Mrs Richards: "I paid for a room with a view !" Basil: (pointing to the lovely view) "That is Torquay, Madam." Mrs Richards: "It's not good enough!" Basil: "May I ask what you were expecting to see out of a Torquay hotel bedroom window? Sydney Opera House, perhaps? the Hanging Gardens of Babylon? Herds of wildebeest sweeping majestically past?..." Mrs Richards: "Don't be silly! I expect to be able to see the sea!" Basil: "You can see the sea, it's over there between the land and the sky." Mrs Richards: "I'm not satisfied. But I shall stay. But I expect a reduction." Basil: "Why?! Because Krakatoa's not erupting at the moment?"
I think it’s interesting how nicotinic acetylcholine receptors are important to our muscle control but aren’t in our central nervous systems, only in the peripheral nervous system, and how insects have these receptors only in their central nervous systems. It’s also interesting that hallucinations commonly experienced from anticholinergic drugs (which deactivate acetylcholine receptors) include smoking cigarettes that aren’t real, and insects all over everything, sometimes covering one’s entire view. Thankfully, perhaps, these experiences often seem accompanied by a strong sense that there’s nothing strange or disturbing about them.
Heads up guys this isnt only used for firewall evasion it can also be used if you have a botnet to attack on an open port of an NFO Server or an OVH Server
Please make a video on the packet level analysis (wireshark) of the nmap scans so that even if the output looks similar, the difference can be understood....!
Hi 1. How to show/prove that those port scanning techniques bypassing firewalls? Block ICMP/pings? Thinking compared to for example a normal scan with -sT option, which do not have firewall evasion. 2. How to know for example that they are efficient and effective?
The stuff shown here is more on decreasing the byte size of packets sent and randomizing the sources of the packets sent. This helps in IDS evasion especially the smaller packet size. Firewall bypass, not so much. On dealing with Machines look for their Web App interfaces and try finding SSRF's to connect to internal hosts.
Yeah i also agree that „Firewall Bypassing“ was the wrong used term there to give the n00bs a good feeling. Cause let‘s be honest: There are Man-Pages where you can read that same information from, okay not a beautiful Lady explains you the things but the Information is there.
!!...you shot me down.... !! I hit the ground... !! that awful sound.... !! ....... expand the previously executed command (Bashy Sinatra) (damn, I love !!. Just discovered it two weeks ago. Sweet.)
I am in a little of a problem here and need your advise, please. I have forgotten or lost the User and Password of a SonicWall for one of my Clients and was wondering if you can direct me in the right direction? Hak5 you Rock!!!!!!!
I have a question?! I came across CVE when trying to hacking a website using Nmap (I'm a beginner).... I've watched a lot of videos on what CVE'S are... But there's nothing on how to use it to gain access to the website (hacking it)... Or is the approach wrong? What can I do?
How to divert attacks on the network - place Shannon at the gateway - those eyes! I apologise, I don't mean to demean or detract from your skills, or come across as sexist, but I have to look at your neck when I watch these vids or I on't take anything on board. If it helps, great channel. Subscribed
If you hate forgetting to prefix 'sudo' every time, you could do what I do if I'm going to su the crap out of a shell and use "sudo bash" then root at will!
sudo -i works too...or the almighty sudo !!, to expand the previously executed command with "sudo" prepended. FUn fact: in Italy "sudo" means "I'm sweating"....yep.
So I was using nmap against my internet router and Everytime I ran it I would get "All 1000 scanned ports on ***.***.**.* Are in ignored states. Not shown: 1000 filtered tcp ports (no response).
You just run it in your normal Terminal and yes it linux. You can run the nmap command without going into a nmap folder location if that is what you're asking
just a really noobie question but how do you figure out your targets ip ? and what is you target ? the "Computer" or the network ? kinda confused thanks
Either one can be your target. I found out what my targets are by nmaping 10.73.31.0/24 which would be my whole network and just looking for an interesting target to use for my examples.
find what you default gateway is of the network. Once you find that out, finding other IP's are a breeze. Always try nmap -Pn "ip" if you having trouble
"The show for hackers, gurus and IT ninjas." If your viewers were any of those things, would they really be watching these basic tips? :P Not hating on the show, I'm just sayin'..
are most of the stuff you teach us actually legal? just wondering. No matter what the answer to this question might be, thank you for teaching us all those fun stuff.
Hi could you help me to find my exter routers IP address? Because the man who changes my IP address he didn't give me that now I have trouble with changing password. Please help to find address.
The answer is yes."Nmap was originally a Linux-only utility,[3] but it was ported to Microsoft Windows, Solaris, HP-UX, BSD variants (including Mac OS X), AmigaOS, and SGI IRIX.[4] Linux is the most popular platform, followed closely by Windows" -Wikipedia Here if you wanna download nmap.org/download.html
Very informative! That's why I love watching Hak5! You and Darren are the awesome!
Mrs Richards: "I paid for a room with a view !"
Basil: (pointing to the lovely view) "That is Torquay, Madam."
Mrs Richards: "It's not good enough!"
Basil: "May I ask what you were expecting to see out of a Torquay hotel bedroom window? Sydney Opera House, perhaps? the Hanging Gardens of Babylon? Herds of wildebeest sweeping majestically past?..."
Mrs Richards: "Don't be silly! I expect to be able to see the sea!"
Basil: "You can see the sea, it's over there between the land and the sky."
Mrs Richards: "I'm not satisfied. But I shall stay. But I expect a reduction."
Basil: "Why?! Because Krakatoa's not erupting at the moment?"
Thought i would learn nothing, but instead i learnt a lot of things!! TY Hak5
lol.... learnt
I think that is the greatest t-shirt I've ever seen in my entire life
I think it’s interesting how nicotinic acetylcholine receptors are important to our muscle control but aren’t in our central nervous systems, only in the peripheral nervous system, and how insects have these receptors only in their central nervous systems. It’s also interesting that hallucinations commonly experienced from anticholinergic drugs (which deactivate acetylcholine receptors) include smoking cigarettes that aren’t real, and insects all over everything, sometimes covering one’s entire view. Thankfully, perhaps, these experiences often seem accompanied by a strong sense that there’s nothing strange or disturbing about them.
@@nightshadegatito Quite interesting, I didn't know that.
Use sudo !! to run the previous command as root!!!Good video.
Gaveen Prabhasara .
Where did you get that tee?
Yeah I want one!
David Biglin Jesse Esquibel I got it from a Yahoo! hackathon that I performed at.
Shannon Morse I was about,to,ask,were u got the shirt , thankfully I,looked,at the comments.
Heads up guys this isnt only used for firewall evasion it can also be used if you have a botnet to attack on an open port of an NFO Server or an OVH Server
great walls of fire!
Please make a video on the packet level analysis (wireshark) of the nmap scans so that even if the output looks similar, the difference can be understood....!
Could you please make a playlist for tutorials to learn Nmap !
Any help is much appreciated !
A t-shirt that is very well filled..
Shannon Morse = Geek Love :) Great shows!
“sudo !!” Will run the last command as sudo
Yes
Love you my friend always good content and nice shirt
Is your shirt from hak5?
I Love her Hacker T-Shirt
Hi
1. How to show/prove that those port scanning techniques bypassing firewalls? Block ICMP/pings? Thinking compared to for example a normal scan with -sT option, which do not have firewall evasion.
2. How to know for example that they are efficient and effective?
The stuff shown here is more on decreasing the byte size of packets sent and randomizing the sources of the packets sent. This helps in IDS evasion especially the smaller packet size. Firewall bypass, not so much. On dealing with Machines look for their Web App interfaces and try finding SSRF's to connect to internal hosts.
Yeah i also agree that „Firewall Bypassing“ was the wrong used term there to give the n00bs a good feeling. Cause let‘s be honest: There are Man-Pages where you can read that same information from, okay not a beautiful Lady explains you the things but the Information is there.
quite useful, thanks shannon...
Great video
I like this tutorial, amazing as usually.. keep the great job up !!
Can u please make a video on how we can bypass firewall in windows for port scanning using nmap
Relllyyy good chennel & good contacts well job😌
Thank for the upload!
forget to type "sudo" alot of times, she must be ussually running as root user instead or guest user.. :D
+Anthox Lind el Or neither, and just doesn't need to run sudo a lot. - Shannon
+Hak5 ouch
!!...you shot me down.... !! I hit the ground... !! that awful sound.... !! ....... expand the previously executed command (Bashy Sinatra) (damn, I love !!. Just discovered it two weeks ago. Sweet.)
I # out of habit now, saves time
Thankyou for useful information
Great video!!!
So quite and smart
Cool vid! cheers
Heyy can we get evading firewall with Nmap , updated version or a session on ,The story of Michael and Demetris evading a firewall with Nmap scan.
I am in a little of a problem here and need your advise, please. I have forgotten or lost the User and Password of a SonicWall for one of my Clients and was wondering if you can direct me in the right direction? Hak5 you Rock!!!!!!!
This was a great video :D
Hey Shannon, are you no longer doing the HackTip episodes???
i love this channel
thanks snubs
Thanks dear
I have a question?!
I came across CVE when trying to hacking a website using Nmap (I'm a beginner).... I've watched a lot of videos on what CVE'S are... But there's nothing on how to use it to gain access to the website (hacking it)... Or is the approach wrong? What can I do?
Nice
For making your own hacking software would a, function prop routine/co work as a prop base for commands?
Hi, what is the best hardware firewall for home and small business??
Thank you
Does the firewall evasion trick works for android mobile too? please let me know, Thanks
Dont worry i watched this for educational purposes.
Host based firewall
Any idea if echo can be turned off in CryptCat? Would be cool if the senders text only showed to the receiver. Kinda like encrypted cisco pw's.
yeah ok, but any tips on how to find zombies? and would be interesting to see what happens on firewall log of the victim machine while you re scanning
How did u make this video? The screen and people together.
its great thank you
i love her to much
Shannon is hella bae!!...
Hacked this video! :D shot a load while watching it.
what is best firewall software for pc ?
What you call hyphen, Tack Tack?? Sounds cool though.
How to divert attacks on the network - place Shannon at the gateway - those eyes! I apologise, I don't mean to demean or detract from your skills, or come across as sexist, but I have to look at your neck when I watch these vids or I on't take anything on board. If it helps, great channel. Subscribed
Shannon do you know about termux
If you hate forgetting to prefix 'sudo' every time, you could do what I do if I'm going to su the crap out of a shell and use "sudo bash" then root at will!
(Or just "su" [enter], obv.)
sudo -i works too...or the almighty sudo !!, to expand the previously executed command with "sudo" prepended. FUn fact: in Italy "sudo" means "I'm sweating"....yep.
sudo -s
thanks
Your tutorial is remarkable really i haave learned!!! and im really thankful to you . But i have some questions can you help me????? please tell me
Im the boss here 😎
How to stop tracking cookies? Shannon,please?
what did she call this - character? tech? 0:58
I just call it hyphen...
its just a linux user thing
does anytone now any attacts
So I was using nmap against my internet router and Everytime I ran it I would get "All 1000 scanned ports on ***.***.**.* Are in ignored states. Not shown: 1000 filtered tcp ports (no response).
You´re target have to be in the same network or?
you make the fire wall really hot
Hak5 hey I am a noob so can u plz tell me about this packets that u were sending the target what do they contains
"Different version of Linux" - What distro are you running?
Mint
This vid is great, but the spiel at the start is a little bit daft. Love you, Shannon, but I don't want to call myself a ninja.
what r u using ? linux ?
Fleeeeex....time to have haaaaacks
How to find target machine
do you guys have hacker course for beginners
Are u running this commands on nmap in linux or etc..where exactly
You just run it in your normal Terminal and yes it linux. You can run the nmap command without going into a nmap folder location if that is what you're asking
I like playing with fireballs
cntrl + a > left arrow ;) @ 2:43
What OS is this based on? I use nmap on windows would this work on that platform?
Simsy learn Linux. 99% of the tools are on Linux.
sudo !!
How can one be so perfect
simppp
@@bingovalue simp will win
Yusuf Saka lmao
just a really noobie question but how do you figure out your targets ip ? and what is you target ? the "Computer" or the network ? kinda confused
thanks
Either one can be your target. I found out what my targets are by nmaping 10.73.31.0/24 which would be my whole network and just looking for an interesting target to use for my examples.
find what you default gateway is of the network. Once you find that out, finding other IP's are a breeze. Always try nmap -Pn "ip" if you having trouble
My problem is how ARE WE SUPPOSED TO KNOW THE TARGETS IP ADDRESSES?
Use a tool like airmon and set the adp. To monitor mode and see what is near you
"The show for hackers, gurus and IT ninjas."
If your viewers were any of those things, would they really be watching these basic tips? :P
Not hating on the show, I'm just sayin'..
Nice opzz. 😁🤣🤣
are most of the stuff you teach us actually legal? just wondering. No matter what the answer to this question might be, thank you for teaching us all those fun stuff.
everything is legal when done on your own network or one that you have been given permission to test.
Christopher Marx some ISP dont like DOSing or nmap. not many, but some
Can i hack devices with nmap too?
love u
What type os os is she using? Is it linux?
Mint Linux
Hi could you help me to find my exter routers IP address? Because the man who changes my IP address he didn't give me that now I have trouble with changing password. Please help to find address.
Jumbo yum-yums
❤
dam... of course you are married... pass along the Bravo Bravissimo to your hubby for me plz :]
Mam you very cute I really like you and your knowledge mind blowing
yeah lets put hack stickers on youre laptop so everyone knows what your doing in starbucks
It would have been allot easier to just type su rather than doing sudo for each command, such a pain in the ass to keep typing it
I wonder: How many watching this an know already anything about nmap 😅
Nmap -hcH two jugs.
this is my dream girl...
nice bbs
Does this work on windows I'm a noob
Try Zenmap
The answer is yes."Nmap was originally a Linux-only utility,[3] but it was ported to Microsoft Windows, Solaris, HP-UX, BSD variants (including Mac OS X), AmigaOS, and SGI IRIX.[4] Linux is the most popular platform, followed closely by Windows" -Wikipedia Here if you wanna download nmap.org/download.html
Why difficult to focus on lesson..? Wkwkwkwk
Oh god
I'd seed it
very intelegent women resprect dshout
NPC #11919 You must be intolerant.
How are
Why don't you shou us how data or net traffic looklike on a firewall or other target when you attacking it?
apt-get uplove youu success attack my heart wow kkkkk kiss for you## web star