Great video! Btw, since metasploitable is made to be vulnerable, it's probably best to put it in a NAT network (or even host-only adapter) in your VM program instead of bridge, since that can serve as a vulnerable pivot on your home network
Yep! Bridged networking generally circumvents your host OS's network stack and directly interfaces with your hardwares interface card. Host-only creates a virtual network interface (like loopback!) that connects the host and whatever is hooked up to the host-only network. Lets say you hav a IoT device that is compromised on your home network. And your metasploitable instance is running on the same network in Bridge Mode. Lateral movement from the IoT device to the vulnerable host would be trivial. Ideally metasploitable should be running on a air gapped network.
It's actually pretty cool to see you passing some good knowledge that a lot of people try to make it seem more difficult than it actually is in a conversational, fun way. You're also a lot prettier than the usual chap when it comes to this type of information lol good stuff
I really like metasploit, especially when my reverse shell closes for no apparent reason and I have to restart the whole app and repeat everything step by step because at some moment I decided that creating persistency was overkill.
Hello! i'm new i wanted to try out tools that can be useful for cyber security currently now i'm an college freshmen student, i do have linux/Endeavour OS on an new laptop, My desktop is windows 11.
I know she is an undercover fed but where are the other infosec nerd attractive girls? How can i find them? Any osint tip? I want to solve htb retired machines with my girlfriend. It would be a dream life for me.
"smile, you're on camera" jokes on you fed i duct taped my cam
Mine has a manual slider to physically cover the lens. Game changer.
@@anonamos225 that's so cool man
@@anonamos225 mine has a reverse mirror proxy mainframe, so all they can see it themselves 💡
Great video!
Btw, since metasploitable is made to be vulnerable, it's probably best to put it in a NAT network (or even host-only adapter) in your VM program instead of bridge, since that can serve as a vulnerable pivot on your home network
Yep! Bridged networking generally circumvents your host OS's network stack and directly interfaces with your hardwares interface card.
Host-only creates a virtual network interface (like loopback!) that connects the host and whatever is hooked up to the host-only network.
Lets say you hav a IoT device that is compromised on your home network. And your metasploitable instance is running on the same network in Bridge Mode.
Lateral movement from the IoT device to the vulnerable host would be trivial.
Ideally metasploitable should be running on a air gapped network.
Something is wrong with the audio, it is really noticeable with headphones
She's AI-generated, duuuh. Our favorite fed isn't real at all
I hear it too. Sounds a bit like flapping wings.
Sounds like a usb ground loop
@@kittoh_ Maybe she's clapping under the desk.
@@l_am6231 that's a possibility 😂
can you make a free course on these tools briefly because you do real hacking in most of the videos.
Vote for this, if you want it.
They can't hack TempleOS
Nice vid! - Also that was my favorite shirt that I got from defcon haha
Amazing that video summarises a 2 hours video I just watched in less than 9 min 😂😅 that’s a great content keep it up
now you ready for a TOP Secret Microsoft CEO job
Great stuff! About framework, I also see Sliver and Havoc are awesome sauce too! Maybe you can make content about it.
Favorite fed back on it!
Fed?
@@REDCULT-is-Live Federal Agent
It's actually pretty cool to see you passing some good knowledge that a lot of people try to make it seem more difficult than it actually is in a conversational, fun way. You're also a lot prettier than the usual chap when it comes to this type of information lol good stuff
chill....
Least obvious fed shows us how to penetrate metasploitable 2
lmaooo
I really like metasploit, especially when my reverse shell closes for no apparent reason and I have to restart the whole app and repeat everything step by step because at some moment I decided that creating persistency was overkill.
Can you guys also hear a constant noise in the background or is it just me???
probably its just the mic
Its her fiends the Feds...
great videos, greetings from Mexico
great stuff as always!
Dp you ever stream on twitch and do like CTF stuff?
I'm not falling into your honeypot, nice try agent
Hell yeah blue team LFG
Can you do one for pure-FTPD
hacker mommy
Can you please add that background music in yt videos like you do in Instagram
Is this how the “Green team” plans to join the work force, via copy. Documenting is a thing along with plagiarism. Pls state your source!
Interesting...
I love backdoring ;)
what?
Do you have vampire teeth? xD 🧛🧛
🧄
how do you use the root hashpassword to change permissions of files
bro ! the moment u get "root" u can litteraly do anything without a password
Am in love
haram abi
Hello! i'm new i wanted to try out tools that can be useful for cyber security currently now i'm an college freshmen student, i do have linux/Endeavour OS on an new laptop, My desktop is windows 11.
my wife😂❤
nice
scary
not if the lights are out... 😉
I make my own malware with cpp, fud 🤪
this is the latest point of AI. nice honeypot dear Fed. congratulations
👁
hay me gustas mucho eres muy hermosa y inteligente
xd (me bloquea)
++content
This time i know for sure .. man i surely found me self wondering what went wrong
Tu eu tu linda ❤❤❤❤
que paso aguey
My wife left me
she told me
@@Themrhamoud oh yeah I remember something too
how i can avoid to be hacked? 😊
Don't connect to the internet the best option
@@adelalrahman no way 😄
I think I've fallen in love. The problem is how do I communicate with her?
by hacking... duh
I know she is an undercover fed but where are the other infosec nerd attractive girls? How can i find them? Any osint tip? I want to solve htb retired machines with my girlfriend. It would be a dream life for me.
you need to learn computer programming instead of copying and pasting
Good luck.

live laugh cyb3rmaddy