@@personallothus473 Anyone who gives advice, on any subject that could be considered illegitimate, should be considered fed. For example, if you read a guide on how to stay anonymous on the dark web, you should consider that the author may be a fed, and that the guide could have been written to mislead you into compromising your identity. Thus people joke about content creators who deal with "similar" topics being feds. And for anyone unaware, feds, glowies or alphabet boys are any person/group of people working on behalf of a government organisation (think CIA, FBI)
a tip, the home key will return to the beginning of the line and the end key will go back to the end also sometimes the up and down arrows will do the same
I am strictly a local application hacker, so I only ever need to bypass local process security measures. Network hacking seems like the total opposite of application hacking. What the best part about network hacking?
Sorry if you mentioned this in the Video as I am not allow to get much of any sleep where I live due to a Syndicate of Children plotting against me I may have forgot but what distro of Linux are you using?
Hey: 👋 One of your videos just got disappeared - I don't remember the name but i wanted to watch it so i downloaded it on TH-cam app but now it disappeared - can you provide a link
I'm learning how to use nmap, I have a PC which I use as a small server to run scans. I thought of doing a scan on my university's server, now I'm blacklisted by the firewall, I'm a fucking genius :)
Back when I was in a university back in the late 90s, I was not doing nmap, but using the univeristy's Sun SPARC UNIX servers running at 'nice 20' (so super low priority) on one of the distributed computing applications, I think it was for RC4 cracking, and up comes the talkd service from the admin messaging me. Pretty much said "cut it out". He wasn't too upset at me because I was running it at lowest priority with the 'nice' command, so not too bad. Now 26 years later, I myself have been working at a community college for 24+ years in the role of the system/network admin and infosec guy.
I noticed you pronounce "sudo" the same way I do. Are you from New Hampshire? Well, you don't have to answer that, but that's where I am from. It seems like every other hacking video I watch, the content creator pronounces it like "dew" instead of "doe."
When you work entirely in CLI and doing everything remote, no room for GUI, and especially if you don't want to bloat your system with an X-server to connect to. ;-) UIs are nice, but always learn the base level things. When things break, it helps in understanding how to troubleshoot and fix the problem.
It would be nice if there was a program where you only had to enter the target IP and then the program automatically hacks into the computer. Hacking for the lazy, so to speak. 😅
I commend you for attempting to teach others. However, you have a long way to go before teaching. This is not Nmap basics. The basics would be understanding how this tool works. You explaining these commands are on the surface level of someone who doesn’t understand what’s going on, but knows a general idea. I’d advise people to watch people that actually know their stuff, like Ippsec.
my favorite PsyOP Fed Agent channel for sure
I like the no-music, no-bs, no cuts vibe.
Great stuff, "Ctrl + a" to jump to the beginning of the line 🙂
@@luqmaanmarthinus6820 tyyy!! I forgot about that shortcut
IIRC you can do `sudo !!` to redo the previous command with sudo when you forgot it again
@@Cyb3rMaddy "Ctrl + E" jumps to the end of the line. 😁
@@mbielchris lifesaver
@@Cyb3rMaddy Are you a fed honey potter or something?
My most used tools when I'm hacking is my sun glasses and my otaku suit.
you probably don't actually hack anything.
@@ShaunPrince How could u say that? I'm a hackerman, I do a lot of hacker stuffs... pff
Yeah ... Ive seen hackers in Russia they most commonly use cocaine
she is so paranoid.. i love it!
I don’t care who they send, I’m not paying my taxes
no taxes, no ability to vote and no access to any social service. No access to public infrastructure. Makes sense, you're smart.
sure lil bro
Whatever makes you feel better lil bro 🫂
nice reference lmao
She looks like a Fed, but She makes nice content
I`m not american so I don`t get why there's a Fed narrative.
Why is that?
What's the issue?
@@personallothus473 they can't believe a woman can get into cybersecurity
He's mad he doesn't have a gf 😁@personallothus473
@@personallothus473 it's a joke...
@@personallothus473 Anyone who gives advice, on any subject that could be considered illegitimate, should be considered fed.
For example, if you read a guide on how to stay anonymous on the dark web, you should consider that the author may be a fed, and that the guide could have been written to mislead you into compromising your identity.
Thus people joke about content creators who deal with "similar" topics being feds.
And for anyone unaware, feds, glowies or alphabet boys are any person/group of people working on behalf of a government organisation (think CIA, FBI)
Wow you know so much cant imagine how good your skill will be 10 years from now
due to UDP being connectionless (no handshake) the scan takes ages.
real shit
I thought it was to check out things, not that reveal vulnerabilties, great info maddie!
Maddy you can press down arrow or side arrow when a scan takes long to show how much time is left in your scan.
a tip, the home key will return to the beginning of the line and the end key will go back to the end also sometimes the up and down arrows will do the same
nmap is one of the neatest tools I've seen since the for loop in the Bash shell
There is something with you voice 😊girl... can't watch without rewinding. So soft,gorgeous, man its killing...❤
AI getting crazy good
HELP THATS WHAT I THOUGHT but she actually was on DefCon
@@ram-gc7gl I wasn't at DefCon that was my AI
everyone forgets sudo. thats why we bang bang
yes now i can hack into the mainframes like in the movies
hack the planet
you give me hope. thank you.
Great beginner level tutorial, thanks!
Girl it's fun listening to you I enjoy it.
This is such an awesome topic aaand, is that a hint of nystagmus I see?
fed of the year fr
I am strictly a local application hacker, so I only ever need to bypass local process security measures.
Network hacking seems like the total opposite of application hacking.
What the best part about network hacking?
the network
I’ve been in tech for 100 years but only really started using nmap in the last couple years. I dunno how I survived without it all that time.
Nice filter, fed.
has she done transitioning. no clue. no idea. she could be a spy. a pride-theme spy.
Sorry if you mentioned this in the Video as I am not allow to get much of any sleep where I live due to a Syndicate of Children plotting against me I may have forgot but what distro of Linux are you using?
My most used tool is actually Neofetch
I use arch btw
@@HermesSilva-xt6dt I use Qubes btw
How did i automatically see you on twitter insta and youtube within a short time frame?
Hey: 👋
One of your videos just got disappeared - I don't remember the name but i wanted to watch it so i downloaded it on TH-cam app but now it disappeared - can you provide a link
i love your work keep it up 👍
I'm learning how to use nmap, I have a PC which I use as a small server to run scans. I thought of doing a scan on my university's server, now I'm blacklisted by the firewall, I'm a fucking genius :)
Back when I was in a university back in the late 90s, I was not doing nmap, but using the univeristy's Sun SPARC UNIX servers running at 'nice 20' (so super low priority) on one of the distributed computing applications, I think it was for RC4 cracking, and up comes the talkd service from the admin messaging me. Pretty much said "cut it out". He wasn't too upset at me because I was running it at lowest priority with the 'nice' command, so not too bad. Now 26 years later, I myself have been working at a community college for 24+ years in the role of the system/network admin and infosec guy.
Hai cyber ..dia do not us😮❤
Don't scan tho. They'll know you'r doing something nasty. Nice Mr. Frendel plush
Keep it up maddy ❤🙌
Dope vid, would luv to watch a vid on airodump :p
Nice glo light in the corner
Glowie
❤❤
carefull what you do because some isp's look at what youre sending out on your ports :(
The target is Metasploitable2, sooooo
omg is that Beadie Russell
why is her eyes moving like that??
The last time i saw u you were doing leet code and ur eyes was fine what did happen
I noticed you pronounce "sudo" the same way I do. Are you from New Hampshire? Well, you don't have to answer that, but that's where I am from. It seems like every other hacking video I watch, the content creator pronounces it like "dew" instead of "doe."
It’s short for super user do, so they are pronouncing the second half like the word ‘do’
tfw no mary jane hacker gf
do what my bf did and get ur gf into cybersec
why is hacker always "hacker"? just curious
Why is everything " basics for hackers"? if you are a hacker you probably don't NEED the basics.
ASMR video 👍
I personally love Zenmap cause I just prefer a GUI. But nmap is essential to the beginning of any CTF challenge.
When you work entirely in CLI and doing everything remote, no room for GUI, and especially if you don't want to bloat your system with an X-server to connect to. ;-) UIs are nice, but always learn the base level things. When things break, it helps in understanding how to troubleshoot and fix the problem.
"sure, ethical" lol
I know that's the actual name, and you are correct, but it feels so weird to actually call it, "Network Mapper".
Hum... looks like a fed talking about things they dont actually know.
@@Thurgenev Oh wow, this is a first. I don't think I've ever been called a Fed before. 🤣
@@dj_chateau No, not u, her...
@@Thurgenev Awww... 😭 well now I feel left out.
how do u find an IP like does anybody know the FBI IP so i can try this stuff on their internet? ty.
"Ethical hacker" 😉
😑😑😑😑 everyone has a gun but the police save you from thefts that's the difference between criminals and ethical hackers.
thank you.
6:21 You have a nice tremolo in your voice.
NOICE
cool
I recon burp suite is more used than NMAP
wait they have a GUI version??
yes
You look like an AI!
Alba Spurs
You are so sweet, when you have to grin and almost giggle about what you say once you heard yourself saying it! 😄🥰
simp
@@maxfrischdev Simpin on TH-cam now are we?
Jones Jennifer Gonzalez Maria Garcia Edward
It would be nice if there was a program where you only had to enter the target IP and then the program automatically hacks into the computer. Hacking for the lazy, so to speak. 😅
you look soo comfy in that hoodie loooool
When is your OnlyFeds leak?
Basics of how to walk. For Olympic runners.
@@teksimian what could have made this tutorial more beginner friendly? For my future reference for videos
Nice try fedboy!
ur pretty
Legend say "i can hack nasa using html". (Okay its not funny)
don't use nmap anymore, use rustscan instead to go faster😂
tbh rustscan is faster but trips up more automated responses from firewalls or Ips, nmap is much safer
@@S4dakoTv I mean for CTF and challenge, it's ideal
N in nmap for NSA connected to the CIA they are coming for me. TH-cam full of vulns
I commend you for attempting to teach others. However, you have a long way to go before teaching. This is not Nmap basics. The basics would be understanding how this tool works. You explaining these commands are on the surface level of someone who doesn’t understand what’s going on, but knows a general idea. I’d advise people to watch people that actually know their stuff, like Ippsec.
hackers probably dont look like u lol
Y’all joke just sexist, if it was done by a Man U wouldn’t say it
you can map my network any time
weirdo
do asmr
Something is off about your camera or face lol
blablabla Nothing new here...