these have to be some of the most straight forward to the point, while being super helpful videos, that I've come across for these subjects. Thanks starting a channel
When I'm running nmap scan, I'm getting all the open ports and the services they are running but not the versions they are using,even scanning with metasploit I'm getting only services. Is this because of the firewall and they doesn't want to disclose version information
hey, hope you’re doing well. I need some help with an assignment. If there was anyway we could get in contact for some assistance. It would be a great help. Thank you.
msf6 exploit(multi/http/php_cgi_arg_injection) > exploit [*] Started reverse TCP handler on 192.168.200.128:4444 [*] Exploit completed, but no session was created. Why is it displayed "Exploit completed, but no session was created."? Thankyou
Very thanks sir i exploited my school website 😅😅😅😅 and i got suspended for 7 days ..... But its very cool
these have to be some of the most straight forward to the point, while being super helpful videos, that I've come across for these subjects. Thanks starting a channel
This just saved me doing a school assignment, thank you so much!!!!
You're so welcome! I am glad you enjoyed it and it helped you.
Mate, thanks for the helpful videos. I hope you're getting some traction you deserve it.
I hope so too. Thank you for the kind words and the comment. Hopefully it grows and I keep showing and teaching others different techniques.
Helped me with a project, liked and subscribed thank you. Amazing content, everything makes sense
Awesome, thank you! You’re so welcome and I appreciate the support
Keep up the great work Pat
Thank you 🙏
Awesome great video
Great teacher subscribed 👍
Awesome, thank you! 😊
How would you enable the proxies? Would it be set to a file with a list of proxies or would it leverage some other service like tor?
Real informative! keep it up!
Thanks, will do!
Sorry to ask, is there an exploit for the tcpwrapped service?
Nice list of videos Pat, maybe make some windows pentesting after the MS2
I will be on that and getting videos for server pentesting out soon.
This dude deserves more subs
Thank you so much. I really appreciate it. Please share my channel so we can keep growing. Thank you.
Great job, congrats
Thank you! Cheers!
saved my life, thanks brother.
You're welcome!
Thanks, bro!
No problem! You’re welcome 😉
i did "run" after updating rhosts for the first time and it just says its running ubuntu and nothing else like phpversion so what should i do?
i want to see more AD pentesting please.
Sounds good thanks. I will work on those kind of videos.
When I'm running nmap scan, I'm getting all the open ports and the services they are running but not the versions they are using,even scanning with metasploit I'm getting only services. Is this because of the firewall and they doesn't want to disclose version information
are you using -sV in the nmap command?
hey, hope you’re doing well. I need some help with an assignment. If there was anyway we could get in contact for some assistance. It would be a great help. Thank you.
Sir can you send me code demo or github demo
Introduction music svp
super sir
Thank you 🙏. I appreciate it.
Bro make a detailed video on sql injection please
Bro is there any chance to contact you ?
Yes reach out on my social media accounts. InfoSecpat
@@InfoSecPat ok but actually I have checked your patreon site, and I will subscribe to it, so we can have a 30min chat, and you make some money too
Thank you so much, looking forward chatting with you and helping you out.
msf6 exploit(multi/http/php_cgi_arg_injection) > exploit
[*] Started reverse TCP handler on 192.168.200.128:4444
[*] Exploit completed, but no session was created.
Why is it displayed "Exploit completed, but no session was created."? Thankyou
same problem, did you resolved?