I like the way you make mistakes and show that you are human . You don't try to make yourself sound better than anyone. I love your videos. I know when I'm having trouble with something and you have a video about it I can watch and understand . You are a great instructor. Thank you so much.
Watching this playlist in late 2023, I swear it is so relevant and informative. Thank you for explaining everything so well. I am going to watch the complete series.
Benefits of simple video editing: Shorter, and more consise videos thus a more refined pedagogical approach. Less data = faster upload to TH-cam. No redundant "whoopses"; appears more intelligent. Happy followers keep following.
Ty for this I major in computer networking but want to get into it security don't want to pay money to back to school when can teach myself and get certs thank u for taking time making these videos for us to learn and enjoy.
Since your tutorial claims to be for beginners, I’d say it’s okay. Maybe not explained at a beginner’s level but well enough to be forgiven. One thing you should do for these tutorials is set up a dummy network to perform the attacks against. This would be immensely helpful and make things much clearer for learners in numerous ways that I’m sure you can already understand
Thanks Alex Ahmed !! really appreciate your hard work for making these informative videos :) I literally search hundreds of TH-cam channels for Hacking and Penetrating tutorials but I can't find the right one , But now I am happy because I Am now in the right place :) Where all the information is free , THANKS MAN LOVE FROM INDIA
I just found your channel and I am glad I did! Great content; not too easy but not too complex either. You guide us slowly and at a great pace. Your English pronunciation is also fantastic and as US immigrant I can tell you myself I appreciate that. You also zoom enough when showing the windows so those with old eyes like me can truly enjoy the video. Kudos. You have a new subscriber.
@@mrseveneight5355 I am using Parrot as primary, found too much issues while installing Kali itself and after installation very slow repos... I'd suggest go with ubuntu if you're a beginner
@@PathakFX I've been doing hacking for abt an year or twoo and m using Kali as my primary host, But lately I was thinking about switching to parrot cuz I have been hearing some benefits for the samw
@@mrseveneight5355 Both have their own benefits, I prefer Parrot OS because maybe My laptop might have Hardware compatibility on Kali. However both are based on Debian and still Parrot is more stable. However, The community of Parrot OS is not as active as Kali.
Sir you have said sorry many times in the video sir but it is not necessary because everyone does mistakes and no one is perfect I like all your video and once again thanks about the video sir
From what i learned, get to know that target system have specific vulnerabilities, such as Adobe, and we try to use the payload to infiltrate the target adobe .. Lets say, an ip that you suspicious that they use outdate service, such as port, smb or anything, and pentester will try to find the vulnerabilities on that service, if that success, we may get paid by provide the report to the company .. So now, 4 option MSF provide it to tackle our self on how we find that vulnerabilities .. Im newbie, thats how i understand MSF ..
Hello Sir, You have made me a big fan of HackerSploit. It will be very helpful and actually i'm requesting you to make a complete explanatory video playlist of metasploit. And can you make a video that completely explain how escalate privilege using metasploit from top to bottom? Have a good day. Best wishes for you. Thanks.
Super interested! I've always wanted something very close to this, but a little bit more advanced. In addition to this, *NERD STARK CORP* can trace (iOS/Smartphone/Ipad) the phone location history timeline (full) by only phone number and I want to thank them because of them I reached the top of my class and my school gets me grants to full courses for me to learn from and now even though I'm young I'm already starting toward studying for certifications.
i like the way you explained this concept to me now. how will i get to know how to open a .exe file in windows after the payload has been set by msfvenom? by downloading from apache2 service?
Me: Wanting to dress up as a cool Secret Agent guy for dress up day tomorrow which is only available to year 12s and once in a lifetime event. HackerSploit: It's a whole series! Me: I have time.
Does the metaspolit framework similarly `work on the Kali Linux windows edition,and does the commands and directaries also be the same in the Kali Linux windows edition which is available in the Microsoft Store?
To add to this - if you can, get hold of a buisness level laptop. these arent often sold directly to the public in shops and have proper quad core cpu, not just a dual core with hyperthreading.(that is not a quad core !)
Is there a way to find a list of the exploits ? Like how you used the flash exploit is there a webpage or a comand for terminal that will list all the usable exploits ?
Everyone is missing the fact that my man is spending time recording videos for us during Christmas night
he is Hindu not christian.
@@realkrsna what u talking about dick?
@@usmanmughal5916 oh I thought he is a russian :>
His name is Alexis Ahmed
@@usmanmughal5916 Lets just enjoy his sarcasm in his comment, okay
I like the way you make mistakes and show that you are human . You don't try to make yourself sound better than anyone. I love your videos. I know when I'm having trouble with something and you have a video about it I can watch and understand . You are a great instructor. Thank you so much.
I am not human.
@@nimitzopsoiLULW
vorp
5:30 postgres
7:30 metasploit
9:30 metasploit commands
Watching this playlist in late 2023, I swear it is so relevant and informative. Thank you for explaining everything so well. I am going to watch the complete series.
Sometimes I get on your videos randomly and I know that is you with your unique way of presenting your videos. This is so pleasant.
I love this guy he is the Bob Ross of hacking.
Whoops, we typed "serach" , instead of showing how to use an adobe flash exploit, I hacked the NSA, a happy little accident.
@@mrkiky What a coincidence!
Indeed
Most polite hacker ever. "Guys, I may have hacked into your bank account but I'm sorry. Apologies. Whoops."
He must be Canadian
Benefits of simple video editing: Shorter, and more consise videos thus a more refined pedagogical approach. Less data = faster upload to TH-cam. No redundant "whoopses"; appears more intelligent.
Happy followers keep following.
Agree
tutorials how hack wifi
hit
the red button if you want
learn th-cam.com/video/IUjJRqn5x-0/w-d-xo.html
im tryin to tell you the first thing he typed he had to redo 3 times....
I live in Karachi Pakistan and I like your comment if you don't mind
*W H O O P S*
W H O O P S
W H O O P S
Drinking game... take a shot every time he says W H O O P S.
haha no kidding! I'd be passed out by the end of the video! :-P
I am drunk as fuck.
Yeah dude. I ran out of booze.
Ahhh look at all the kids on this post. lovely. Seriously though, he made a lot of mistakes but the material was good once he finally got it right.
am try it i dont think ill be here to tell the results
Your videos are straight forward, and very well organized. Thank you for the time you spent to share your knowledge with us
Thank you very much
hi from haxor's keyboard(xd)
Ty for this I major in computer networking but want to get into it security don't want to pay money to back to school when can teach myself and get certs thank u for taking time making these videos for us to learn and enjoy.
thank you for helping a beginner, to now understanding computer science and how it all works
Since your tutorial claims to be for beginners, I’d say it’s okay. Maybe not explained at a beginner’s level but well enough to be forgiven. One thing you should do for these tutorials is set up a dummy network to perform the attacks against. This would be immensely helpful and make things much clearer for learners in numerous ways that I’m sure you can already understand
i dont have any problem with you but you seems to have more knowledge why not make your video for beginners like me to see and learn from
Your right, Corey but yeah, can you show us an attack on a dummy network?
tutorials how hack wifi
hit
the red button if you want
learn th-cam.com/video/IUjJRqn5x-0/w-d-xo.html
Hell yeah i am beginner so you're an expert hah?
L
Thanks Alex Ahmed !! really appreciate your hard work for making these informative videos :) I literally search hundreds of TH-cam channels for Hacking and Penetrating tutorials but I can't find the right one , But now I am happy because I Am now in the right place :) Where all the information is free , THANKS MAN LOVE FROM INDIA
Hello, thanks for the support on the channel I really appreciate it
20:48 Hits enter, gets USA nuclear missile codes.
W H O O P S
Get up Babri code
@@eushamahmud2108 hahaha
lol, no. he can barely navigate metasploit.
RainDog222222 it was a joke
This video deserves way more likes man
Oh my gosh, this is PERFECT! Where have you been all my life?! Thank you so much!
Your channel is just pure gold of content, I can't believe this all for free. You are awsome man. Keep the good work!
Your way of explaining is very helpful good keep it up ..
Thank you
Javanwright33@gmail.com me
@@jvendetta3174 and?
Dude I saw ONE video of yours and honestly I think you have the best hacking tutorials in all of youtube!!
Glad that I’ve found your channel. It’s helping me a lot on my journey. 🙏 thank you!
I just found your channel and I am glad I did! Great content; not too easy but not too complex either. You guide us slowly and at a great pace. Your English pronunciation is also fantastic and as US immigrant I can tell you myself I appreciate that. You also zoom enough when showing the windows so those with old eyes like me can truly enjoy the video. Kudos. You have a new subscriber.
We love your videos explaining depth thank u for upload we are waiting for metasploit other video
This is very simple to understand through this video only .
wonderfull
This is perfect, I have 8gb RAM and I5 processor
Thank you so much, you are the best I like how you explain the metasploit all the love from KSA
So you have Parrot operating System. cool.
Atleast less bugs and fast repositories than Kali
@@PathakFX Kali has more bugs?
I am a noob that's why askinnn,
Is parrot better?
@@mrseveneight5355 I am using Parrot as primary, found too much issues while installing Kali itself and after installation very slow repos... I'd suggest go with ubuntu if you're a beginner
@@PathakFX I've been doing hacking for abt an year or twoo and m using Kali as my primary host,
But lately I was thinking about switching to parrot cuz I have been hearing some benefits for the samw
@@mrseveneight5355 Both have their own benefits, I prefer Parrot OS because maybe My laptop might have Hardware compatibility on Kali. However both are based on Debian and still Parrot is more stable. However, The community of Parrot OS is not as active as Kali.
Bro may abundance of health be with you. This is priceless. Thank You!
Very very educational, and interesting.
Awesome explanation of Metaspoilt Framework and its modules and functions. Thanks for your time. Much appreciated.
please make a complete series of this and dont left any topic regarding metasploit..
and great work on the app ..
Wil do, than1ks for the support
david chest my request is also same
I second that
and I third that
Leonidas Platonas I fourth that
great video brother wanna see more of u
Sir you have said sorry many times in the video sir but it is not necessary because everyone does mistakes and no one is perfect I like all your video and once again thanks about the video sir
From what i learned, get to know that target system have specific vulnerabilities, such as Adobe, and we try to use the payload to infiltrate the target adobe ..
Lets say, an ip that you suspicious that they use outdate service, such as port, smb or anything, and pentester will try to find the vulnerabilities on that service, if that success, we may get paid by provide the report to the company ..
So now, 4 option MSF provide it to tackle our self on how we find that vulnerabilities ..
Im newbie, thats how i understand MSF ..
just liked the video. thank you so much for your effort mate!
This will help a lot of folks! Great explanation, keep making more and more videos.
Hello Sir,
You have made me a big fan of HackerSploit.
It will be very helpful and actually i'm requesting you to make a complete explanatory video playlist of metasploit.
And can you make a video that completely explain how escalate privilege using metasploit from top to bottom?
Have a good day. Best wishes for you. Thanks.
Did anyone else notice that it was recorded on christmas eve 24 december
lol, was just thinking the same thing
@@andreha3220 what about his dumb?
The gift of giving
Good observation
XD
This guy is just great
We love you sir hackersploit for this amazing video you have givw to us thank you sir we love you
Well well explained sir i really understood this video with execution
Thank you for your time and effort.
Very nice video great sir
THX 4 this excellent vidéo !
this is a very very good video
Skip to 1:30
Have been waiting for this
Thanks
awesome. I like this video....
Very grateful, thanks a lots sir
Super interested! I've always wanted something very close to this, but a little bit more advanced. In addition to this, *NERD STARK CORP* can trace (iOS/Smartphone/Ipad) the phone location history timeline (full) by only phone number and I want to thank them because of them I reached the top of my class and my school gets me grants to full courses for me to learn from and now even though I'm young I'm already starting toward studying for certifications.
bot
Thank you sir for helping us.
Thank u soo much
It was awsome💟
in downloading all tutorials, thanks very much
This is awesome I want more of this
Amazing video thank you for the knowelge
FYI tabbing for auto complete will save you some hours
Awesome video
THanks man, learning a lot
Howdy, thanks for making this series! Any plans to make an updated series for v.6 ? Cheers!
great explanation
It's very helpful , I have a request can you upload the video about "automate metasploit using python"thanks
Thank you very useful. Can I use Owasp Zap to research the network attacks and security audit ?
Thank you. Appreciated your effort. I'm inspired. P.S. Repetition Breeds Confidence 👍😎
I live in Karachi Pakistan and I like your comment if you don't mind
use tab to get full path you will more easily navigate commands
very useful lecture
i like the way you explained this concept to me now. how will i get to know how to open a .exe file in windows after the payload has been set by msfvenom? by downloading from apache2 service?
thanks for all the videos
very interesting class and please uploading more videos
Good job bro......
Thanks
Excellent video
Thank you sir this helped me to learn a lot ...keep uploading and please use a valid IP and show us how the attack is done
I subscribed. Gr8 video by the way!! 😃👍
can you subscribe me
Now I got the WHOOPS virus too 😅😂
But really, awesome stuff ! Thank you so much 😊
Thanks that helped me!
Me: Wanting to dress up as a cool Secret Agent guy for dress up day tomorrow which is only available to year 12s and once in a lifetime event.
HackerSploit: It's a whole series!
Me: I have time.
Thanks for the video man, looking forward to upcoming episodes
Thanks
I'm using my own os 🐾🐾🐾
Does the metaspolit framework similarly `work on the Kali Linux windows edition,and does the commands and directaries also be the same in the Kali Linux windows edition which is available in the Microsoft Store?
yes am using it now lol
You can also run it from a usb you will just need a spare one or external hard drive for any extra storage space
Yes
Dakota Bennett No, you only need one flash drive. Use persistance.
Amazing video!
Love your videos Thanks very much
To add to this - if you can, get hold of a buisness level laptop. these arent often sold directly to the public in shops and have proper quad core cpu, not just a dual core with hyperthreading.(that is not a quad core !)
Can you make a video for stagefright..... I will be really really grateful to you
Is there a way to find a list of the exploits ? Like how you used the flash exploit is there a webpage or a comand for terminal that will list all the usable exploits ?
vulscan its an nmsp script
Amazing video, Man !!!!
Very good intro, thanks for posting.
I live in Karachi Pakistan and I like your comment if you don't mind
We love your: W H O O P S
Thanks for your videos! Big like and subscription for you!
Thanks alot for this man
That was perfect!
Can you please repeat which os u r using?
I just want to say thank you for this your tutorials are amazing.
I am looking for a girl to be my girlfriend Do you accept to be my girlfriend
Why have some disliked information? However, great video. Helped me alot.
Everyone has an opinion, I am always ready to face criticism.
good stuff.... Thanks for sharing
Thank you so much for this video
Also how did u repost the command at 12:55? I dont know how to do that.
good video
It gave lil bit overview, better for the beginners : )
You are amazing!!! Thanks
why you are using parrot instead of Linux.. is there any difference or its your favorite?