Use Netcat to Spawn Reverse Shells & Connect to Other Computers [Tutorial]

แชร์
ฝัง
  • เผยแพร่เมื่อ 28 ธ.ค. 2024

ความคิดเห็น • 276

  • @MrKristian252
    @MrKristian252 6 ปีที่แล้ว +159

    Hacking doesn't need to be used in a bad way.. but it's a really good way to learn how the structure of these systems/technologies/software/code work.
    I love watching your videos, because it's information I've never heard about before...

    • @Aditya-wg3lp
      @Aditya-wg3lp 4 ปีที่แล้ว

      Mr.Kristian252 im using it for scambaitin

    • @jahazielvazquez7264
      @jahazielvazquez7264 4 ปีที่แล้ว +7

      Oh come on, let's be real here. Everyone here is trying to feed their evil curiosity

    • @paultapping9510
      @paultapping9510 4 ปีที่แล้ว

      Shaper vs anarch. Or urbex vs housebreaking, I guess. Same means, different ends.

    • @ismaelc.e8398
      @ismaelc.e8398 2 ปีที่แล้ว

      W BIG POWA CUMS BIG RESPONSABILITY

    • @somebody3271
      @somebody3271 2 ปีที่แล้ว

      @@jahazielvazquez7264 true

  • @ajopasoij9d00
    @ajopasoij9d00 6 ปีที่แล้ว +145

    Ghost in the Shell!

    • @SadKris
      @SadKris 5 ปีที่แล้ว +9

      ...im so proud of this joke

    • @bittylifts
      @bittylifts 4 ปีที่แล้ว +1

      DO NOT LIKE, ITS AT 69

    • @milathecat5454
      @milathecat5454 4 ปีที่แล้ว +1

      I love you destiny

  • @CaptBoykin
    @CaptBoykin 6 ปีที่แล้ว +61

    @6:20
    "nc -l -p 6996 -e /bin/bash " does not perform a reverse shell. This is a bind shell.

    • @krizsan0596
      @krizsan0596 4 ปีที่แล้ว

      It is a reverse shell since the server is calling back to the attacker

    • @CaptBoykin
      @CaptBoykin 4 ปีที่แล้ว +6

      @@krizsan0596 No. @6:10 he correctly references it as a backdoor (bindshell). A reverse shell would imply the incoming connection is running the prog (-e). The "shell" that is spawned via "-e" @6:20 is spawned on the host that is running nc (which is binding locally on that host with the "-l" option). It's doing zero 'dialing out' as it's a local listener.

    • @realitynowassigned
      @realitynowassigned 3 ปีที่แล้ว

      @@AaronmMcLean hush child.

    • @realitynowassigned
      @realitynowassigned 3 ปีที่แล้ว

      @@CaptBoykin thanks for pointing that out, its important. I specifically needed to look at reverse shells

    • @jhde9067
      @jhde9067 3 ปีที่แล้ว +3

      So ... What is a reverse shell? What's the different types of shells and their differences?
      Kinda confusing.

  • @minibit0103
    @minibit0103 6 ปีที่แล้ว +10

    Always nice to see basic techniques that are clear, keep the content flowing!

  • @pavelschannel-alittleoutof3532
    @pavelschannel-alittleoutof3532 3 ปีที่แล้ว +9

    He has pictures of cats so therefore I trust him 100% :) He does explain very well without going on too much unlike others. I like his teaching methods. We need more people like this as you tube is full of useless teaching / tutorial videos that should be binned...

  • @OG-PvP
    @OG-PvP ปีที่แล้ว +3

    You're an inspiration and amazing teacher, found you via David Bombal and your videos have provided some of the most easiest to deliver education I have found on TH-cam

  • @iyeetsecurity922
    @iyeetsecurity922 3 ปีที่แล้ว +27

    I grew up loving any form of a puzzle. Then it continued with video games. That's the reason I enjoy hacking and lock picking. They're just puzzles waiting to be solved.

    • @techslugz
      @techslugz ปีที่แล้ว +1

      I am pretty sure I have the same addiction 😮

  • @harism0
    @harism0 4 ปีที่แล้ว +7

    I like the cat pictures in the background, fits in well 😂👏

  • @GoranObal
    @GoranObal 3 ปีที่แล้ว +1

    9:03 I'm pretty sure the article was for using Windows command prompt. There the type command is like cat in linux. The type command in linux is something else.

  • @cy_wareye7395
    @cy_wareye7395 5 ปีที่แล้ว +4

    Your intro helps me focus before your tut

    • @NullByteWHT
      @NullByteWHT  5 ปีที่แล้ว +2

      I'm glad you like it! We shot it the one day we had a nice stabilizer

  • @lelandclayton5462
    @lelandclayton5462 6 ปีที่แล้ว +4

    This trick has been around for a long time and harden IT security veterans know about it and have setup proper firewall rules and crap. A matter of fact this is in the book "Instant Netcat Starter" by K. C. Yerrid.

  • @Hari-888
    @Hari-888 3 ปีที่แล้ว +1

    This video was amazing dude, I finally understood how exactly a reverse shell works

  • @lightyagami1456
    @lightyagami1456 5 ปีที่แล้ว +4

    8:54 What the heck! Am I unable to follow here? I thought that the MacOS had apparently became the attacker and the Kali system was victim since it can exfiltrate and run files from Kali. Pls reply which is the attacker machine here????

    • @leonardofelippine9781
      @leonardofelippine9781 4 ปีที่แล้ว

      Yes, I also got lost during the explanation. I believe the roles were reversed at some point

    • @dr.z1657
      @dr.z1657 4 ปีที่แล้ว

      Light Yagami
      I got lost here as well.

    • @KamilKowalski-lf3yt
      @KamilKowalski-lf3yt ปีที่แล้ว

      can you help me with it ?

    • @KamilKowalski-lf3yt
      @KamilKowalski-lf3yt ปีที่แล้ว

      @@leonardofelippine9781 can you help me with it ?

  • @fredericaveline9207
    @fredericaveline9207 4 ปีที่แล้ว +1

    Good job! I'm hacker rookie, and
    I'm used to using metasploit framework without knowing the basics! So thanks.

    • @NullByteWHT
      @NullByteWHT  4 ปีที่แล้ว

      frédéric aveline thanks for watching! Tell all of your friends about us! 😃

  • @puppyofwrath
    @puppyofwrath 3 ปีที่แล้ว

    That is a big watch. This dude knows what time it is.

  • @craigheard2504
    @craigheard2504 3 ปีที่แล้ว +5

    Thanks a lot. You explained this extremely well. this ability is powerful, useful and terrifying.

    • @kohibzoparel4657
      @kohibzoparel4657 2 ปีที่แล้ว +1

      Great fun though remember to cover that camera that's the best way to stay safe online 😅😅😅😅😅😅

  • @Cesar-dt9nl
    @Cesar-dt9nl 6 ปีที่แล้ว +5

    If hacking wasnt good enough, now with lazerhawk this is flawless, thanks for the info

  • @silverhawktc
    @silverhawktc 6 ปีที่แล้ว +7

    Great content as always, keep up the good work! I noticed you use some really good songs in the background :D. Would you please tell us which you use in the description? That would be great!

  • @rayhanfoinshola7037
    @rayhanfoinshola7037 2 ปีที่แล้ว

    I have a question do you need net cat on both the attacking device and the device that is attacking.

  • @oliverludwig6148
    @oliverludwig6148 4 ปีที่แล้ว

    1st background track is Lazerhawk - So far away, in case anyone is wondering.

  • @Dave-kq7gv
    @Dave-kq7gv 6 ปีที่แล้ว

    combine this with a n00b guide for cron...I'm a newb at both but see how cool it'd be! Cool content all around, good sir!

  • @PianoShawn
    @PianoShawn 6 ปีที่แล้ว +2

    i've been waiting for this for a very long time

  • @fastexpand
    @fastexpand 3 ปีที่แล้ว +6

    The website you’re attacking won’t just set up ncat for you to attack like that though right? How do you make it work if you only have control of the attacking computer??

    • @adryelgainza1530
      @adryelgainza1530 3 ปีที่แล้ว

      im pretty new to this but i assume that this is done via an exploit. Im not sure. Its been two months so correct me if im wrong

    • @fastexpand
      @fastexpand 3 ปีที่แล้ว +1

      ​@@adryelgainza1530 Yeah I've since learned that you have to get access through an exploit before you can run the reverse shell

    • @sefiyt12
      @sefiyt12 3 ปีที่แล้ว

      @@fastexpand do you use metasploit?

    • @fastexpand
      @fastexpand 3 ปีที่แล้ว

      @@sefiyt12 I'm in the process of learning that one

  • @poopingturtle7978
    @poopingturtle7978 4 ปีที่แล้ว +1

    So do you need to have the backdoor? If so how would you install it remotely?

    • @davidkostoski
      @davidkostoski 3 ปีที่แล้ว +1

      If he knew that he wouldn't be making videos that explain BASICS.
      He'd then have a 500k job as a security specialist.

  • @StefanRows
    @StefanRows 6 ปีที่แล้ว +4

    Kody, amazing Video as always! Can't wait for the next one!

  • @jackrichards3697
    @jackrichards3697 2 ปีที่แล้ว

    You've been a great directory ;) for basic info over the last few years. Thank you. Keep it coming!

  • @astralseeker
    @astralseeker 5 ปีที่แล้ว +1

    Music:
    Swedish progressive trance project: Vibrasphere
    Title: Sweet September
    ...
    no credit
    you're welcome

  • @GodKeks-
    @GodKeks- 2 ปีที่แล้ว

    Hello thanks i have a quetschen what u using in the window? Dell-3 what is this ?

  • @Daniel_CLopes
    @Daniel_CLopes 5 ปีที่แล้ว +2

    Great, great, great. Could you kindly upload a video explaining how to generate nmap reports, import report to metasploit framework and exploit vulnerability using scripts? I know we can find videos out there but I believe you guys can do it MUCH better.

  • @VetbossOfficial
    @VetbossOfficial 4 ปีที่แล้ว

    thank you. but can I save the computer connection so I can get access in the future as well? Because I want to connect to it more than once.

  • @kenny-kvibe
    @kenny-kvibe 5 ปีที่แล้ว +1

    This nc is really really awesome to use if you have to copy some text to other devices running linux.
    I mean It's like Copy-Paste over the local network, very convenient!

  • @Danieloani
    @Danieloani 4 ปีที่แล้ว +1

    I think don't understand the concept. The point of this video is to show how to control a remote computer using netcat.
    However, in order to make something work, at first, you need to open a port on the "remote computer" (which as hacker' you don't have access to).
    Is there a way to convince the target to open a port and run the commands via a bash?

  • @imrwe9691
    @imrwe9691 6 ปีที่แล้ว +4

    Your just awesome man .We would love if you put up a video of hacking these microsoft technician scammers and shutting down their network .It would be fun.

  • @FirstLast-hm8oz
    @FirstLast-hm8oz 5 ปีที่แล้ว +6

    My question is how to start a "nc -l -p 9669 -e /bin/bash " on the server if I am not in yet.

    • @Wastelander1972
      @Wastelander1972 4 ปีที่แล้ว +2

      If you’re using a Linux terminal, chances are you can chain the command... you could try piping it, but IDK if you will experience the same results with piping.
      Chain with ; pipe with | . Ethical hacking only, please.

    • @CaptBoykin
      @CaptBoykin 4 ปีที่แล้ว

      RCE would be required first.
      Netcat using -l is not a reverse shell. It is a bind shell.

    • @hyperdragon1013
      @hyperdragon1013 4 ปีที่แล้ว

      ok let me help you and people with the same question basically get in

    • @FirstLast-hm8oz
      @FirstLast-hm8oz 4 ปีที่แล้ว

      @@hyperdragon1013 I cannot get an answer. Something is hanging in an endless delay. How can send an answer ?

    • @FirstLast-hm8oz
      @FirstLast-hm8oz 4 ปีที่แล้ว

      @@CaptBoykin What is RCE ? There are abundant meanings for this. Were is the answer to my question hidden ?

  • @acostantino7624
    @acostantino7624 6 ปีที่แล้ว +4

    what are the pros using netcat insead of ssh?

    • @DDBAA24
      @DDBAA24 6 ปีที่แล้ว +4

      Well, in regards to transferring files over the network NC seems faster it could be my imagination but it does. Also to speed up SSH passing the -C flag will enable compression in the SSH session which does seem to speed things up slightly . I digress. Getting to the question, this is a chicken and the egg type question, in order to use NC on a remote system you would already have had to gain access to it , so to do that you would use SSH. So you wouldn't be able to use NC unless you had a shell already via SSH so therefore there are no pros because one doesn't exist without the other, no shell= no netcat. In order to use NC you would have to setup a listener (the server) and connect to the listener ( you the client). Hope that brings some clarity.

  • @lux-music6321
    @lux-music6321 3 ปีที่แล้ว

    3:35 if I try to connect to the server I just get
    (Unknown) [*my ip] 8888 (?) : Connection refused
    I'm running it from 2 VM's on the same computer

  • @younesmohssen8158
    @younesmohssen8158 6 ปีที่แล้ว +3

    What if you wanted to get a reverse shell but you didn't have physical access to the targeted computer?

  • @dualsensedynasty
    @dualsensedynasty 2 ปีที่แล้ว

    do you have anything like getting reverse shell from Public network and Public IP

  • @g.s.3389
    @g.s.3389 6 ปีที่แล้ว +2

    can you please make a video on how to make an headless rpi with kali so that wifi works without the need of a GUI. thx

  • @haskeww8193
    @haskeww8193 10 หลายเดือนก่อน

    I am very new i would love to be able to identify that a computer is compromised i don't have access to certain files despite being the administrator, i have played around downloaded comodo which at least allows me to deny processes from executing but i get lost looking threw processes, weird files, would love how to use a packet sniffer ect i really need to get a better foundation of the basics anything you recommend?

  • @GameChannelOfficial
    @GameChannelOfficial 6 ปีที่แล้ว +2

    How to connect to nc session vis Windows????

  • @nemo2225
    @nemo2225 6 ปีที่แล้ว

    You can simply ping the address for ip resolving. That's more anonymous than running nmap scan, right?

  • @CrackerWeb
    @CrackerWeb 5 ปีที่แล้ว +1

    To use the nc the client system(server) must have nc install, am i right?

  • @Mong3
    @Mong3 6 ปีที่แล้ว

    Please talk about C2's (command & control) and Payloads generators with build/execution time polymorphisms.

  • @sabrario
    @sabrario 6 ปีที่แล้ว

    what laptop do you have? Do you use any other system?

  • @asipalacios8701
    @asipalacios8701 7 หลายเดือนก่อน

    does it still work if you dont have physical access to both computers? is it really hacking or do you show connection with netcat here?

  • @2ubZ3r0
    @2ubZ3r0 3 ปีที่แล้ว

    With Quick Batch File Compiler can build an hiden .exe wit Netcat parameters same a .bat File, can use to build a small Backdoor

  • @LiquidTension187
    @LiquidTension187 3 ปีที่แล้ว

    Hey great video !!! Very informative (: just curious, how big of a file can you transfer on LAN using netcat ?

  • @paulredman1520
    @paulredman1520 3 ปีที่แล้ว

    do both of the computers have to be using kali?

  • @DSAhmed
    @DSAhmed 4 ปีที่แล้ว

    why do you run nmap just to get priceline's IP address? seems a bit much. (dig, or nslookup seems to work just fine, plus you know 80/443 will be open)

  • @jacoblessard8213
    @jacoblessard8213 2 ปีที่แล้ว +1

    I know this is 3 years old but someone please help, I'm trying to figure out a way I can do exactly this but just by using a rogue access point. In theory, if someone is connected to my rogue access point shouldn't I be able to then connect to it with netcat and get a reverse shell on them. I really just want to know more about modern attacks that are done with rogue access points.

  • @TheCuriousM1nd
    @TheCuriousM1nd 6 ปีที่แล้ว

    What laptop did you use sir!

  • @tlouik
    @tlouik 3 ปีที่แล้ว

    what laptop do u use?

  • @Uneke
    @Uneke 5 ปีที่แล้ว

    You really hate Priceline don’t you! 😂
    I called out what site you were gonna pull an ip from before you said it 😂
    Amazing!
    Perhaps one day you could make a video with the story behind it? Maybe call it “in the life of null byte, the shady practices of a crappy website” haha

  • @jannmoon
    @jannmoon 5 ปีที่แล้ว

    really loving the new haircut bro

  • @romandp4742
    @romandp4742 3 ปีที่แล้ว

    how do i get the terminal command thing?

  • @skyelf4270
    @skyelf4270 2 ปีที่แล้ว

    Hello, I try to connect two of my window laptop but keep getting this error message, do you know why? Ncat: An existing connection was forcibly closed by the remote host.

  • @roya2045
    @roya2045 3 ปีที่แล้ว

    Hi Bro I have a system in my network I know its IP is there a way to access the system without using a payload I want to access its drives. Please reply

  • @htiguy1
    @htiguy1 5 ปีที่แล้ว +1

    Very interesting, you have some great content. Thank you.

    • @NullByteWHT
      @NullByteWHT  5 ปีที่แล้ว

      htiguy1 thanks for watching! Tell all of your friends about us! 😃

  • @bj76681
    @bj76681 2 ปีที่แล้ว

    Hi Null Byte,
    I tried this but am not getting the connection establed on the listener side. it's showing " Listening on [any] 88......" after that no results. I tried adding the IP in ufw but still no luck. can help me to resolve this issue?

  • @utshabchouhan1225
    @utshabchouhan1225 3 ปีที่แล้ว

    Sir, I have access to upload any file in C:\Windows\Temp folder of (IIS/Windows server) .Can I get reverse connection just by uploading a reverse shell ?

    • @8080VB
      @8080VB 3 ปีที่แล้ว

      yes use -e

  • @kingslayer9097
    @kingslayer9097 6 ปีที่แล้ว

    Love the cats behind u

  • @sinan5488
    @sinan5488 6 ปีที่แล้ว

    FINALLY A GOOD TUTORIAL BY A GOOD HACKER

  • @whyarewealwaysyelling
    @whyarewealwaysyelling 5 ปีที่แล้ว +1

    Is it true you turned down a guest appearance on mr. Robot?

  • @stacyhoff8882
    @stacyhoff8882 5 ปีที่แล้ว

    Why did you blurr the kali linux date at the top

  • @spiceyswag7519
    @spiceyswag7519 4 ปีที่แล้ว

    Does this work Over WAN?

  • @larbiboudibaboudiba5335
    @larbiboudibaboudiba5335 6 ปีที่แล้ว +4

    u didnt montion the netcat -e "specifique version of netcat that can execute command" | | echo "nice work bro "

    • @ko-Daegu
      @ko-Daegu 6 ปีที่แล้ว

      larbiboudiba boudiba
      6:33
      He did it to execute bash

    • @ko-Daegu
      @ko-Daegu 6 ปีที่แล้ว

      larbiboudiba boudiba
      You wrote netcat -e
      So I thought that you where talking about nc -e
      I don’t know evil netcat this is a new for me will check it out Thankx

    • @ziomek96011
      @ziomek96011 6 ปีที่แล้ว

      You can still make a reverse shell by reading and writing to a named pipe, you can find info about how to do it in the man pages.

  • @velociraptux7
    @velociraptux7 4 ปีที่แล้ว +1

    I thought what I'd do was I'd pretend I was one of those deaf-mutes

  • @amarchhabra2175
    @amarchhabra2175 6 ปีที่แล้ว

    Thanks for the great video. The Null Byte web page seems to be down. Will it eventually be brought back online?

  • @matteocassino3172
    @matteocassino3172 3 ปีที่แล้ว

    Love the tool and the awesome GhostInTheShell wallpaper (must have! Thx reverse pic search ;-)

  • @Ниодин-ж1е
    @Ниодин-ж1е 4 ปีที่แล้ว

    can the server get a reverse shell on the client?

  • @Dev_UI
    @Dev_UI 6 ปีที่แล้ว

    I love how hard you hit that mech keyboard in most videos you've made :D :)

    • @NullByteWHT
      @NullByteWHT  6 ปีที่แล้ว +1

      I spilled a yerba mate tea all over my keyboard and it is extremely sticky

    • @Dev_UI
      @Dev_UI 6 ปีที่แล้ว

      😁😂

  • @geekster3092
    @geekster3092 4 ปีที่แล้ว

    but how did you get the server installed on the victims pc withou them knowing?

  • @Software-ns9li
    @Software-ns9li 6 ปีที่แล้ว

    I am trying to get a reverse shell on a PC with nothing more than an IP address, how do i accomplish this? i have a lab setup with different internet sources etc, all i can get is an IP, how do i get a revere shell with just an IP?, I have tried NetCat and MSFvenom but have failed

  • @tadakiga6611
    @tadakiga6611 2 ปีที่แล้ว

    why did you use port 6996?

  • @bobbynewport3332
    @bobbynewport3332 5 ปีที่แล้ว

    🤓🤓no FIFO persistent backdoor? What if -e isn't available?

  • @Anonymous-vh6kp
    @Anonymous-vh6kp 4 ปีที่แล้ว

    You would need access to the target to run netcat in the first place, so why not just execute from whatever shell you have already gained access to?

    • @Anonymous-vh6kp
      @Anonymous-vh6kp 4 ปีที่แล้ว

      Oh, so let's say you managed to exploit a vulnerbaility and was able to perform some kind of remote code execution, you would execute a netcat reverse shell. Now you have back door available to connect to whenever you want.

  • @mnageh-bo1mm
    @mnageh-bo1mm 6 ปีที่แล้ว

    Can you do this with metasplot ?

  • @mahigiri8062
    @mahigiri8062 4 ปีที่แล้ว

    *Can somebody help me please*
    I used 'XEEXE' to create payloads but after running it on another windows, through where should I listen to it. I tried meterpreter but no connection was established. I believe xeexe is something different and might require something else. How can I establish connection please help

  • @nathanpetronzio6442
    @nathanpetronzio6442 11 หลายเดือนก่อน

    I keep getting "protocol mismatch" when attempting to establish an SSH connection

  • @Akira29H
    @Akira29H 4 ปีที่แล้ว

    can you demonstrate how to use from kali to windows?

  • @adriansony9762
    @adriansony9762 3 ปีที่แล้ว

    Great content I love your channel very much

  • @MinerKingX
    @MinerKingX 4 ปีที่แล้ว

    how can you close the listener tab without loosing the connection

  • @johnvardy9559
    @johnvardy9559 2 ปีที่แล้ว

    you are amazing,how can i see uf is activate netcat?:/

  • @hengamez_1879
    @hengamez_1879 6 ปีที่แล้ว

    dose it work 4mac?

  • @ltwotimesl
    @ltwotimesl 4 ปีที่แล้ว

    Man is SMACKIN' those keys.

    • @NullByteWHT
      @NullByteWHT  4 ปีที่แล้ว

      Like little tiny sledgehammers on every finger.

  • @rayamoooooo685
    @rayamoooooo685 3 ปีที่แล้ว

    *just glad i can follow along*

  • @jitheshkuyyalil
    @jitheshkuyyalil 3 ปีที่แล้ว

    Wonderful. Thank you so much.

  • @danielbenisti3664
    @danielbenisti3664 5 ปีที่แล้ว

    what is reverse shell?

  • @andreimerla924
    @andreimerla924 5 ปีที่แล้ว

    resource temporarily unavailable i got this error when i tried to connect to the server

  • @vanvleermuizen926
    @vanvleermuizen926 5 ปีที่แล้ว

    Is that HOME in the background?

  • @chronewhite4197
    @chronewhite4197 3 หลายเดือนก่อน

    I'm lucky because I learned what recon and osint is just 2 days ago, so I'm not confused by these terms)

  • @Morpheus776
    @Morpheus776 6 ปีที่แล้ว

    i wish i had the computer knowledge this guy has. where should one start?

  • @mrswdishboi3343
    @mrswdishboi3343 2 ปีที่แล้ว +1

    After using nc -l 8888 my screen just freezes
    Can anybody help?

    • @seekovebot6438
      @seekovebot6438 2 ปีที่แล้ว

      it's not frozen
      it's waiting for a connection to be established

  • @debbiedaley6989
    @debbiedaley6989 5 ปีที่แล้ว

    Hello...I sent u a list of questions 4 days ago using Termux....can u please help me ?????

  • @v.6023
    @v.6023 4 ปีที่แล้ว +2

    Dude... I can't even make the connection between both computers, even though I connect the client to the server-port messages won't happen as they did with you...

    • @romangrace2507
      @romangrace2507 4 ปีที่แล้ว

      use a -pn the host computer may be blocking pings

    • @v.6023
      @v.6023 4 ปีที่แล้ว

      @@romangrace2507 I believe it was because I can't detect wireless networks due to VM detecting connection through cable? otherwise pls elaborate. Thanks!

    • @v.6023
      @v.6023 4 ปีที่แล้ว

      @@romangrace2507 Would I include it before writing the ip address? is it possible that it happens because I don't have wireless connection? vm detects wired connection.

  • @laszlob3683
    @laszlob3683 ปีที่แล้ว

    invalid option --"e"
    6:45

  • @mercilesspidermissesbaby_w4737
    @mercilesspidermissesbaby_w4737 4 ปีที่แล้ว

    hey could you please give me the link to the download you used, im having a hard time trusting any links

    • @mihaiioc.3809
      @mihaiioc.3809 4 ปีที่แล้ว

      Don't send messages while riding a horse

  • @xdtimetoastergaming273
    @xdtimetoastergaming273 4 ปีที่แล้ว

    Hey I know this is a year old but does netcat the same as ncat. Cause I have something called ncat on my computer

  • @84xyzabc
    @84xyzabc 3 ปีที่แล้ว

    It would not have hurt if a larger font size in terminal was used.