Thanks for breaking the material out to this level. A lot of channels just show you instead of taking the time to explain the logic and/or reasoning behind it.
Thanks for watching! It's a complex subject but I feel that it's important to break it down so people aren't either 1) intimidated by it or 2) making incorrect decisions on how to deploy it because it hasn't been explained well to them. Hopefully this video provided enough information that we can now rule out these two problems. ;-) Thanks again!
Thanks for the kind words and I'm glad you see some value in my videos! OSCP is a tough journey, and I applaud your efforts - good luck and LMK if there's anything I can do to help!
hey there thank you for every moment.....I have a question about the netdiscover in kali Linux , it works but it does not show the Mac Vendor and Host. it only shows up the VMware as Mac Vendor and no Host
Netdiscover only concerns itself with ARP and MAC, so its accuracy should always be called into question since it is trivial to change MAC addresses on many devices. If I understand your question correctly, VMware will use its own network devices when connecting to a virtual image (the number and type are up to you, but they are all still "manufactured" by VMware), which is why it shows the vendor as VMware. As for the Hostname field, again, because it's only dealing with ARP and MAC, there isn't a good way to really know what the host is, so it's usually left blank. In fact, I'm trying to remember if I've ever seen a value in the hostname field. Thanks for the question!
can you make a video on shellcode wrapping using python. probably one with private key for encryption and dycryption..am dying to learn this.. and persistence as well.
Great question - depends on what type of hacking you want to learn, but most people start with web application hacking, in which case I would suggest Learning about the OWASP Top 10 and then start learning (ethically, of course) on exploitable targets like those found on VulnHub, or Hack The Box, or Try Hack Me. You can learn by tutorials (like mine), or attend a course (like mine) or learn for free using walkthroughs provided by the communities. Good luck!
Thanks for breaking the material out to this level. A lot of channels just show you instead of taking the time to explain the logic and/or reasoning behind it.
Thanks for watching! It's a complex subject but I feel that it's important to break it down so people aren't either 1) intimidated by it or 2) making incorrect decisions on how to deploy it because it hasn't been explained well to them. Hopefully this video provided enough information that we can now rule out these two problems. ;-)
Thanks again!
Your are absolutely a great teacher. Following you to progress in my OSCP journey . Thanks
Thanks for the kind words and I'm glad you see some value in my videos! OSCP is a tough journey, and I applaud your efforts - good luck and LMK if there's anything I can do to help!
hey sir! Thanks for a thorough explanation of the payload especially the logic behind it. Keep em coming!
Glad you found it helpful - thanks for watching!
thanks for such a good in depth video. you have made it very easy for a noob like me in understanding and learning ethical hacking. thank you.
Thank you so much for the kind words! Glad my videos have helped and good luck with your journey into professional penetration testing!
Great vid 💯 I like the way you educate
Thank you so much! Glad my teaching style resonates with my viewers like you, and thanks for your support!
killer intro
Appreciate it, and thanks for watching!
hey there thank you for every moment.....I have a question about the netdiscover in kali Linux , it works but it does not show the Mac Vendor and Host. it only shows up the VMware as Mac Vendor and no Host
Netdiscover only concerns itself with ARP and MAC, so its accuracy should always be called into question since it is trivial to change MAC addresses on many devices.
If I understand your question correctly, VMware will use its own network devices when connecting to a virtual image (the number and type are up to you, but they are all still "manufactured" by VMware), which is why it shows the vendor as VMware. As for the Hostname field, again, because it's only dealing with ARP and MAC, there isn't a good way to really know what the host is, so it's usually left blank. In fact, I'm trying to remember if I've ever seen a value in the hostname field. Thanks for the question!
can you make a video on shellcode wrapping using python. probably one with private key for encryption and dycryption..am dying to learn this.. and persistence as well.
Thanks for the suggestion! I’ll add it to the list. 👍
Thank you for your clear explanation! Btw, that necklace is awesome. What is it?
Thanks for watching! That badge is from DefCon 20 and is a Contest & Events badge.
Hello sir we need a video phishing-email and take control of any device thank's
Thanks for the suggestion
How do you build your hacking skill?
Great question - depends on what type of hacking you want to learn, but most people start with web application hacking, in which case I would suggest Learning about the OWASP Top 10 and then start learning (ethically, of course) on exploitable targets like those found on VulnHub, or Hack The Box, or Try Hack Me. You can learn by tutorials (like mine), or attend a course (like mine) or learn for free using walkthroughs provided by the communities. Good luck!