Vulnerability Scanning With Nmap

แชร์
ฝัง
  • เผยแพร่เมื่อ 16 พ.ย. 2024

ความคิดเห็น • 69

  • @gvrkrishna4857
    @gvrkrishna4857 4 ปีที่แล้ว +25

    I never thought nmap is this much powerful...I have been watching all the videos in the enumeration series and man I have to say "great content"

    • @djebabliazakaria4593
      @djebabliazakaria4593 3 ปีที่แล้ว

      How People Get Infected With Malicious Word Document[]:
      th-cam.com/video/E-Xc_bQyG2c/w-d-xo.html

  • @Djappa
    @Djappa 4 ปีที่แล้ว +13

    im in my first steps and i feel i learn a lot from this man. i really appreciate what you are giving to the community, keep up sir

  • @Vyper443
    @Vyper443 ปีที่แล้ว +1

    The accent went from british english to indian english. Good tutorial bro thanks

  • @kabandajamir9844
    @kabandajamir9844 3 ปีที่แล้ว +2

    The world's best teacher

  • @mantisBrandon
    @mantisBrandon ปีที่แล้ว

    ❤much love for this Kenyan hacker
    duuuude this is great

  • @asiffaizal6158
    @asiffaizal6158 4 ปีที่แล้ว +5

    Keep uploading Sir

  • @praveenbhogade
    @praveenbhogade 4 ปีที่แล้ว +1

    @Hackersploit is on fire 🔥you are good bro....

  • @kedarpawar8786
    @kedarpawar8786 4 ปีที่แล้ว +1

    Looking for this for soo long, thankyou soo much!!

    • @xynthewarrior
      @xynthewarrior 3 ปีที่แล้ว

      @Billy Kazantzis You are so much jealous of this guy, get the fuck off.

  • @romagranito
    @romagranito 3 ปีที่แล้ว +1

    Thanks a lot sir. This is an amazing series of video tutorials. This helps me a lot.👍👍😘

  • @hewfrebie2597
    @hewfrebie2597 4 ปีที่แล้ว

    1:26 incase anyone is wondering. KISS is an acronym for Keep It Simple Stupid. I learned that when I was learning through my Software Engineering courses (currently I am studying right now)

  • @ManSplained22
    @ManSplained22 4 ปีที่แล้ว +1

    New into is DAMNNNN awesome love it!!

  • @SENAYTUB
    @SENAYTUB 7 หลายเดือนก่อน

    Thanks a lot sir. This is an amazing series of video tutorials. This helps me a lot.👍👍😘
    1
    Reply

  • @ThriveTalesTV
    @ThriveTalesTV 4 ปีที่แล้ว +1

    Nice one .More Nmap tricks please

  • @fordakacar
    @fordakacar 3 ปีที่แล้ว +1

    Excellent video thank you

  • @ajaykumark107
    @ajaykumark107 4 ปีที่แล้ว

    On a roll hackersploit...

  • @abodawead9039
    @abodawead9039 2 ปีที่แล้ว

    thank you very much , great job in this series it is very useful .
    keep going .

  • @eyeinthesky1050
    @eyeinthesky1050 3 ปีที่แล้ว

    You are amazing man, i am a big fan!

  • @lightflix
    @lightflix 4 ปีที่แล้ว +1

    Nice videos

  • @maxjak5105
    @maxjak5105 4 ปีที่แล้ว

    nice , u r using BRAVE browser

  • @dm947
    @dm947 4 ปีที่แล้ว

    Great informative video

  • @akhilpratapsingh8185
    @akhilpratapsingh8185 4 ปีที่แล้ว +1

    I'm a big zero in this, I don't know in how many years I will learn it. I can't afford to buy any particular course. But I really want to learn it all.

  • @alexvandermeer1380
    @alexvandermeer1380 4 ปีที่แล้ว +1

    PLEASE response 🤔🤔😲😲
    so what can you actually hack with nmap just a network or also computer/phones
    do i need to have a special network adapter or just the nmap software?

  • @abhisheksingh-qi4ck
    @abhisheksingh-qi4ck 4 ปีที่แล้ว

    The amazing video

  • @sundayawo8767
    @sundayawo8767 ปีที่แล้ว

    hey i was trying to perform this but did not get it.pls can you help me out

  • @isharto237
    @isharto237 4 ปีที่แล้ว

    Why are you still using metasploitable 2?

  • @dhandewalebhaiya
    @dhandewalebhaiya 4 ปีที่แล้ว +1

    U are really great may allah bless you ...keep it up👍

  • @BlokeBritish
    @BlokeBritish 3 ปีที่แล้ว

    ive just started into this and looking to get a web vulnerability scanner tool now.
    any download links please ?

  • @sovereignboss1841
    @sovereignboss1841 3 ปีที่แล้ว

    So what do we do with those cve? I dont get it.

  • @airbusontop73
    @airbusontop73 ปีที่แล้ว

    I don't get what you do once you have the vulnnerabillitys

  • @techfactskannada492
    @techfactskannada492 2 ปีที่แล้ว

    Can i use this as an alternative for nesses?

  • @anilshankarmystaryscience4121
    @anilshankarmystaryscience4121 4 ปีที่แล้ว +1

    Why you cant make it in Android Termux no root sir. Please make also these things in Android.

  • @fishinthesee3420
    @fishinthesee3420 3 ปีที่แล้ว

    why the "hack" kali clears tmp file.. it took 4hours to figure it out.. you should spoke about? anyway I need more and more of you? what you think.. it isn't my 1st.. be happy

  • @alexvandermeer1380
    @alexvandermeer1380 4 ปีที่แล้ว +1

    can you make a video about Metasploit
    becouse if i open metasploit i don,t know what to enter to create a payload
    or is there a website where i can copy the script to create a payload
    and what is the difference between a payload and a virus

    • @sovereignboss1841
      @sovereignboss1841 3 ปีที่แล้ว

      I think virus is to destroy the system and payload is like um maybe you the gun you steal with lol, idk i just started learning ethical hacking yesterday

  • @robertros5858
    @robertros5858 2 ปีที่แล้ว +1

    first of all I want to congratulate you for your excellent video about nmap scripts. I want to ask if a port is vulnerable, can I use it to have free internet through a vpn tunnel? like http injector. and I don't know how to set up for example the http injector .your advice will be valuable to me.

  • @lucatrabalza2138
    @lucatrabalza2138 3 ปีที่แล้ว

    good!

  • @seandoyle6697
    @seandoyle6697 4 ปีที่แล้ว +1

    When It took 2 hours to scan and showed the result of a regular port scan instead of a vulnerability one

    • @fredtheilig9636
      @fredtheilig9636 4 ปีที่แล้ว

      I had nmap 7.60 installed and had to manually download and install 7.70 for the script to work. I'm on Ubuntu.

  • @juvy256
    @juvy256 4 ปีที่แล้ว

    Is it possible for you to do a video on how to get free internet using bug hosts n how to configure using any tunnels app

  • @RohinishkSingh
    @RohinishkSingh 4 ปีที่แล้ว

    Hlo,
    I would like to ask that i am new to this so from where should i start??? I am a little confused..

    • @HackerSploit
      @HackerSploit  4 ปีที่แล้ว +1

      Check out the penetration testing boot camp playlist under the playlist tab.

    • @RohinishkSingh
      @RohinishkSingh 4 ปีที่แล้ว

      I have no knowledge of ethical hacking so can i start from penetration testing bootcamp???

    • @sovereignboss1841
      @sovereignboss1841 3 ปีที่แล้ว +1

      @@RohinishkSingh yep

  • @sivasiva-sh6hl
    @sivasiva-sh6hl 4 ปีที่แล้ว

    give link to your udemy course

  • @iliaschannel3646
    @iliaschannel3646 3 ปีที่แล้ว

    can we use stealth scan and decoy scan ?

  • @josephcabayacruz9249
    @josephcabayacruz9249 ปีที่แล้ว

    the vulners script didnt work.

  • @alkalinedivide
    @alkalinedivide 4 ปีที่แล้ว +2

    I feel so stupid for asking...
    But could someone please break this down "Barney Style" or link to something that may help...
    what is "Local vs Foreign Address"?
    I know there's alot of references... but gosh dangit my brain cant wrap around it when reading about it.
    I know even wikipedia has a page, and there's alot of things saying "here you'll see the Local or Foreign Address"
    I believe I understand:
    Proto: UDP/TCP
    State: LISTENING/ESTABLISHED/TIME_WAIT
    But for some reason the concept of
    Local Address: 0.0.0.0:445
    Foreign Address:0.0.0.0:0
    Is like trying to tell me the that watermelon is a berry or that Pluto isn't a planet...
    If there's any simple way to understand better, or a nice illustration/video I'd greatly appreciate it.
    I'm sorry, I feel so stupid but its always been explained to me as
    "it just is"
    *Edit*
    Oops I meant to link this as and example.
    www.howtogeek.com/howto/28609/how-can-i-tell-what-is-listening-on-a-tcpip-port-in-windows/

  • @Liryn
    @Liryn 4 ปีที่แล้ว

    Alexis I need to ask you something T.T.

  • @thatniqqakevin644
    @thatniqqakevin644 3 หลายเดือนก่อน

    hey can you help me out pleaaaseeeee

  • @ca7986
    @ca7986 4 ปีที่แล้ว

    ❤️

  • @tech-learner4555
    @tech-learner4555 2 ปีที่แล้ว

    3:10 how to get that ip address 🙏🏻

    • @WokeX111
      @WokeX111 2 ปีที่แล้ว +1

      ifconfig on cmd

  • @frankyhonnolus5528
    @frankyhonnolus5528 2 ปีที่แล้ว

    So how come it doesn’t detect any vulnerability on port 21? It’s already well known that it has backdoor vulnerability. This script seems useless.

  • @anuradhalakruwan1918
    @anuradhalakruwan1918 4 ปีที่แล้ว +1

    Windows 10 OS use ethical hac*king course.

  • @withneelshukla
    @withneelshukla 4 ปีที่แล้ว

    ✌️

  • @hudsonmubiru
    @hudsonmubiru 4 ปีที่แล้ว

    Second

  • @TheOCTOPIED
    @TheOCTOPIED 4 ปีที่แล้ว

    First

  • @cd78
    @cd78 3 ปีที่แล้ว

    Your content is confusing. we are using vulners on vulners