1:26 incase anyone is wondering. KISS is an acronym for Keep It Simple Stupid. I learned that when I was learning through my Software Engineering courses (currently I am studying right now)
I'm a big zero in this, I don't know in how many years I will learn it. I can't afford to buy any particular course. But I really want to learn it all.
PLEASE response 🤔🤔😲😲 so what can you actually hack with nmap just a network or also computer/phones do i need to have a special network adapter or just the nmap software?
why the "hack" kali clears tmp file.. it took 4hours to figure it out.. you should spoke about? anyway I need more and more of you? what you think.. it isn't my 1st.. be happy
can you make a video about Metasploit becouse if i open metasploit i don,t know what to enter to create a payload or is there a website where i can copy the script to create a payload and what is the difference between a payload and a virus
I think virus is to destroy the system and payload is like um maybe you the gun you steal with lol, idk i just started learning ethical hacking yesterday
first of all I want to congratulate you for your excellent video about nmap scripts. I want to ask if a port is vulnerable, can I use it to have free internet through a vpn tunnel? like http injector. and I don't know how to set up for example the http injector .your advice will be valuable to me.
I feel so stupid for asking... But could someone please break this down "Barney Style" or link to something that may help... what is "Local vs Foreign Address"? I know there's alot of references... but gosh dangit my brain cant wrap around it when reading about it. I know even wikipedia has a page, and there's alot of things saying "here you'll see the Local or Foreign Address" I believe I understand: Proto: UDP/TCP State: LISTENING/ESTABLISHED/TIME_WAIT But for some reason the concept of Local Address: 0.0.0.0:445 Foreign Address:0.0.0.0:0 Is like trying to tell me the that watermelon is a berry or that Pluto isn't a planet... If there's any simple way to understand better, or a nice illustration/video I'd greatly appreciate it. I'm sorry, I feel so stupid but its always been explained to me as "it just is" *Edit* Oops I meant to link this as and example. www.howtogeek.com/howto/28609/how-can-i-tell-what-is-listening-on-a-tcpip-port-in-windows/
I never thought nmap is this much powerful...I have been watching all the videos in the enumeration series and man I have to say "great content"
How People Get Infected With Malicious Word Document[]:
th-cam.com/video/E-Xc_bQyG2c/w-d-xo.html
im in my first steps and i feel i learn a lot from this man. i really appreciate what you are giving to the community, keep up sir
The accent went from british english to indian english. Good tutorial bro thanks
The world's best teacher
❤much love for this Kenyan hacker
duuuude this is great
Keep uploading Sir
@Hackersploit is on fire 🔥you are good bro....
Looking for this for soo long, thankyou soo much!!
@Billy Kazantzis You are so much jealous of this guy, get the fuck off.
Thanks a lot sir. This is an amazing series of video tutorials. This helps me a lot.👍👍😘
1:26 incase anyone is wondering. KISS is an acronym for Keep It Simple Stupid. I learned that when I was learning through my Software Engineering courses (currently I am studying right now)
Yep Kiss courses for me lol
New into is DAMNNNN awesome love it!!
Thanks a lot sir. This is an amazing series of video tutorials. This helps me a lot.👍👍😘
1
Reply
Nice one .More Nmap tricks please
Excellent video thank you
On a roll hackersploit...
thank you very much , great job in this series it is very useful .
keep going .
You are amazing man, i am a big fan!
Nice videos
nice , u r using BRAVE browser
Great informative video
I'm a big zero in this, I don't know in how many years I will learn it. I can't afford to buy any particular course. But I really want to learn it all.
PLEASE response 🤔🤔😲😲
so what can you actually hack with nmap just a network or also computer/phones
do i need to have a special network adapter or just the nmap software?
The amazing video
hey i was trying to perform this but did not get it.pls can you help me out
Why are you still using metasploitable 2?
U are really great may allah bless you ...keep it up👍
Yes he is
May Allah bless you too
ive just started into this and looking to get a web vulnerability scanner tool now.
any download links please ?
So what do we do with those cve? I dont get it.
I don't get what you do once you have the vulnnerabillitys
Can i use this as an alternative for nesses?
Why you cant make it in Android Termux no root sir. Please make also these things in Android.
why the "hack" kali clears tmp file.. it took 4hours to figure it out.. you should spoke about? anyway I need more and more of you? what you think.. it isn't my 1st.. be happy
can you make a video about Metasploit
becouse if i open metasploit i don,t know what to enter to create a payload
or is there a website where i can copy the script to create a payload
and what is the difference between a payload and a virus
I think virus is to destroy the system and payload is like um maybe you the gun you steal with lol, idk i just started learning ethical hacking yesterday
first of all I want to congratulate you for your excellent video about nmap scripts. I want to ask if a port is vulnerable, can I use it to have free internet through a vpn tunnel? like http injector. and I don't know how to set up for example the http injector .your advice will be valuable to me.
good!
When It took 2 hours to scan and showed the result of a regular port scan instead of a vulnerability one
I had nmap 7.60 installed and had to manually download and install 7.70 for the script to work. I'm on Ubuntu.
Is it possible for you to do a video on how to get free internet using bug hosts n how to configure using any tunnels app
Hlo,
I would like to ask that i am new to this so from where should i start??? I am a little confused..
Check out the penetration testing boot camp playlist under the playlist tab.
I have no knowledge of ethical hacking so can i start from penetration testing bootcamp???
@@RohinishkSingh yep
give link to your udemy course
can we use stealth scan and decoy scan ?
yes
the vulners script didnt work.
I feel so stupid for asking...
But could someone please break this down "Barney Style" or link to something that may help...
what is "Local vs Foreign Address"?
I know there's alot of references... but gosh dangit my brain cant wrap around it when reading about it.
I know even wikipedia has a page, and there's alot of things saying "here you'll see the Local or Foreign Address"
I believe I understand:
Proto: UDP/TCP
State: LISTENING/ESTABLISHED/TIME_WAIT
But for some reason the concept of
Local Address: 0.0.0.0:445
Foreign Address:0.0.0.0:0
Is like trying to tell me the that watermelon is a berry or that Pluto isn't a planet...
If there's any simple way to understand better, or a nice illustration/video I'd greatly appreciate it.
I'm sorry, I feel so stupid but its always been explained to me as
"it just is"
*Edit*
Oops I meant to link this as and example.
www.howtogeek.com/howto/28609/how-can-i-tell-what-is-listening-on-a-tcpip-port-in-windows/
Alexis I need to ask you something T.T.
hey can you help me out pleaaaseeeee
❤️
3:10 how to get that ip address 🙏🏻
ifconfig on cmd
So how come it doesn’t detect any vulnerability on port 21? It’s already well known that it has backdoor vulnerability. This script seems useless.
Windows 10 OS use ethical hac*king course.
✌️
Second
First
Go Ahead and Cry
@Billy Kazantzis Bro i Love you
Your content is confusing. we are using vulners on vulners