes skin problems mean something is wrong inside body) and mix yogurt with honey for outside on skin. Nice video, too advanced for me.
@@wickedwolf8438 Toxic? I don't make asshole comments about the physical appearance of college students bringing you content in their free time during a pandemic and then act like a victim when I get called out for it. When I started this channel, it was people making comments like yours that made me doubt if creating content was worth it. Keep this shit on Reddit.
To be sincerely speaking in my humble opinion without being sentimental and judgmental and of course without offending anyone who thinks differently from my opinion, but the name above recovered it all for me in no time! I've vowed to always preach about ifastbrake! 👈🏼
Can we just appreciate how he puts himself on FBI watchlist just give us good content!
Lemme just *checks list*, yup.. you're on my list too
@@RETRO-DEV wait what😶 😂😂😂😂
@@eyelessclowned oops.. that was public? :/
Someone's in trouble xD
Don't worry about me....
@@zyan983 I'm watching you too buddy
Ooo. A blinker! This is new
@Paul Lombard wdym no one blinks
Paul Lombard it’s a J O K E
@Paul Lombard YOU SIR, DESERVEEEEEEEE r/wooooosh ( ͡° ͜ʖ ͡°)
beats me
What’s worse than people who reply seriously to jokes are people who delete their reply when they get humiliated.
If you study the CEH certification you will learn this more in-depth. Very informative content as always.
Which website do you use to study the CEH certification?
@@khairulazahar5958 I have a course from 2017 that I have lifetime access to. It cost $4500, if you rly want to learn, I’ll hook u up
@@Themusicbiz I would love that!
@@Themusicbiz slide that shit yo
@@csmeby I will say though, it won’t qualify you for the cert. you need to take an updated one. Mine for example covers CEH 9 and they are on 10 now. All knowledge no cert.
Awesome video. Quick and easy overview of the process and tools. My only criticism is that you should include steps to cover your tracks (clear logs, command history, etc on the target machine)
Do not clear logs on a pentest. Clear them on a red team engagement if you have confirmed it with the client.
Man this is the kind of videos we want xD, awesome. More like this but with more dificult vulnerabilities.
You seem to have a gift for explaining difficult topics very well ty
I think the quality of content has gone down tbh, there was way too many times he blinked. it's just unnecessary
U got me lol
I too hate wasted blinks
Its Morse code...
I think its his (unsuccessful) way to convince us he’s human.
@@PB-eg2je People complaint he hardly blink and now he blinks and they complain again. Human being can never be satisfied
I'm studying Cyber Security, at a government run College in Australia and I missed my Pen Testing class today due to illness, so I am just curious as to what I have missed, and how it works.
Allow me to remind you of the first and most important step, legal documentation. This includes a Business Impact Analysis (BIA), Rules of Engagement (ROE), and so on.
Exactly. As a pentester myself, I do not start without any of these documents. Good addition.
@Da Boss There are a lot of companies looking for pentesters and technical security people. However most companies tend to hire people who studied. OSCP is nice to have, but you must have luck to find a company willing to give them a chance.
Best thing to do is to do an IT bachelor (or master, even better) and then get the OSCP certificate.
Yeah I'm sure a blackhat would get all of this first. Thanks for giving out that advice.
Forest River Yeah I’m sure you should be a black hat hacker and parade it around. Luckily there are real specialized people who are taking care of their work, instead of internet heroes.
@@JakeTheMDog Please im new on this, how dp i set up my lab?
Video on hacking is 13:37 long... I see what you did there. 🧐
what??
man of culture
1337 LOL
@@Hamza-gn2cg If no one gets this, I'm done. XD
@@fourofour9569 I know RIGHT?
3:46 what does Galaxy-S10 do in your nmap scan???
I tried to run nmap -sV -p 80 on my terminal but it shows error says the term 'nmap' is not recognised as the name of cmdlet, .... someone tell me why?
A lot of these videos I see are already on the network, let's say you're not on the local network already how would you begin? Reason I ask is my manager has asked me to run a pentest as "someone who parked outside our office on a Saturday with a laptop and mobile hotspot. Appreciate the help!
How do you find out if someone is using these methods or similar against you? Thanks in advance!
In theory, you don't.
By monitoring you network To detect scans and weird trafic coming from someone. Also check your website and server logs every time.
You have monitor tools that detect some kind of behavior that can be associated to different hack technique.
You can monitor your .log server file or directly the network traffic inside a network especially if you search for inside attack.
How do I download the correct Nessus? My wont work for some reason
I don't understand why you say that SSH is usually associated with port 80. The SSH default port is 22, while 80 is Http default port. Anyhow, I enjoyed your video, really interesting.
SSL* Its a TL Encryption.
@@mathsocraft7816 SSL should be on port 443
@@mathsocraft7816 👎
Null Noob question i need to set up a system on my network running Apache to pentest correct?
His blogs are awesome!!
Maaann this guy is the real G.O.A.T
Great video. I’m new and don’t understand a lot but I’m getting there! Just set up a raspberry pi with kali to do some experimenting.
Bro im currently in the process of making a program out of cmd (cuz thats currently my only coding tool i know how to use). Currently with it you can track ips, ping ips, and manually shutdown computers on the same router as you. What do you suggest i add to it next?
SƎNTIИƎL 髪 traceroute is handy, and don't worry if you can only write command scripts, a lot of simple tools are written like that.
@@m1lkweed hmm ok thx :)
What you mean manually shutdown computers on the same network ? Do you just send command to the router and it shutdowns another pc or what ?
Hey if you’re still interested, search up how to get kali Linux in a virtual machine I suggest virtual box and it gives you many tools to hack and such but you can use some of them for creating a program
How can you tell that your being hacked, is there a live view software you can use?
Heh video time is 13:37 guess that makes you leet :D
Anyone notice the video length is 13:37
Thank you for explaining this thoroughly!
Thank you nullbyte
Hi bro. I am using kali in vmware in my laptop with contains Intel chip in it . When I try to run apache2 server in kali, it's not working. I have tried to restart it by uninstalling & installing it again. Can you help ee with this bro.
i love it when my like makes something even
i was the 500th like
And what about enumeration and establish foothold
I like to use linPEAS or winPEAS for to find anything we can use for privilege escalation
where can I get Nessus from I don't t have 3k???
Thanks for the great videos! good content and explanation.
btw can you make a video on how to set a undetectable VM?
So pen tests also have vulnerability scans already on them?
I want to click there website for full tutorial but then again they are hackers
I read their 8 courses details and they are convincing. but, buying and giving bank details to hacker mentor is not convincing.
You can do this on any version of Ubuntu, right?
Yes, but you may have to install some required programs.
700k soon❤️
where is orginal null byte??!
I'm here just because EC-Council says it is a 5 step process, the same way they say C|EH is practical n all.
Really good
Link is down
dig, host, rdns, nmap, metasploit
Yes those are tools we use
Bro please can you make a video on installing gvm (openvas) vulnerability scanner fir Kali Linux 2020.3
Ffs can’t get the damn nessus scanner cause I need to pay for a friggin business email 🤦♂️
It's really strange to watch a null byte video with someone who blinks
Can you crack the online ID ransomware pls ?
Great
Thx. Not your cup of tea but need Nessus on ARM hardware too.
These comments are golden.
2 years passed damn
Thanks you sir
SUP BOIS
Hey!! Where is cody?
My Man
hi null byte can you help me to learn me from indonesia
yeah i know how to do this except step 6
Like a Boss
how did kody k evolve into this !!??
Step 6?
You skipped reporting!
Hah, being in the field I was looking forward to that section 😬
Hi, 2 things to help your skin, eat beats (sometimes skin problems mean something is wrong inside body) and mix yogurt with honey for outside on skin. Nice video, too advanced for me.
Wow
Mmm, yes. I do feel like using this information for educational purposes ONLY. And I'm gonna do the sixth part for sure.
Just casually using software that has a license that costs several thousand dollars, okay.
Step 6. No matter how 1337 a hacker you are takes the longest ;)
At least it always feels that way
the only problem with this video is that nessus is not free
this is brilliant and i aint even a brit
can we appreciate that the time of this video is 13:37? 1337
what happened to the guy that doesnt blink
I'm here talking shit in the comments
Null Byte hahah
@@NullByteWHT 😂😂😂😂
Wait a minute Where is Cody? What did you guys do with Cody!?!?!?!?!? lol
4:20
Where has Codi gone?
The other Guy?
Vid is exactly 13:37 long
Blinking was never an option
underrated comment
P.S.: SSL is usually associated with port 443.
Where is Cody the Soul Ripper 😌
That's a badass nickname
@@NullByteWHT He really is
Damn the video is exactly 1337 long 🤣
Get those daemons uploaded.
Thank you for this amazing video. Please bring more content about hacking using android divese =)
I'm watching you...
I’m watching you to...
@@user-es2pd6he7l too* and no... No you're not...
@@user-es2pd6he7l also wtf is your username supposed to be
@@RETRO-DEV longest name in Africa
@@harambe2185 fair enough I suppose
The video is 13:37 long. Im sure it was a coincidence lol
Bro r u ok????
yes
@@NullByteWHT Then what r those red stuff on ur face???
@@abhikdutta2848 Are you an idiot?
@@NullByteWHT why?
@@NullByteWHT lol he must be lol
well if it aint nick...haha ha haha
WANTED. Alive or Dead :)
Amazing
Can you make a video on how to hack pubg
what the actual fuck. pubG is a game.
Evil or maybe a good copy of micheal reeves
nice timeframe xddd
Pls add indonesian sub
Ahh yes I remember 2 years ago when he used to stare straight into your soul without blinking
Not the same guy.
@@MarcoMazziniYT no im talking about the guy that was here 2 years ago
hope u understand
@@realhomy I misinterpreted your "he used to stare".
You have to admit that it's a bit confusing.
oh ok
Круто, довай жги пакрышки🤣🤣🤣
:)
print("Quality Content")
cout
java
System.out.println("Quality Content");
C
printf("Quality Content");
C#
Console.WriteLine("Quality Content");
Assembly:
section .text
global _start
_start:
mov edx, len
mov ecx, msg
mov ebx, 1
mov eax, 4
int 0x80
mov eax, 1
int 0x80
section .data
msg db 'Quality Content',0xa
len equ $ - msg
BrainFuck:
++++++++++[>+>+++>+++++++>+++++++++++++++++++++++++++.---------.---.+++++++++++.+++++.----------.-.++++++.---------------.+++++++++.++++++.
way too basic, can we get something more advanced?
=没有来自中国的评论=
OoOoooOOOOOOOoooOoooh 0 dislikes. ;)
i love not having a life and doing shit like this lol
Well u can have a life and still do it
@@boristodorov779 true true, but i write so many scripts that i do not have time for anything else....
*LOOSE* *THE* *CRAPPY* *MUSIC!!!!!!!!!!!!!!!!!!!!!!!!!!!*
you move too fast. we are not all like you bro. Please take time and try using relatable language
bro nice skin.. haha just kidding.. nice vid
I didn't come on the internet to take shit from people who believe in Q-anon.
@@NullByteWHT oh my god, no need to be toxic, it was a joke :) ...also no need to critize other people beliefs since i dont critize yours :)
@@NullByteWHT bann this fucker
@@wickedwolf8438 Toxic? I don't make asshole comments about the physical appearance of college students bringing you content in their free time during a pandemic and then act like a victim when I get called out for it. When I started this channel, it was people making comments like yours that made me doubt if creating content was worth it. Keep this shit on Reddit.
@@wickedwolf8438 oh god just stfu
please don't talk about his face :(
What about his face?
@@boristodorov779 dotted face :/
@nullbyte bann this fucker from this community
To be sincerely speaking in my humble opinion without being sentimental and judgmental and of course without offending anyone who thinks differently from my opinion, but the name above recovered it all for me in no time! I've vowed to always preach about ifastbrake! 👈🏼