@@personallothus473 Anyone who gives advice, on any subject that could be considered illegitimate, should be considered fed. For example, if you read a guide on how to stay anonymous on the dark web, you should consider that the author may be a fed, and that the guide could have been written to mislead you into compromising your identity. Thus people joke about content creators who deal with "similar" topics being feds. And for anyone unaware, feds, glowies or alphabet boys are any person/group of people working on behalf of a government organisation (think CIA, FBI)
a tip, the home key will return to the beginning of the line and the end key will go back to the end also sometimes the up and down arrows will do the same
I'm learning how to use nmap, I have a PC which I use as a small server to run scans. I thought of doing a scan on my university's server, now I'm blacklisted by the firewall, I'm a fucking genius :)
Back when I was in a university back in the late 90s, I was not doing nmap, but using the univeristy's Sun SPARC UNIX servers running at 'nice 20' (so super low priority) on one of the distributed computing applications, I think it was for RC4 cracking, and up comes the talkd service from the admin messaging me. Pretty much said "cut it out". He wasn't too upset at me because I was running it at lowest priority with the 'nice' command, so not too bad. Now 26 years later, I myself have been working at a community college for 24+ years in the role of the system/network admin and infosec guy.
I am strictly a local application hacker, so I only ever need to bypass local process security measures. Network hacking seems like the total opposite of application hacking. What the best part about network hacking?
When you work entirely in CLI and doing everything remote, no room for GUI, and especially if you don't want to bloat your system with an X-server to connect to. ;-) UIs are nice, but always learn the base level things. When things break, it helps in understanding how to troubleshoot and fix the problem.
Hey: 👋 One of your videos just got disappeared - I don't remember the name but i wanted to watch it so i downloaded it on TH-cam app but now it disappeared - can you provide a link
Sorry if you mentioned this in the Video as I am not allow to get much of any sleep where I live due to a Syndicate of Children plotting against me I may have forgot but what distro of Linux are you using?
I noticed you pronounce "sudo" the same way I do. Are you from New Hampshire? Well, you don't have to answer that, but that's where I am from. It seems like every other hacking video I watch, the content creator pronounces it like "dew" instead of "doe."
It would be nice if there was a program where you only had to enter the target IP and then the program automatically hacks into the computer. Hacking for the lazy, so to speak. 😅
I commend you for attempting to teach others. However, you have a long way to go before teaching. This is not Nmap basics. The basics would be understanding how this tool works. You explaining these commands are on the surface level of someone who doesn’t understand what’s going on, but knows a general idea. I’d advise people to watch people that actually know their stuff, like Ippsec.
my favorite PsyOP Fed Agent channel for sure
I like the no-music, no-bs, no cuts vibe.
My most used tools when I'm hacking is my sun glasses and my otaku suit.
you probably don't actually hack anything.
@@ShaunPrince How could u say that? I'm a hackerman, I do a lot of hacker stuffs... pff
Yeah ... Ive seen hackers in Russia they most commonly use cocaine
Great stuff, "Ctrl + a" to jump to the beginning of the line 🙂
@@luqmaanmarthinus6820 tyyy!! I forgot about that shortcut
IIRC you can do `sudo !!` to redo the previous command with sudo when you forgot it again
@@Cyb3rMaddy "Ctrl + E" jumps to the end of the line. 😁
@@mbielchris lifesaver
@@Cyb3rMaddy Are you a fed honey potter or something?
There is something with you voice 😊girl... can't watch without rewinding. So soft,gorgeous, man its killing...❤
fed of the year fr
Wow you know so much cant imagine how good your skill will be 10 years from now
I don’t care who they send, I’m not paying my taxes
no taxes, no ability to vote and no access to any social service. No access to public infrastructure. Makes sense, you're smart.
sure lil bro
Whatever makes you feel better lil bro 🫂
nice reference lmao
She looks like a Fed, but She makes nice content
I`m not american so I don`t get why there's a Fed narrative.
Why is that?
What's the issue?
@@personallothus473 they can't believe a woman can get into cybersecurity
He's mad he doesn't have a gf 😁@personallothus473
@@personallothus473 it's a joke...
@@personallothus473 Anyone who gives advice, on any subject that could be considered illegitimate, should be considered fed.
For example, if you read a guide on how to stay anonymous on the dark web, you should consider that the author may be a fed, and that the guide could have been written to mislead you into compromising your identity.
Thus people joke about content creators who deal with "similar" topics being feds.
And for anyone unaware, feds, glowies or alphabet boys are any person/group of people working on behalf of a government organisation (think CIA, FBI)
Maddy you can press down arrow or side arrow when a scan takes long to show how much time is left in your scan.
a tip, the home key will return to the beginning of the line and the end key will go back to the end also sometimes the up and down arrows will do the same
she is so paranoid.. i love it!
I thought it was to check out things, not that reveal vulnerabilties, great info maddie!
nmap is one of the neatest tools I've seen since the for loop in the Bash shell
Girl it's fun listening to you I enjoy it.
due to UDP being connectionless (no handshake) the scan takes ages.
real shit
Great beginner level tutorial, thanks!
AI getting crazy good
HELP THATS WHAT I THOUGHT but she actually was on DefCon
@@ram-gc7gl I wasn't at DefCon that was my AI
Glowie
you give me hope. thank you.
yes now i can hack into the mainframes like in the movies
hack the planet
everyone forgets sudo. thats why we bang bang
Keep it up maddy ❤🙌
i love your work keep it up 👍
This is such an awesome topic aaand, is that a hint of nystagmus I see?
Nice filter, fed.
has she done transitioning. no clue. no idea. she could be a spy. a pride-theme spy.
❤❤
My most used tool is actually Neofetch
I use arch btw
@@HermesSilva-xt6dt I use Qubes btw
I’ve been in tech for 100 years but only really started using nmap in the last couple years. I dunno how I survived without it all that time.
I'm learning how to use nmap, I have a PC which I use as a small server to run scans. I thought of doing a scan on my university's server, now I'm blacklisted by the firewall, I'm a fucking genius :)
Back when I was in a university back in the late 90s, I was not doing nmap, but using the univeristy's Sun SPARC UNIX servers running at 'nice 20' (so super low priority) on one of the distributed computing applications, I think it was for RC4 cracking, and up comes the talkd service from the admin messaging me. Pretty much said "cut it out". He wasn't too upset at me because I was running it at lowest priority with the 'nice' command, so not too bad. Now 26 years later, I myself have been working at a community college for 24+ years in the role of the system/network admin and infosec guy.
Dope vid, would luv to watch a vid on airodump :p
Don't scan tho. They'll know you'r doing something nasty. Nice Mr. Frendel plush
I am strictly a local application hacker, so I only ever need to bypass local process security measures.
Network hacking seems like the total opposite of application hacking.
What the best part about network hacking?
the network
Nice glo light in the corner
omg is that Beadie Russell
I personally love Zenmap cause I just prefer a GUI. But nmap is essential to the beginning of any CTF challenge.
When you work entirely in CLI and doing everything remote, no room for GUI, and especially if you don't want to bloat your system with an X-server to connect to. ;-) UIs are nice, but always learn the base level things. When things break, it helps in understanding how to troubleshoot and fix the problem.
tfw no mary jane hacker gf
do what my bf did and get ur gf into cybersec
ASMR video 👍
cool
"Ethical hacker" 😉
😑😑😑😑 everyone has a gun but the police save you from thefts that's the difference between criminals and ethical hackers.
carefull what you do because some isp's look at what youre sending out on your ports :(
The target is Metasploitable2, sooooo
NOICE
thank you.
Alba Spurs
Jones Jennifer Gonzalez Maria Garcia Edward
Hey: 👋
One of your videos just got disappeared - I don't remember the name but i wanted to watch it so i downloaded it on TH-cam app but now it disappeared - can you provide a link
"sure, ethical" lol
Sorry if you mentioned this in the Video as I am not allow to get much of any sleep where I live due to a Syndicate of Children plotting against me I may have forgot but what distro of Linux are you using?
How did i automatically see you on twitter insta and youtube within a short time frame?
why is her eyes moving like that??
how do u find an IP like does anybody know the FBI IP so i can try this stuff on their internet? ty.
I recon burp suite is more used than NMAP
You look like an AI!
The last time i saw u you were doing leet code and ur eyes was fine what did happen
you look soo comfy in that hoodie loooool
6:21 You have a nice tremolo in your voice.
Basics of how to walk. For Olympic runners.
@@teksimian what could have made this tutorial more beginner friendly? For my future reference for videos
I know that's the actual name, and you are correct, but it feels so weird to actually call it, "Network Mapper".
Hum... looks like a fed talking about things they dont actually know.
@@Thurgenev Oh wow, this is a first. I don't think I've ever been called a Fed before. 🤣
@@dj_chateau No, not u, her...
@@Thurgenev Awww... 😭 well now I feel left out.
I noticed you pronounce "sudo" the same way I do. Are you from New Hampshire? Well, you don't have to answer that, but that's where I am from. It seems like every other hacking video I watch, the content creator pronounces it like "dew" instead of "doe."
It’s short for super user do, so they are pronouncing the second half like the word ‘do’
You are so sweet, when you have to grin and almost giggle about what you say once you heard yourself saying it! 😄🥰
simp
@@maxfrischdev Simpin on TH-cam now are we?
It would be nice if there was a program where you only had to enter the target IP and then the program automatically hacks into the computer. Hacking for the lazy, so to speak. 😅
wait they have a GUI version??
yes
why is hacker always "hacker"? just curious
ur pretty
Legend say "i can hack nasa using html". (Okay its not funny)
When is your OnlyFeds leak?
Nice try fedboy!
don't use nmap anymore, use rustscan instead to go faster😂
tbh rustscan is faster but trips up more automated responses from firewalls or Ips, nmap is much safer
@@S4dakoTv I mean for CTF and challenge, it's ideal
N in nmap for NSA connected to the CIA they are coming for me. TH-cam full of vulns
hackers probably dont look like u lol
I commend you for attempting to teach others. However, you have a long way to go before teaching. This is not Nmap basics. The basics would be understanding how this tool works. You explaining these commands are on the surface level of someone who doesn’t understand what’s going on, but knows a general idea. I’d advise people to watch people that actually know their stuff, like Ippsec.
Y’all joke just sexist, if it was done by a Man U wouldn’t say it
do asmr
you can map my network any time
weirdo
Something is off about your camera or face lol
blablabla Nothing new here...