ขนาดวิดีโอ: 1280 X 720853 X 480640 X 360
แสดงแผงควบคุมโปรแกรมเล่น
เล่นอัตโนมัติ
เล่นใหม่
I appreciate your efforts. I will highly recommend your channel to people who are willing to learn Cyber security.
Thank you. I was struggling with the exploiting telnet. I just subscribed to your channel.
Bro loving the channel man!
i don't know why but finger prints and theis message of backdoor dosn't show in my nmap scaning
hi nice video as always. Could you please explain why you used port 4544 instead of 4444 which was told to us to use? thanks :D
Its just my preferred port :)
@@MotasemHamdan ahh ok thanks 😊
I tried telnet ip and port when exploiting telnet connection refused idk what I’m doing wrong
how long does the nmap scan for task 6 usually take?
took me 1h45....
@Josh ...takes a while
It depends on your network speed too
@@vitora.7895 scan -p1-10000 it takes 1 minute ;)
May I ask how did you know that you can connect to it with telnet? For me, I would have tried netcat instead of telnet
Its according to the room description
@@MotasemHamdan ohhh yeah yeah yeah, since the room was about telnet then that port must’ve been a telnet port. Makes sense, thank you
That nmap -p- it takes like 2 hours. IS THAT NORMAL?
I think it's an issue with tryhackme I was having those types of issues too. Instead of scanning -p- i just narrowed down my scans until i found an open port. I would go 1k at a time so i'd scan -p 1-1000 and so on.
😊👍
My nmap scan took about two hours and now is stuck at 99.99%
you can use the -T options to speed up your scan. -T0 slowest and -T5 fastest.see morenmap.org/book/performance-timing-templates.html
@@MotasemHamdan Thanks mate
I appreciate your efforts. I will highly recommend your channel to people who are willing to learn Cyber security.
Thank you. I was struggling with the exploiting telnet. I just subscribed to your channel.
Bro loving the channel man!
i don't know why but finger prints and theis message of backdoor dosn't show in my nmap scaning
hi nice video as always. Could you please explain why you used port 4544 instead of 4444 which was told to us to use? thanks :D
Its just my preferred port :)
@@MotasemHamdan ahh ok thanks 😊
I tried telnet ip and port when exploiting telnet connection refused idk what I’m doing wrong
how long does the nmap scan for task 6 usually take?
took me 1h45....
@Josh ...takes a while
It depends on your network speed too
@@vitora.7895 scan -p1-10000 it takes 1 minute ;)
May I ask how did you know that you can connect to it with telnet? For me, I would have tried netcat instead of telnet
Its according to the room description
@@MotasemHamdan ohhh yeah yeah yeah, since the room was about telnet then that port must’ve been a telnet port. Makes sense, thank you
That nmap -p- it takes like 2 hours. IS THAT NORMAL?
I think it's an issue with tryhackme I was having those types of issues too. Instead of scanning -p- i just narrowed down my scans until i found an open port. I would go 1k at a time so i'd scan -p 1-1000 and so on.
😊👍
My nmap scan took about two hours and now is stuck at 99.99%
you can use the -T options to speed up your scan. -T0 slowest and -T5 fastest.
see more
nmap.org/book/performance-timing-templates.html
@@MotasemHamdan Thanks mate