Simple Penetration Testing Tutorial for Beginners!

แชร์
ฝัง
  • เผยแพร่เมื่อ 17 มี.ค. 2022
  • // Membership //
    Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: / @loiliangyang
    // Courses //
    Full Ethical Hacking Course: www.udemy.com/course/full-web...
    Full Web Ethical Hacking Course: www.udemy.com/course/full-web...
    Full Mobile Hacking Course: www.udemy.com/course/full-mob...
    // Books //
    Kali Linux Hacking: amzn.to/3IUXaJv
    Linux Basics for Hackers: amzn.to/3EzRPV6
    The Ultimate Kali Linux Book: amzn.to/3m7cutD
    // Social Links //
    Website: www.loiliangyang.com
    Facebook: / loiliangyang
    Instagram: / loiliangyang
    LinkedIn: / loiliangyang
    // Disclaimer //
    Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers.
  • วิทยาศาสตร์และเทคโนโลยี

ความคิดเห็น • 363

  • @whatcatslove7479
    @whatcatslove7479 2 ปีที่แล้ว +184

    I bought your cours. Its great !

    • @whatcatslove7479
      @whatcatslove7479 2 ปีที่แล้ว +8

      *e

    • @abdulmuntasirmasum7914
      @abdulmuntasirmasum7914 ปีที่แล้ว +3

      What is the link

    • @vikasrathi8256
      @vikasrathi8256 ปีที่แล้ว +1

      Which website he uploaded the course...

    • @Y45HYT
      @Y45HYT ปีที่แล้ว +1

      Can i get video after buy this course?

    • @isasooner5
      @isasooner5 ปีที่แล้ว

      on kali linux on my VM workstation, on any of loi's videos, I cannot execute most of the commands, to get practice in these ethical hacking instructions

  • @Sasquatchbones
    @Sasquatchbones 8 หลายเดือนก่อน +129

    Been in a cyber security program for almost 6 months and you basically taught me more than all my instructors combined 🤦🏻‍♂️

    • @jawandapowell
      @jawandapowell 6 หลายเดือนก่อน +3

      Facts they don’t teach nothing frfr

    • @eval_is_evil
      @eval_is_evil 5 หลายเดือนก่อน +2

      Then your instructors really suck

    • @EarlZero0
      @EarlZero0 3 หลายเดือนก่อน +2

      Then you don't focus on your lessons

    • @Stu81
      @Stu81 3 หลายเดือนก่อน +1

      What cyber security course are you on? Most won't cover pentesting in any detail, they will cover it's purpose and objectives with some info on Kali and common areas of attack but nothing more, unless you are on an actual pentesting course.

  • @edmaxwell5801
    @edmaxwell5801 7 หลายเดือนก่อน +49

    “For beginners” 💀

  • @ewncilo
    @ewncilo 2 ปีที่แล้ว +146

    You are the treasure for any cybersecurity student, you are absolutely gold.

    • @nitefytercool1302
      @nitefytercool1302 ปีที่แล้ว +8

      yeah but he doesn't explain why he chooses the directories he wants to target he just chooses seemingly randomly

  • @davejackson88
    @davejackson88 ปีที่แล้ว +23

    the passion for this sector has no limits... massive thanks Mr loi

  • @Abdulmalik-tu1uc
    @Abdulmalik-tu1uc ปีที่แล้ว +7

    The best short tutorial i’ve ever seen 👍🏻❤️

  • @johnyevugah8155
    @johnyevugah8155 ปีที่แล้ว

    Thanks for making this, when i got ingame, the menyoo wouldn't load when i pressed F8, but now it works, thanks again!

  • @isaacmihaeli3261
    @isaacmihaeli3261 ปีที่แล้ว +24

    I am a programmer for a long time and moving to cyber security and it looks challenging. Well done tutorial.

    • @yamanarslanca8325
      @yamanarslanca8325 11 หลายเดือนก่อน

      how was your experience so far, is it worth ?

    • @eval_is_evil
      @eval_is_evil 5 หลายเดือนก่อน

      He didnt show anything useful.

  • @Godflay
    @Godflay 2 ปีที่แล้ว +75

    this is literally the best video. sums up extremely well what i've been studying for the last few months in 15 minutes... for free!

    • @jesusdacoast872
      @jesusdacoast872 2 ปีที่แล้ว +2

      You're right 😌

    • @chkharti3933
      @chkharti3933 2 ปีที่แล้ว +4

      thresh is a penetration tester?!

    • @nhatduy9125
      @nhatduy9125 ปีที่แล้ว +4

      Thresh is a hacker????

    • @saojimaou
      @saojimaou ปีที่แล้ว

      @@nhatduy9125 u mean hooker lol

    • @alexismedor6182
      @alexismedor6182 ปีที่แล้ว +2

      I feel like this just shows what I've been working on in a very quick and summed up way. Of course, if I was watching this before I'd started studying, I wouldn't understand jack shit. I'd be sitting here wondering why he was doing what he was doing and why it was working. Very nice video to show how a very basic pentest might go down

  • @derrickkassen897
    @derrickkassen897 ปีที่แล้ว +1

    Just JOINED - so excited to start this journey!!!

  • @abderrahimelayadi
    @abderrahimelayadi 2 ปีที่แล้ว +1

    Thank You so Much sir Loi Liang Yang you are always doing great tutoriel on security, hacking, penetration testing , vulnerability

  • @Omni-knight
    @Omni-knight ปีที่แล้ว +2

    You're better than some of my cybersec professors.

  • @devanshkanda9618
    @devanshkanda9618 2 ปีที่แล้ว +5

    Loi sir 🙏🙏🙏 ❤️❤️ this is soo much informational video, as I'm stepping into cyber security domain , this really helped me to push my thought process while penetration testing, you are the best teacher and my mentor , please make more such videos we all love to see , how these bugs can lead to a more sophisticate level of exploit and post exploitation , and your valuable steps to be taken care of to protect the system , love from a future cybersecurity engineer ❤️❤️🙏🙏

  • @jadersanctem
    @jadersanctem 5 หลายเดือนก่อน +2

    Holy dang, that was wild to watch. You're quick and know your way around these things, that's amazing! (And scary)

  • @epicdelvegaming1023
    @epicdelvegaming1023 2 ปีที่แล้ว +4

    Wow I would love to learn from you all about hacking..... and your content is amazing it is absolutely fantastic keep it up...and most of all a big HUGE THANK YOU!!!!👌👌👌👌

  • @cuchitp
    @cuchitp ปีที่แล้ว +37

    Wow! I am an ex software engineer, now moving into the realm of hardware engineering, specifically into IoT. This complex subject is explained really well, with lucidity and clarity. Thank you Loi!

    • @antonpodolsky2273
      @antonpodolsky2273 ปีที่แล้ว +2

      You must have a very bad teacher, because he did not show anything. Linux, yeah, but behind a firewall. You need to get access to internal infra, after that the world is yours. Now try to get through DMZ.

    • @antonpodolsky2273
      @antonpodolsky2273 ปีที่แล้ว +2

      I just don't understand how he got through DMZ first, after that, it is fucking cake. We learned that in first quarter.

    • @cuchitp
      @cuchitp ปีที่แล้ว

      @@antonpodolsky2273 go play with your dolls fool. Who do you think you are.

    • @eval_is_evil
      @eval_is_evil 5 หลายเดือนก่อน

      Wait you havent tackled this during your studies?!? Your engineering degree is crap then.

  • @tamilbiographywebsite1952
    @tamilbiographywebsite1952 ปีที่แล้ว

    Thanks for the lesson. Just brought soft soft

  • @travellingtrader3352
    @travellingtrader3352 ปีที่แล้ว

    I am glad you made this video. Very helpful.

  • @mpicuser
    @mpicuser 2 ปีที่แล้ว +2

    As always very interesting video. Thanks!

  • @petertemple3067
    @petertemple3067 2 ปีที่แล้ว +2

    this is great mentor. I am learning from your videos everyday want to be like u

  • @alexramsey4618
    @alexramsey4618 ปีที่แล้ว

    Very well presented. Thank you

  • @TheMeltzz
    @TheMeltzz 2 ปีที่แล้ว +5

    What you explain about reverse shell make me understand in just a few minute, compare to what the lecturer have been teaching for the past few lessons ......

  • @Kali9030
    @Kali9030 3 หลายเดือนก่อน

    This is an eye-opening video for me, I am glad that I found it, great video.

  • @JunLYeap
    @JunLYeap 2 ปีที่แล้ว

    Sir you are my mentor!

  • @play-good
    @play-good 2 ปีที่แล้ว

    3 Videos at once good job

  • @miltonrosa9131
    @miltonrosa9131 5 หลายเดือนก่อน +1

    I barely started getting into penetration testing and this linux video completely fried my brain loll

  • @shriramkp9292
    @shriramkp9292 4 หลายเดือนก่อน

    Best video i watched till now in cybersecurity. great work

  • @robertwilliams7969
    @robertwilliams7969 ปีที่แล้ว

    New to your channel and love your teaching style and likes to know how one can become your apprentice without any tech learning?

  • @louisdiamond417
    @louisdiamond417 วันที่ผ่านมา

    Thankyou for help.Gonna try pen testing for a liveing. 🙏

  • @codingworld7142
    @codingworld7142 2 ปีที่แล้ว

    I am big FAN of yours because I love hacking and coding

  • @donkmartinez3473
    @donkmartinez3473 4 หลายเดือนก่อน

    This was awesome to watch! Subbed!!

  • @mahmoudrouda8124
    @mahmoudrouda8124 2 ปีที่แล้ว +20

    Roadmap for learning reverse engineering 🙏🙏❤️

  • @mangalangnanasegaram6536
    @mangalangnanasegaram6536 ปีที่แล้ว

    Really simple and easiness.

  • @pwnge
    @pwnge ปีที่แล้ว +1

    THE CHANNEL I BEEN LOOKING FOR!!! Always was a PC gamer, now im grown and wanna move into a skill, and nothin seems cooler than bein red team. In the process of learning coding and OS linux with CS50 harvard course. not sure where to go after? maybe a road map for noobs???

  • @francisbaldo8061
    @francisbaldo8061 2 ปีที่แล้ว

    thank you sir you save us from our reporting

  • @cryproot9845
    @cryproot9845 2 ปีที่แล้ว

    thansk very much Loi Liang ,i am learn with you

  • @alexdeo8869
    @alexdeo8869 ปีที่แล้ว

    Great video, i have one question before even scanning do you assume access to the organization network already to be able to see the scanned devices? I'm stuck and really want to understand this very first step before even scanning the network

  • @skghostrider
    @skghostrider 2 ปีที่แล้ว +1

    Your video is always best 😱

  • @Adamn32
    @Adamn32 ปีที่แล้ว

    Wow. Great class

  • @cezarkhaloul1289
    @cezarkhaloul1289 ปีที่แล้ว +1

    This man is a legend

  • @user-cv5gr2rj1c
    @user-cv5gr2rj1c 5 หลายเดือนก่อน

    That was great information thank you for the video

  • @johnkbroderick
    @johnkbroderick ปีที่แล้ว

    Thanks for the video, very interesting stuff, You should make another vid to show how to protect yourself from this type of breach

  • @sterlinwright4173
    @sterlinwright4173 2 ปีที่แล้ว +1

    I wish you would explain deeper for what you need for it like networks and what kind of routers and ect

  • @jesusdacoast872
    @jesusdacoast872 2 ปีที่แล้ว +1

    Great job 👍 😎

  • @tarinishankar
    @tarinishankar 2 ปีที่แล้ว

    I love this tutorial

  • @keithp7010
    @keithp7010 2 ปีที่แล้ว +4

    Senor Loi, thank you for your awesome videos and educational content that go a long way in helping me pursue my career in ethical hacking. Quick question at time stamp 449 you show an "index of" the Apache website. How did you access it? It appears it is on its own page? You say Kali tool?
    Thank you again and keep creating great vids!

  • @michaelstone5444
    @michaelstone5444 ปีที่แล้ว

    Very good content! And quite funny, hacker loi!

  • @harishvanjari526
    @harishvanjari526 3 หลายเดือนก่อน

    Wow that was a very valuable information

  • @faceitlevel1035
    @faceitlevel1035 2 ปีที่แล้ว +1

    Thanks bro.

  • @bolajibankole8079
    @bolajibankole8079 7 หลายเดือนก่อน

    Nice approach

  • @kalyanboro6338
    @kalyanboro6338 2 ปีที่แล้ว

    Mr. Loi is the best!!!!!

  • @Joy_Boobo
    @Joy_Boobo 3 หลายเดือนก่อน

    Really appreciate you ❤

  • @jo_kr.1142
    @jo_kr.1142 2 ปีที่แล้ว

    Thank you

  • @wilz3346
    @wilz3346 2 ปีที่แล้ว +1

    TY.

  • @user-el3se8ln3m
    @user-el3se8ln3m 4 หลายเดือนก่อน +1

    I run a cyber security club at my University and I wanted to set this up as lab and was wondering if you had a tutorial on how to set it up

  • @user-gd5lw4bo7h
    @user-gd5lw4bo7h 5 หลายเดือนก่อน +1

    Amazing teacher. How do you remember all those commands?

  • @user-fy8wu4xb8z
    @user-fy8wu4xb8z 3 หลายเดือนก่อน

    impressive work....

  • @kayoutube690
    @kayoutube690 2 ปีที่แล้ว +1

    wtf Loi you're such amazing hacker!!

  • @ndumisondumisoo2412
    @ndumisondumisoo2412 2 ปีที่แล้ว

    Your inteernet is .....💥💥💥💥💥💥💥

  • @StiveSapanta
    @StiveSapanta 2 หลายเดือนก่อน

    Idol I'm always inspired I watched you everyday you very genius I salute you idol that is my ambition tobecome expert with penetration testing idoñ

  • @securedigitsplus
    @securedigitsplus 2 ปีที่แล้ว

    Good stuff.

  • @user-po7hu9mi8n
    @user-po7hu9mi8n ปีที่แล้ว

    Very interesting!

  • @BenGurskyMusic
    @BenGurskyMusic ปีที่แล้ว

    Solid, Sir 💯/💯

  • @iammorhb
    @iammorhb 8 วันที่ผ่านมา

    great video

  • @codewithlaghari
    @codewithlaghari 2 ปีที่แล้ว +1

    Very complex

  • @certifiedmemer6000
    @certifiedmemer6000 ปีที่แล้ว

    You are lucky my favourite nice tuto is nice tuto

  • @jeffreyguia6530
    @jeffreyguia6530 ปีที่แล้ว

    is python effetive for penetration testing as well ? or only kali linux?

  • @Godbless_Tech
    @Godbless_Tech หลายเดือนก่อน

    Thanks for this, my question is : Do you need to be connected to the target network? Or i can do this externally too with an external IP target

  • @SAhil-gg1to
    @SAhil-gg1to 2 ปีที่แล้ว

    Love you bro 🔥❤️

  • @shortvids5825
    @shortvids5825 2 ปีที่แล้ว

    Can you please show tutorial on Gophish too?

  • @WillSanchez1129
    @WillSanchez1129 ปีที่แล้ว

    I am a brand new student. I have not launched anything yet. Got it all downloaded and ready to go. I want to know what should I do? I’m going to listen and binge watch all of your videos

  • @toroddlnning6806
    @toroddlnning6806 ปีที่แล้ว

    @Loi Liang Yang how would you protect yourself against such attacks. Would a 2fa device with physical interaction be sufficiant?

  • @adhilmike8987
    @adhilmike8987 2 ปีที่แล้ว

    another level

  • @Asimpleyoutubechannel821
    @Asimpleyoutubechannel821 ปีที่แล้ว

    What machine from vulnhub do you use?

  • @dharmendratelekom1263
    @dharmendratelekom1263 2 ปีที่แล้ว +7

    Excellent Video Loi Liang Yang.
    I'm looking to expand my carrier into cybersecurity and with ethical hacking. However, I'm wondering would anyone be able to scan a network without actually be on that network in the first place. I'm puzzled how would this would work in an organization environment where you have to go pass domain logins before getting on the network. Do we assume that you will be provided the domain name credentials, before doing any ethical hacking stuff?
    I'm super new to this and confused, please can anyone help me understand this gap which I'm having
    Thanks in advance.

    • @jg5875
      @jg5875 ปีที่แล้ว +2

      Usually there is a way to somewhat easily penetrate from the outside to get into the internal environment. Spearphising, default credentials or vulnerabilities on a public facing asset, etc. Once in, then credential theft, escalating privileges, etc, let you move laterally throughout the organization to get to sensitive assets and data.

    • @eval_is_evil
      @eval_is_evil 5 หลายเดือนก่อน

      To me this tutorial makes no sense in a real world scenario.

  • @ArturoGonzalez-uz1by
    @ArturoGonzalez-uz1by ปีที่แล้ว

    Isn’t a way to scan all ports -p- too for Nmap?

  • @addisnet21
    @addisnet21 ปีที่แล้ว

    Your are awesome!

  • @arghya10000
    @arghya10000 2 ปีที่แล้ว

    OMG what a tutorial

  • @leeivorymariquit2195
    @leeivorymariquit2195 2 ปีที่แล้ว +1

    You can also recover email add?

  • @user-zs7zm3ph8g
    @user-zs7zm3ph8g 2 ปีที่แล้ว

    Tanks U

  • @itsm3dud39
    @itsm3dud39 2 ปีที่แล้ว +1

    you didnt explain about the exploit-db script.why you took that particular script?

  • @luizgustavomessias3680
    @luizgustavomessias3680 2 ปีที่แล้ว

    Big fan, a course would be perfect

    • @Bandey747
      @Bandey747 5 หลายเดือนก่อน +1

      Do you want to be promoted to an air conditioner

  • @DhruvClaire
    @DhruvClaire ปีที่แล้ว

    which terminal are you using?

  • @josinjojy4268
    @josinjojy4268 2 ปีที่แล้ว +4

    Sir can you please do advanced network penetration course, please a humble request for a subscriber

  • @utensilapparatus8692
    @utensilapparatus8692 2 ปีที่แล้ว +2

    Good job Hacker Loi, thanks , i learned alot from your tutorials.

  • @ao4514
    @ao4514 ปีที่แล้ว

    Hello Loi, you lost me at 7:40
    How did you set the targets ?
    Did you type out THE FOLOWING COMMANDS > set RHOSTS
    > set RPATH

  • @trailertrasher3881
    @trailertrasher3881 หลายเดือนก่อน

    How do you do the mysql one?

  • @bluetigerwellness
    @bluetigerwellness 2 ปีที่แล้ว

    Fabulous vid

  • @lastphase0
    @lastphase0 2 ปีที่แล้ว

    Cool diction! Is this voice is really your? I will using your videos for improve my english in addition to theirs direct purpose.

  • @arnhdgs
    @arnhdgs ปีที่แล้ว

    I’ve travelled pretty extensively and I’ve heard quite a few accents over the decades but I’ve never heard quite an accent like yours. Subscribing.

  • @zirovoice7692
    @zirovoice7692 ปีที่แล้ว

    great!!

  • @adairlatiff7133
    @adairlatiff7133 ปีที่แล้ว +1

    This scan we can do in our internal network? Or in the internet? In other words, what I'm scanning exactly?

  • @jsatwal8261
    @jsatwal8261 2 ปีที่แล้ว

    Make a series on oscp

  • @sumitgadwal6859
    @sumitgadwal6859 2 ปีที่แล้ว

    Hii sir i am big fan

  • @azkskejd9371
    @azkskejd9371 2 ปีที่แล้ว +2

    هل يمكن أن تقوم بعمليه صنع فيروس الفديه

  • @othnieldavidson7579
    @othnieldavidson7579 ปีที่แล้ว

    hi do i need to be part of predator network before i scan

  • @sudhirgadhvi
    @sudhirgadhvi ปีที่แล้ว

    you are legend

  • @SalakotPhilippines
    @SalakotPhilippines 9 หลายเดือนก่อน

    Thanks bro Loi

  • @HotHutYT
    @HotHutYT ปีที่แล้ว +1

    No idea what hes talking about but watched the whole thing

  • @samrakshanrijal7931
    @samrakshanrijal7931 2 ปีที่แล้ว

    tq