Use Nmap for Tactical Network Reconnaissance [Tutorial]

แชร์
ฝัง
  • เผยแพร่เมื่อ 27 ธ.ค. 2024

ความคิดเห็น • 258

  • @mattrisen6694
    @mattrisen6694 6 ปีที่แล้ว +29

    Instead of hitting up and home to add sudo to a command, you can run ‘sudo !!’ to run the last command with sudo. Just something that I found helpful. Love the videos, thank you for doing them and sharing the passion for our field.

    • @NullByteWHT
      @NullByteWHT  6 ปีที่แล้ว +6

      Thank you! And thanks for sharing that

    • @MegaStupidMonkeys
      @MegaStupidMonkeys 6 ปีที่แล้ว +2

      !! is really cool. You can even do something like echo "!!"

  • @herman3985
    @herman3985 6 ปีที่แล้ว +31

    Absolutely love this channel! I've learnt so much about hacking and Linux in general because of you Kody. Your tutorials helped making me comfortable enough with Linux to leave Windows permanently. Happy new year and all the best to all viewers and of course Null Byte themselves.

    • @NullByteWHT
      @NullByteWHT  6 ปีที่แล้ว +2

      Thank you so much! I really appreciate it

  • @Minejokey
    @Minejokey 6 ปีที่แล้ว +93

    Do you want to learn something new on TH-cam?
    just press the " i " button on your keyboard ^^
    also 0-9 are preset timestamps for every video on TH-cam

    • @DL_GLCH
      @DL_GLCH 5 ปีที่แล้ว +4

      I knew that...

    • @WraithLunati
      @WraithLunati 5 ปีที่แล้ว +1

      ? works too...

    • @sggmrr4824
      @sggmrr4824 4 ปีที่แล้ว +1

      thanks

    • @hyperdragon1013
      @hyperdragon1013 4 ปีที่แล้ว

      i knew that

    • @rossgladen
      @rossgladen 4 ปีที่แล้ว +1

      It says “I love you”

  • @seaner992
    @seaner992 6 ปีที่แล้ว +27

    -D just makes a lot more noise in the logs (2,472 lines vs 513) , and it still reveals your scan IP. Use -S followed by an IP. You might get a Nsock error, but it still works. It does not hide your IP during OS detection, but it does reduce the number of times it is logged vs -S. It does completely hide the IP on a normal scan. Also use '--spoof-mac' followed by a random MAC to hide your MAC. Use IP tables on another PC to view the noise.

  • @Jwojr
    @Jwojr 6 ปีที่แล้ว +5

    Can I just say thank you for your videos... the best way to learn pen testing skills on the internet. They very well put together and it’s also nice that you put out a written version!

    • @NullByteWHT
      @NullByteWHT  6 ปีที่แล้ว

      I'm glad other people find this stuff as interesting as I do!

  • @lowkey_out
    @lowkey_out 4 ปีที่แล้ว +2

    I don't really watch really long videos, But Kody's videos are very interesting and amazing, he share knowledge for free and explains everything in an spectacular way everyone understands. And I don't even know how 15 mins fly away. Good work brother.

  • @manvaldez_
    @manvaldez_ 5 ปีที่แล้ว

    Great video for begginers man nice job, i got one thing to add. If you don't specify the ports to scan nmap is going to scan the top 1000 common ports in a system and not "every possible port" 7:11. Thanks for sharing

  • @jugginator4390
    @jugginator4390 6 ปีที่แล้ว +7

    Great tutorial as always, but I noticed your censoring is off if you wanted to hide the mac address at around 8:30 , it moves with the scrolling -- just in case I wanted you to know :) happy new year!

  • @riseabove3082
    @riseabove3082 5 ปีที่แล้ว +5

    Great video with very clear examples and explanations. Thank you for sharing your knowledge. I've played with nmap and arp-scan but it is nice to see someone else put it into practice as well.

  • @deusvult4678
    @deusvult4678 6 ปีที่แล้ว +20

    Thank you and happy New Year. You are the only channel in which I activated the bell

    • @NullByteWHT
      @NullByteWHT  6 ปีที่แล้ว +2

      Thank you Ali! Happy new year

  • @sethadkins546
    @sethadkins546 5 ปีที่แล้ว +5

    8:29 Nice one Kody. (Pause and look closely under the censoring)

  • @b0bther4md0m
    @b0bther4md0m 6 ปีที่แล้ว +6

    I'm fairly new to all of this but iv been loving your tutorials

    • @NullByteWHT
      @NullByteWHT  6 ปีที่แล้ว +2

      Thank you for watching it!

  • @damienw4958
    @damienw4958 5 ปีที่แล้ว +11

    If you forget to run a command as root, simply type ‘sudo !!’ to run it again but as root !! means previous command

  • @seasonedtoker
    @seasonedtoker 4 ปีที่แล้ว +1

    @5:15 - no option will scan 1000 ports, -F option scans 100, but if you want to scan all 65535 ports, you should use '-p - ' option

    • @NullByteWHT
      @NullByteWHT  4 ปีที่แล้ว +1

      Thanks for the tip seasonedtoker!

  • @DavidJames0322
    @DavidJames0322 5 ปีที่แล้ว +1

    Try doing this with other IP addresses (research purposes only), "too many fingerprints match this host to give specific OS details". etc. etc. etc. Firewall blocks nmap scans, different methods as well are outdated. Also assuming that IP when conducting scans, allow them to receive that scans are being conducted to IP addresses which leads me to believe that those scans will notify IP and further investigation can be conducted on your own IP address. Any thoughts on this?

  • @lousingbamoirang7412
    @lousingbamoirang7412 6 ปีที่แล้ว +7

    I keep watching this channel.

    • @NullByteWHT
      @NullByteWHT  6 ปีที่แล้ว

      Thank you for watching it

  • @horseman684
    @horseman684 3 ปีที่แล้ว

    Thanks bro I have so much diy and have the basic grasp of nmap before this tute, its a soft listen on repetition for me, I mean I only felt smart after school, so im assuming that something sunk in when I was semi concious

  • @francescopresta9570
    @francescopresta9570 6 ปีที่แล้ว +3

    Great job Kody, happy new year from Italy

  • @JeffreyGroves
    @JeffreyGroves 6 ปีที่แล้ว +56

    The " | cat " on the command that you provided is extraneous. You should be able to remove that completely from the command to wind up with the following command line:
    sudo nmap -sS 192.168.0.0/24 | grep open >> results.txt
    Thanks for walking us through the use of nmap!
    Also, the two greater than signs ">>" means append to the file if it already exists; otherwise, create the file as new.

    • @brandondh
      @brandondh 6 ปีที่แล้ว +8

      Jeff Groves i was thinking the same thing. I just finished linux 1 and taking linux 2 in a couple of weeks. was kind of cool to see my mind remembering those commands and remembering that >> was append while > would overwrite the file each time. I also thought wait, why is he putting cat after the pipe, but syntax isnt always that important to remember since u figure it out as you go. he obviously has some pretty advanced skills and not everyone is an expert at everything. glad I wasnt the only one to catch that though. you must be a daily linux user or something. it gets pretty complicated so I hope linux 2 is easy for me... I aced linux 1 100 percent so lets see how I do with the security part which is linux 2. take it easy bro.

    • @NullByteWHT
      @NullByteWHT  6 ปีที่แล้ว +19

      Thank you so much for mentioning that! I'm still learning some of this myself, and teaching it helps me check myself against the community.

    • @NullByteWHT
      @NullByteWHT  6 ปีที่แล้ว +5

      Good luck!

    • @DDBAA24
      @DDBAA24 6 ปีที่แล้ว +2

      @@NullByteWHT Did you try to learn Linux before you jumped into Kali , or did you just start on Kali and learn to navigate the cli that way ? Personally I tried backtrack first and then soon realized that it wasn't the place to start. So I just grabbed a basic Debian based distro and learned everything I could about Linux. Then when I came back to what is now Kali and can actually understand the how , and the why. Learning the system in and out, then I jumped into networking & hardware, because if your going to understand vulnerabilities sometimes it goes all the way down to a hardware level not just software. For over a year I didn't even look at anything pentesting related. That said , doing it that way its so much easier to pick this stuff up, and I hate the term but I didn't want to be a script kiddie. I know this is getting long. After all is said and done, THEN you have to go back to Windows and learn CMD because how are you going to exploit a machine if you dont know how to control it ! What average Windows user even ever opens CMD its all graphical tools in windows. Its like alright I learned Linux to learn Kali to go back and learn the technical side of windows in order to manipulate it lol. Crazy cycle, but well worth the journey. Without a grasp on cli, networking, hardware, and multiple operating systems its impossible to use Kali to its potential if at all. No one should try and learn Linux on Kali it is not entry level friendly @ ALL. Am I making sense ? Now that I rambled I wanted to know how you decide on the topics for each video. Some of that is based on the Pi itself and its constraints, but not all videos are based on the Pi so I ask.

    • @DDBAA24
      @DDBAA24 6 ปีที่แล้ว

      How long have you been at this from a security based standpoint ?

  • @RNSounds7
    @RNSounds7 6 ปีที่แล้ว +1

    Hey bud! Amazing content, please continue to make more. Happy New Years!!!

  • @feiwhang
    @feiwhang 5 ปีที่แล้ว

    I have a question regarding macbook pro's touch bar. Does it work with kali on virtualbox? I'm in market for laptop to study pen testing. I can't choose between macbook pro or a thinkpad. Any advice? thanks

  • @CyberFreaked
    @CyberFreaked 6 ปีที่แล้ว +1

    Why do you blur your internal mac addresses? As far as I know it wouldn't be harmfull

  • @wakeupNeo_
    @wakeupNeo_ 3 ปีที่แล้ว

    this is the best Nmap video for beginners, thanks

  • @NM-hp2lc
    @NM-hp2lc 4 ปีที่แล้ว

    Nice GITS wallpaper. New subscriber here, loving your tutorials so far

  • @Parrotassassin15TechToker
    @Parrotassassin15TechToker 5 ปีที่แล้ว +4

    i reeeaally like ur videos, i've learned soo much from ur channel. me and my friend really want to be like you. you made me wanna go more into computer science. you made it soo much more fun than other channels thanks!!!!

    • @NullByteWHT
      @NullByteWHT  5 ปีที่แล้ว

      Thanks! That really sweet, means a lot to me. You'll do great in CS!

  • @vsanchez1295
    @vsanchez1295 3 ปีที่แล้ว

    Okay so I installed Linux in VMware, when I run ifconfig, it is different subnet than my actual router, so when I run nmap or arp scans it scans the virtual subnet instead of the LAN. Please help, I'm a total NEWB!

  • @SecTechie
    @SecTechie 5 หลายเดือนก่อน

    Love this channel. Keep up the good work. Great video. Thanks.

  • @marcusv.7565
    @marcusv.7565 2 ปีที่แล้ว

    hi, how about (socket: Operation not permitted) ? have any idea how fix this? i already did the ifconfig eth0 down in terminal emulator but its all clear and no errors but still (socket: Operation not permitted) again

  • @error346
    @error346 5 ปีที่แล้ว

    hy!! i have an isue writing a comand.. how to conduct a ACK scan with OS identification and scan fewer ports then normal? i tried nmap -sA -O -p 80,21,3306, but nope. can you help me?

  • @leonardofelippine9781
    @leonardofelippine9781 4 ปีที่แล้ว +1

    I had no idea that Sheldon Cooper was also a hacker...
    Jokes aside, great content. I am learning a lot. Thank you

  • @mohammadaminrajabi1828
    @mohammadaminrajabi1828 5 ปีที่แล้ว +1

    The video was really useful. I really thank you and I really wish you for more subscriptions. You can speak really great and I'm enthusiastic to see more videos.

    • @securitypoint8280
      @securitypoint8280 5 ปีที่แล้ว

      Check this sir for more details enumerations th-cam.com/video/1XAssdnTQSo/w-d-xo.html

  • @ahsan479
    @ahsan479 4 ปีที่แล้ว +1

    suppose I got a friend who is from another country, now I got his IP and I want to scan him through Nmap, but it says that the host is not active? why? can anybody help?

    • @NullByteWHT
      @NullByteWHT  4 ปีที่แล้ว +1

      You sure it's a static public IP? And maybe there no ports open/ their devices are off.

    • @dmetrebermuxchi2801
      @dmetrebermuxchi2801 4 ปีที่แล้ว

      Null Byte so if you get the static ip of a phone what are the many different things that you can do with this? Considering it’s not rooted or anything it’s a normal iphone, can it still be scanned and exploited? Or are static ips only for laptops? Also if you have the MAC address of a device be it phone or laptop what can you do with this aside from possibly kicking them off a network? It’s good to know so that one can protect oneself from the vulnerabilities that exist.

  • @sheerazali2395
    @sheerazali2395 6 ปีที่แล้ว +1

    Happy new year kody these videos are really nice we want more

    • @NullByteWHT
      @NullByteWHT  6 ปีที่แล้ว +1

      Thank you for watching them! I appreciate each and every one of these comments

    • @sheerazali2395
      @sheerazali2395 6 ปีที่แล้ว

      @@NullByteWHT you put a whole lot of work bro.we have to be there when a new video comes out

    • @sheerazali2395
      @sheerazali2395 6 ปีที่แล้ว

      @@NullByteWHT make few videos about buffer overflows and lfi rfi

    • @NullByteWHT
      @NullByteWHT  6 ปีที่แล้ว +1

      @@sheerazali2395 I really like the community! I'm getting a little bored of the format though, I want to start working on something new!

    • @sheerazali2395
      @sheerazali2395 6 ปีที่แล้ว

      @@NullByteWHT I'll love to be on any projects with you I am not new to cyber security but I am still learning I'll work for free

  • @D3rMesaa
    @D3rMesaa 5 ปีที่แล้ว +37

    Whoops MAC Adress at 13:20

    • @WraithLunati
      @WraithLunati 5 ปีที่แล้ว +3

      Ha! Didn't even read the comments till now, first thing I saw lol.

    • @coolcoyote1893
      @coolcoyote1893 4 ปีที่แล้ว +1

      There is also one at 8:29

    • @thedoomslayer6526
      @thedoomslayer6526 4 ปีที่แล้ว

      because it' very difficult to restart the VM and change it

    • @bitfragment
      @bitfragment 4 ปีที่แล้ว +2

      @@thedoomslayer6526 it was the MAC of the router

  • @iliaschannel3646
    @iliaschannel3646 3 ปีที่แล้ว

    hello how to perfom an anonymous scan ?? i heard about proxy chains and whonix , what is your suggestion

  • @alecolson3866
    @alecolson3866 5 ปีที่แล้ว +1

    If I type in ipcalc the terminal gives me the message that it is an invalid command.. do I need to have a separate program installed? What causes this?

    • @tribeofcam3762
      @tribeofcam3762 5 ปีที่แล้ว

      Same here why does this happen Kody help

  • @enriqueperez339
    @enriqueperez339 5 ปีที่แล้ว

    Are there any videos that go over all the different types of networks/ IP addresses like what’s en, en0, lo, Wlan0

  • @tyronehatter6813
    @tyronehatter6813 3 ปีที่แล้ว

    4:21 help im so confused how do i know which ip to copy

  • @isaacmihaeli3261
    @isaacmihaeli3261 2 ปีที่แล้ว

    This tutorial is easy to follow and understand. As of today 12/30/2022.

  • @rilian226
    @rilian226 4 ปีที่แล้ว

    >> means append to the end of the file...not overwrite. > will overwrite the contents of the file if it exists. You don't need to pipe through cat either... just >> to append and > to overwrite.
    If you want to see the results on screen _and_ log them in a text file pipe to the `tee` command: `nmap | grep | tee output.txt`
    backing up a bit...if you need to sudo your last command, do: `sudo !!` . Much faster than up arrow and going to start of line, etc.

  • @King66nb766
    @King66nb766 4 ปีที่แล้ว

    First of all i would like to thank you for great educational videos ⚘
    My question is do you have any idea how to get ms teams group member IP address and other informations ?

  • @awesomesauce804
    @awesomesauce804 3 ปีที่แล้ว

    whoa, ipcalc? you just changed my life.

  • @aritrakayal4280
    @aritrakayal4280 4 ปีที่แล้ว

    this video was really helpful .....but i have one question ..there are several videos over youtube showing different methods to stay annonymous while hacking , so while hacking over a network which is the best method to remain annonymous???..please do reply ...and lots of love from India

    • @NullByteWHT
      @NullByteWHT  4 ปีที่แล้ว

      Check out our guide on how to Fully Anonymize Kali with Tor, Whonix, and PIA VPN I think you'll find it helpful. null-byte.wonderhowto.com/how-to/fully-anonymize-kali-with-tor-whonix-pia-vpn-0180040/

  • @sanketneralkatte7651
    @sanketneralkatte7651 5 ปีที่แล้ว

    Sir i m a beginner nd i m passionate about hacking nd all.......so on which platform would u like to just me like kali linux , ubuntu nd etc

  • @droy333
    @droy333 5 ปีที่แล้ว

    On Windows? Advanced IP Scanner is handy. Sure it can't do everything nmap can do like specify ports etc but it will scan multiple subnets at once and give you any common services on hosts.

  • @combogfx228
    @combogfx228 5 ปีที่แล้ว +1

    I am running ubuntu on a windows machine and when I type "nmap -f" it tells me that fragscan needs root privileges, how do I grant root privileges

    • @khuramhussain7802
      @khuramhussain7802 4 ปีที่แล้ว

      Script kiddie

    • @johnnywalker3862
      @johnnywalker3862 4 ปีที่แล้ว

      How can you ask that? You are the definition of a script kiddie

  • @cyber_student
    @cyber_student 3 ปีที่แล้ว

    Man. You are such an inspiration dude. Thank you.

  • @totons9036
    @totons9036 5 ปีที่แล้ว

    By running ifconfig, it does not show local ip, but it shows static ip. How to see local ip?

  • @bileysikdar3389
    @bileysikdar3389 6 ปีที่แล้ว +2

    Hi Kody, Make a video on Possible firewall, ids evasion techniques.

  • @tensor-records
    @tensor-records 6 ปีที่แล้ว

    Link for your wallpaper pleeeaaasseee.

  • @paolomarcelogalvan1938
    @paolomarcelogalvan1938 3 ปีที่แล้ว

    What kind of linux os have supported nmap

  • @goofydadda
    @goofydadda 6 ปีที่แล้ว +2

    Hey, what’s the song at the start? It’s cool

  • @hondaromio
    @hondaromio 4 ปีที่แล้ว

    Kody, love that shirt, thanks for all you do!

  • @sarkybugger5009
    @sarkybugger5009 4 ปีที่แล้ว

    There's a GUI front-end available. Zenmap.

  • @HarryNikic
    @HarryNikic 5 ปีที่แล้ว

    when doing "sudo nmap -sS 192.169.**.* " i am getting this message " dnet: Failed to open device eth0" can anyone help, thanks

  • @carlosgandara5976
    @carlosgandara5976 5 ปีที่แล้ว

    What’s up dude. Check it out, I got a asus rt-ac66u router I need to get username and password but I cannot reset it. Which Linux should I use and what tool ?

  • @jamesk1242
    @jamesk1242 6 ปีที่แล้ว

    Love this channel, nice videos Kody!

  • @its336already6
    @its336already6 6 ปีที่แล้ว +2

    i was waiting for this video ty!!

    • @NullByteWHT
      @NullByteWHT  6 ปีที่แล้ว +2

      Your welcome, thanks for watching!

  • @friknoob9823
    @friknoob9823 4 ปีที่แล้ว

    what if your access is denied when you do arp-scan -l

  • @mr.nerd.study12345
    @mr.nerd.study12345 2 ปีที่แล้ว

    serious question: how do you _not_ blink?

  • @curtnorris4458
    @curtnorris4458 6 ปีที่แล้ว

    Nice MAC Address you have there at 8:29... The redacted text is visible when you scroll up.

  • @navinraj5697
    @navinraj5697 5 ปีที่แล้ว

    Good ...brother..your tutoriel is great ..but i am bigginer..so i have little confusion..your web tutoriel is also good..congradulation..jan video..just i have seen..ha..ha..super..please upload more..ethycal hacking knowledge...

  • @jonahhex1295
    @jonahhex1295 5 ปีที่แล้ว +1

    Thanks kody , great tutorial as always.

  • @dmetrebermuxchi2801
    @dmetrebermuxchi2801 4 ปีที่แล้ว

    Is it possible to change the MAC address of a Apple laptop? I know Apple restricts certain things. Perhaps running a python script that always modifies the MAC address of the Apple laptop to avoid getting tracked on a school campus? A simple example.

    • @NullByteWHT
      @NullByteWHT  4 ปีที่แล้ว

      Yeah check step 7 on this guide nulb.app/z49om

  • @cody9568
    @cody9568 4 ปีที่แล้ว

    The command ipcalc didn't work for me?

  • @hellopropop
    @hellopropop 4 ปีที่แล้ว

    please reply why cant we use arp -a

  • @Canadian789119
    @Canadian789119 5 ปีที่แล้ว

    Good for pen testing, to close vulnerabilities of course.

  • @omarbayli
    @omarbayli 4 ปีที่แล้ว

    Instead of piping grep open, you can use --open option.

  • @cocokash
    @cocokash 2 ปีที่แล้ว

    Thanks for sharing, really appreciate it!, more content please....

  • @jaythedrifter
    @jaythedrifter 2 ปีที่แล้ว

    Couldn’t get a the command ipcalc to run

  • @RAGHAVENDRASINGH17
    @RAGHAVENDRASINGH17 5 ปีที่แล้ว

    At 16.20 i got jump scare 😂 nice video , you have many awesome contents on this channel

  • @5wholepizzas284
    @5wholepizzas284 2 ปีที่แล้ว

    how is it that in my phone and in every phone it has literally 0 ports open

  • @matthewheelie4432
    @matthewheelie4432 5 ปีที่แล้ว

    is this better than Fing?

  • @michaelselui6998
    @michaelselui6998 6 ปีที่แล้ว +2

    Please add English subtitles, happy new year

  • @exittierone
    @exittierone 4 ปีที่แล้ว

    Whenever I try the "ipcalc" command, it says command not found

    • @exittierone
      @exittierone 4 ปีที่แล้ว

      @Da Boss Yes, Kali Linux with Gnome

    • @kiwinesss
      @kiwinesss 4 ปีที่แล้ว

      @Da Boss it doesn't work with sudo either, I get: sudo: ipcalc: command not found

    • @kiwinesss
      @kiwinesss 4 ปีที่แล้ว

      @Da Boss Thank you DaBoss, that worked :)

  • @Sleazyuwu
    @Sleazyuwu 5 ปีที่แล้ว

    bash: ipcalc: command not found im facing this error what can i do?

    • @NullByteWHT
      @NullByteWHT  5 ปีที่แล้ว

      Use this website jodies.de/ipcalc or install ipcalc

  • @blahblahblah3819
    @blahblahblah3819 4 ปีที่แล้ว

    Is this a UAV?

  • @djjcbs8989
    @djjcbs8989 6 ปีที่แล้ว +1

    Like your videos. Easy to learn from.

    • @NullByteWHT
      @NullByteWHT  6 ปีที่แล้ว

      Thanks for watching them!

  • @house105a
    @house105a 2 ปีที่แล้ว

    You are awesome Kody

  • @mervynally459
    @mervynally459 5 ปีที่แล้ว +1

    Thank you congratulations happy new year

  • @vibe6566
    @vibe6566 5 ปีที่แล้ว

    Why using sudo code?pls tell me

  • @thomaswahahauw560
    @thomaswahahauw560 6 ปีที่แล้ว

    Yo #nullbyte pleas can you help me.
    So im new to etnical hacking i just installed kali linux on a old laptop but i dont know where to begin can you put me into the right direction to start and tell me where i need to begin. I m studing to be a programmer, so i think thats a good think to start right?
    Sorry for my bad grammer
    #happyNewYear

    • @NullByteWHT
      @NullByteWHT  6 ปีที่แล้ว

      Try out Wi-Fi hacking, see if your laptop card can be put into monitor mode

    • @thomaswahahauw560
      @thomaswahahauw560 6 ปีที่แล้ว

      So i have another problem with the firefox browser. So when i start the browser and i want to search a website it’s continually loading, but when i input a command in terminal such as ‘firefox www.google.com’ it goes right to google.com but when i start the application it doesn’t work properly
      Ps: i have searched the whole internet, no results
      #BestLearningChannel

  • @x.a.k.i5858
    @x.a.k.i5858 6 ปีที่แล้ว +2

    Thank you the video was quite informative

  • @arminharper510
    @arminharper510 5 ปีที่แล้ว

    every time i use nmap in my kali virtual machine, it only shows me the local host and the default gateway ip is the same no matter which wifi i connect to, the mac address of the gateway however is correct in iwconfig and i have internet access somehow but nmap works with ip and doesen't accept mac address xD xD

    • @arminharper510
      @arminharper510 5 ปีที่แล้ว

      @TheRageMaker
      Well then how can i use nmap? Even on my windows when i use nmap i get the same problem

    • @dmetrebermuxchi2801
      @dmetrebermuxchi2801 4 ปีที่แล้ว

      What are your settings for internet connection on virtualbox for your Linux distro? If it’s on Nat network perhaps that might be the issue even if your successful connecting to WiFi? Just a thought.

  • @thehound3961
    @thehound3961 6 ปีที่แล้ว +12

    Kody, happy new year....
    we would like to see more videos about hacking Android .......not a lot of PC's around here..

    • @DDBAA24
      @DDBAA24 6 ปีที่แล้ว

      @I dont know anymore Yeah that would be for hacking with your Android, I believe he means actually hacking Android phones, its un clear but.... Which without user interaction or physical access can prove to be a pretty daunting task. Which entails the ring buffer in the kernel, compromising the WiFi stack, using aireplay-ng to collect frames and then spoofing a network that the phone is calling out to that it has securely connected to previously. Then once its on your fake network that has the phone thinking its home its business as usual from there you still have to gain access to the device some way. and you can use Termux without root , the best route is the kali nethunter rom or pwnie express phone. I say that because a lot of scripts do not work properly because they were meant to be ran on a cell phone. All though I saw a pretty cool video of someone installing ubuntu from git in termux, I guess if you did that and then installed kali tools you might be able to use thing to their full potential.

    • @PScraftGaming
      @PScraftGaming 6 ปีที่แล้ว

      Mostly everyone has a PC.. Even use a family computer if you have to.

    • @lucasthompson1650
      @lucasthompson1650 5 ปีที่แล้ว

      @username yup!

  • @lalbudha3025
    @lalbudha3025 5 ปีที่แล้ว

    Could you please make a video on Metasploitable 3 ?

    • @NullByteWHT
      @NullByteWHT  5 ปีที่แล้ว +1

      Good idea Lal Budha, I've added it to the list of video ideas.

  • @alexandresantosal
    @alexandresantosal 9 หลายเดือนก่อน

    Parabéns pelo excelente conteúdo...

  • @MattTheCuber1
    @MattTheCuber1 ปีที่แล้ว

    MAC Address leak: 13:22 (if you pause at the right second)

  • @igot17hoursbaby20
    @igot17hoursbaby20 4 ปีที่แล้ว

    Hell yes!! This is fun! Thank you!

  • @jonahhex1295
    @jonahhex1295 4 ปีที่แล้ว

    Awesome , great video, thanks!!

  • @devanshujatav3113
    @devanshujatav3113 6 ปีที่แล้ว

    Which os it is

  • @xyzl4176
    @xyzl4176 6 ปีที่แล้ว

    the computer model is ?

  • @NotSoCrazyNinja
    @NotSoCrazyNinja 4 ปีที่แล้ว +1

    13:21 you dun goofed

  • @TaylorSwifty69
    @TaylorSwifty69 4 ปีที่แล้ว

    This was great! Thank you.

    • @NullByteWHT
      @NullByteWHT  4 ปีที่แล้ว

      Christopher thanks for watching! Tell all of your friends about us! 😃

  • @aanchaldeep1699
    @aanchaldeep1699 4 ปีที่แล้ว

    Very informative ....👍

  • @zeroblue5599
    @zeroblue5599 6 ปีที่แล้ว +7

    Im userland user love this tactical nmap

  • @thehound3961
    @thehound3961 6 ปีที่แล้ว +1

    great video btw.....as always..

  • @vivekmehta2239
    @vivekmehta2239 5 ปีที่แล้ว

    I want to know the password you entered in terminal while using NMAP that is your Kali login password right.

  • @mayhem1994
    @mayhem1994 5 ปีที่แล้ว

    failed to resolve grep

  • @HK-sw3vi
    @HK-sw3vi 5 ปีที่แล้ว +1

    hey man, keep this shit up... it really helped!!