MSFvenom Demystified: Unlocking the Power of Exploit Shellcode

แชร์
ฝัง
  • เผยแพร่เมื่อ 30 พ.ย. 2023
  • Join this channel to get access to perks:
    / @pentest_tv
    Let's use the Metasploit msfvenom tool to create and run shellcode - a great introduction to shellcodes, payloads, and listeners and a great way to start your journey into ethical hacking and penetration testing. After watching this video, you'll have a better understanding of how shellcode works and how it can be used to exploit systems!
    Join our Discord Server: / discord
    Support us through Patreon: patreon.com/user?u=100652951

ความคิดเห็น • 20

  • @jirho1781
    @jirho1781 28 วันที่ผ่านมา +1

    hey sir! Thanks for a thorough explanation of the payload especially the logic behind it. Keep em coming!

    • @pentest_TV
      @pentest_TV  28 วันที่ผ่านมา

      Glad you found it helpful - thanks for watching!

  • @chrisfortin7317
    @chrisfortin7317 7 หลายเดือนก่อน +2

    Thanks for breaking the material out to this level. A lot of channels just show you instead of taking the time to explain the logic and/or reasoning behind it.

    • @pentest_TV
      @pentest_TV  7 หลายเดือนก่อน +1

      Thanks for watching! It's a complex subject but I feel that it's important to break it down so people aren't either 1) intimidated by it or 2) making incorrect decisions on how to deploy it because it hasn't been explained well to them. Hopefully this video provided enough information that we can now rule out these two problems. ;-)
      Thanks again!

  • @youssouftiecourasanogo5716
    @youssouftiecourasanogo5716 7 หลายเดือนก่อน +2

    Your are absolutely a great teacher. Following you to progress in my OSCP journey . Thanks

    • @pentest_TV
      @pentest_TV  7 หลายเดือนก่อน

      Thanks for the kind words and I'm glad you see some value in my videos! OSCP is a tough journey, and I applaud your efforts - good luck and LMK if there's anything I can do to help!

  • @handelokafor602
    @handelokafor602 7 หลายเดือนก่อน +2

    killer intro

    • @pentest_TV
      @pentest_TV  7 หลายเดือนก่อน

      Appreciate it, and thanks for watching!

  • @relaxingasmrnoise
    @relaxingasmrnoise 7 หลายเดือนก่อน +1

    Great vid 💯 I like the way you educate

    • @pentest_TV
      @pentest_TV  7 หลายเดือนก่อน

      Thank you so much! Glad my teaching style resonates with my viewers like you, and thanks for your support!

  • @rajeevpuri8319
    @rajeevpuri8319 7 หลายเดือนก่อน +1

    thanks for such a good in depth video. you have made it very easy for a noob like me in understanding and learning ethical hacking. thank you.

    • @pentest_TV
      @pentest_TV  7 หลายเดือนก่อน

      Thank you so much for the kind words! Glad my videos have helped and good luck with your journey into professional penetration testing!

  • @timothy6966
    @timothy6966 4 หลายเดือนก่อน +2

    Thank you for your clear explanation! Btw, that necklace is awesome. What is it?

    • @pentest_TV
      @pentest_TV  4 หลายเดือนก่อน

      Thanks for watching! That badge is from DefCon 20 and is a Contest & Events badge.

  • @tommyyoung321
    @tommyyoung321 7 หลายเดือนก่อน +1

    hey there thank you for every moment.....I have a question about the netdiscover in kali Linux , it works but it does not show the Mac Vendor and Host. it only shows up the VMware as Mac Vendor and no Host

    • @pentest_TV
      @pentest_TV  7 หลายเดือนก่อน

      Netdiscover only concerns itself with ARP and MAC, so its accuracy should always be called into question since it is trivial to change MAC addresses on many devices.
      If I understand your question correctly, VMware will use its own network devices when connecting to a virtual image (the number and type are up to you, but they are all still "manufactured" by VMware), which is why it shows the vendor as VMware. As for the Hostname field, again, because it's only dealing with ARP and MAC, there isn't a good way to really know what the host is, so it's usually left blank. In fact, I'm trying to remember if I've ever seen a value in the hostname field. Thanks for the question!

  • @smouhamadoulfadal1710
    @smouhamadoulfadal1710 หลายเดือนก่อน +2

    Hello sir we need a video phishing-email and take control of any device thank's

    • @pentest_TV
      @pentest_TV  หลายเดือนก่อน

      Thanks for the suggestion

  • @iam-drake
    @iam-drake 6 หลายเดือนก่อน +1

    can you make a video on shellcode wrapping using python. probably one with private key for encryption and dycryption..am dying to learn this.. and persistence as well.

    • @pentest_TV
      @pentest_TV  6 หลายเดือนก่อน +1

      Thanks for the suggestion! I’ll add it to the list. 👍