Ethical Hacking in 15 Hours - 2023 Edition - Learn to Hack! (Part 2)

แชร์
ฝัง
  • เผยแพร่เมื่อ 29 ต.ค. 2024

ความคิดเห็น • 360

  • @TCMSecurityAcademy
    @TCMSecurityAcademy  ปีที่แล้ว +54

    Thank you so much for watching. Please consider subscribing. It's as easy as clicking this link: th-cam.com/users/thecybermentor
    Part 1: th-cam.com/video/3FNYvj2U0HM/w-d-xo.html
    Full Course: academy.tcm-sec.com/p/practical-ethical-hacking-the-complete-course
    All Course Resources/Links: github.com/Gr1mmie/Practical-Ethical-Hacking-Resources
    Wireless Adapter: amzn.to/3WdyJLc

    • @TehStoni
      @TehStoni ปีที่แล้ว +2

      As a PNPT holder, I am curious as to of what is differences between the 2023 version and previous versions are. Is there a changelog somewhere?

    • @TCMSecurityAcademy
      @TCMSecurityAcademy  ปีที่แล้ว +6

      The update log can be found in the Discord server.

    • @hustle717
      @hustle717 ปีที่แล้ว

      TH-camr Jay Williams "Lets live life" recently has his channel hacked, any tips on getting it back?

    • @zhafranazzamir3779
      @zhafranazzamir3779 ปีที่แล้ว

      Awesome... 14hrs... Subscribed and add for watch later... Thanks bro

    • @c12651
      @c12651 ปีที่แล้ว

      How to hack wifi using fluxion. 👇
      th-cam.com/video/AQ578zLAnDQ/w-d-xo.html

  • @mpn5124
    @mpn5124 6 หลายเดือนก่อน +5

    i have watched part1 and i have watched 3 hours of part2 , this is by far the best step by step video i have seen for ethical hacking, thank you for making it available here on youtube

  • @FMisi
    @FMisi ปีที่แล้ว +102

    Completed the course already and also got the other courses. Very informational courses. Passing the PNPT and the OSCP seems to become more and more achievable for me.
    Thank you, Heath

    • @keccak32
      @keccak32 ปีที่แล้ว

      It this same as the PEH course on the site?

    • @FMisi
      @FMisi ปีที่แล้ว +8

      @@keccak32 It is similar but the PEH course covers even more stuff such as active directory attacks or testing the OWASP Top 10 vulnerabilities on a web app.

    • @breakdance6989
      @breakdance6989 ปีที่แล้ว

      u bought the course?

    • @FMisi
      @FMisi ปีที่แล้ว +1

      @@breakdance6989 I bought the PEH course when it was 0 dollars because of the pandemic

    • @whitepowder807
      @whitepowder807 8 หลายเดือนก่อน +1

      ​@@FMisicould you possibly share it

  • @kellybasil1
    @kellybasil1 ปีที่แล้ว +30

    Haha, the legend has dropped another epic video 😍. Thanks for the free videos you post here HEATH. Your channel has always been a support to me since I can't afford most paid courses😚

  • @miguelofre
    @miguelofre ปีที่แล้ว +7

    You are a legend people from THM! Proud of taking your courses.

  • @samxaiver9852
    @samxaiver9852 ปีที่แล้ว +7

    I am FINALLY getting around to start watching this video. Part-One is GOOD!

  • @corsicana6868
    @corsicana6868 ปีที่แล้ว +8

    Just finished the series. Thanks Heath, learned a lot from you.

    • @leysledge438
      @leysledge438 ปีที่แล้ว

      did he teach cryptography?

  • @slevinlaine
    @slevinlaine 11 หลายเดือนก่อน +3

    Oh no sir 7:16:15 you don't get to retire!!! : D haha now really, thank you SOOO much for your hard work, I'm doing the PEH on your web and loving it for real, the way that you explain and show man I know I am repeating myself but I'm afraid I can't help it, I love it, you make it so clear and easy to follow and actually I feel encourage to keep going, thank you so much.
    Currently working on the Dev machine from your PEH course. And you are showing me at least how cool and amazing all this part of the IT is.
    By the way I am amazed you are share all this much on youtube, I think this is brilliant, so people can access to this knowledge.
    By the way, love it so much that you start with Kali from the start, loving the OS so much. You and your team do amazing work, lots of praise to Dewalt for that pimpmykali! Bravo!! (I of course, confess I don't understand the 0,1% of it but still I am thankful for someone to help fix stuff for the rest of us who are clueless like me).

  • @garcand
    @garcand ปีที่แล้ว +3

    going back to the roots and updated tutorials !! thx TCM this is what we want!

  • @7onysWorld
    @7onysWorld ปีที่แล้ว +9

    Thank you so much Heath, I'll will have to buy the full course. It is amazing 👏

  • @layaabkadunida6804
    @layaabkadunida6804 ปีที่แล้ว +6

    Super insightful, Thanks for creating such videos for free

  • @toddrobottom2228
    @toddrobottom2228 ปีที่แล้ว +1

    This was so awesome. Going back and watching it again to see if I can break these boxes in a different method.

  • @chaddrackets7541
    @chaddrackets7541 9 หลายเดือนก่อน

    Thank you Heath!!! I just finished 15 hours course and it was so fun and informative!!!!

    • @sauravgupta4103
      @sauravgupta4103 หลายเดือนก่อน

      Is this part 1 part 2 is enough forcomplete course

  • @JeffPedlow
    @JeffPedlow 2 หลายเดือนก่อน +2

    A note to anyone tackling Academy with Dirbuster -- I actually managed to fill / on the VM via overfilling the access logs. If you run into this, you'll have to log in and clear out the apache access & error logs and reboot it.

  • @Abc-sl1nf
    @Abc-sl1nf 11 หลายเดือนก่อน +1

    Thanks again. I am enjoying this course!

  • @demogorgan-vy7yg
    @demogorgan-vy7yg ปีที่แล้ว +1

    just popped my first shell! i can't express my happiness!!!

  • @hamzarashid7579
    @hamzarashid7579 ปีที่แล้ว +2

    One of the fantastic ethical hacking course. Everything is well explained. Thank you so much for this fantastic course love it, keep it up.

    • @sauravgupta4103
      @sauravgupta4103 หลายเดือนก่อน

      Is this part 1 part 2 complete course for Ethical hacking and not more than that

  • @youcef2851
    @youcef2851 ปีที่แล้ว +2

    thanks heath, hope you are doing great , i guess i'll check this course if there is new stuff

  • @iveckin
    @iveckin ปีที่แล้ว +68

    The guy named Joe Schmo living on Fake Street 123 be like 🤨

    • @Devilhunter69
      @Devilhunter69 6 หลายเดือนก่อน

      🤣

    • @NitroMedic
      @NitroMedic 3 หลายเดือนก่อน

      🤣😂

  • @sayangupta2844
    @sayangupta2844 ปีที่แล้ว +1

    Best and beginner guide to Ethical Hacking

  • @tanujkulkarni8108
    @tanujkulkarni8108 5 หลายเดือนก่อน +2

    This is one of the best videos for anyone trying to start ethical hacking. I just have one doubt in the manual buffer overflow, if the vuln server and the immunity debugger both are running on the target system then how to get the EIP value for finding the offset. You just picked it up from the immunity debugger but we wouldnt actually have access to it as its on the target system.

  • @Lanex2708
    @Lanex2708 10 หลายเดือนก่อน +1

    Really really helpful for beginners, I learned so much from this🎉

  • @tayyab8215
    @tayyab8215 8 หลายเดือนก่อน +1

    Excellent Video

  • @imyoubutbetter9951
    @imyoubutbetter9951 ปีที่แล้ว +1

    nah man after completing this course i can say that IT WORTH EVERY FKN SECOND. great explications and overall great experience. 👍👏

    • @leysledge438
      @leysledge438 ปีที่แล้ว

      did he teach cryptography?

    • @imyoubutbetter9951
      @imyoubutbetter9951 ปีที่แล้ว

      @@leysledge438 it's like you go for cooking lessons and you ask if they teach how to cook beef wellington. fam this is a beginner overview about hacking, cryptography is it's own course in +6 hours. same with networking.

  • @Deepakkumar-pm2kt
    @Deepakkumar-pm2kt ปีที่แล้ว +1

    Thank you, Heath. It is really a great course. Learnt a lot .❤❤

    • @omarsamy122
      @omarsamy122 9 หลายเดือนก่อน

      After this i will be qualified?

  • @JeffPedlow
    @JeffPedlow 2 หลายเดือนก่อน

    For anyone fighting with the shellcode section - continue on to the python3 and more, immediately my shellcode started working. Definitely was an encoding issue.
    This is amazing, thank you so much for the time and effort putting this up. Will 100% be getting the full courses.

  • @miscellaneouszone
    @miscellaneouszone ปีที่แล้ว +3

    Thank you so much. You work has done wonders in life.

  • @iGame2A
    @iGame2A ปีที่แล้ว

    Amazing, thank you so much for the content! I've been searching the past decade for the right career field. I've worn many hats across multiple industries. But I now know that this is it for me. It's fun to solve these puzzles. Looking forward to the other courses.

  • @Mohanuser29
    @Mohanuser29 ปีที่แล้ว

    No need to follow the Cisco path with many CXYZ certificates. All the dpkg wrapped smouthly in that valuable video. Thanks !. You are the Super Cyber Mentor.

  • @NessHypegaming
    @NessHypegaming ปีที่แล้ว +4

    this is a gold mine of information god bless you.

  • @BertSixx
    @BertSixx 6 หลายเดือนก่อน

    Thank you for everything Heath

  • @larsson4010
    @larsson4010 ปีที่แล้ว

    Awesome course man!

  • @ronaldogabriela9670
    @ronaldogabriela9670 ปีที่แล้ว +1

    Im here to thank you very much for this course, i've learned a lot with you, im from cape verd🇨🇻 and i am in this journey to be a ethical hacker...god bless u man and keep up with a good work

  • @Abc-sl1nf
    @Abc-sl1nf 9 หลายเดือนก่อน

    I made it. I signed up with your monthly TCM courses.

    • @omarsamy122
      @omarsamy122 9 หลายเดือนก่อน

      After this course i will be qualified ?

  • @daigriffiths6476
    @daigriffiths6476 3 หลายเดือนก่อน

    Python-Venom Windows machine, which says minimum requirements are Windows 7, 8, 10 or newer (At around 3.26Hrs) only needs to go as far as 11, as Co-Spylot will be able to tell us what we were thinking of, in the future, removing the need for any pesky little things like tools, or curiosity, Cheers Adam, great course, as usual. Thanks for making them, all of them.

  • @nathanjbee
    @nathanjbee ปีที่แล้ว +3

    Thank you for the upload. Should I use a VPN when practicing the bug crowd bug bounties? How crucial is it to protect your public IP in this field?

  • @侯琛琛-l4l
    @侯琛琛-l4l 5 หลายเดือนก่อน

    so glad to watch a step by step for noob like me. and I've been watching through part 1&2, does anyone know whatshould I do next? give me some advice plz

    • @mirshodoripov1035
      @mirshodoripov1035 5 หลายเดือนก่อน

      Hi, do you have a deep knowledge in IT?

    • @侯琛琛-l4l
      @侯琛琛-l4l 5 หลายเดือนก่อน

      @@mirshodoripov1035im afraid no

  • @safetime100
    @safetime100 5 หลายเดือนก่อน +1

    Legend ❤

  • @onesixlima
    @onesixlima ปีที่แล้ว

    great videos man exactly what i needed

    • @leysledge438
      @leysledge438 ปีที่แล้ว

      did he teach cryptography?

    • @onesixlima
      @onesixlima ปีที่แล้ว

      dont think so@@leysledge438

  • @samxaiver9852
    @samxaiver9852 ปีที่แล้ว +1

    I watched Part 1 and this Part 2. cool!

    • @sauravgupta4103
      @sauravgupta4103 หลายเดือนก่อน

      Is this part 1 part 2 complete for Ethical hacking

  • @oneloveafrica8860
    @oneloveafrica8860 ปีที่แล้ว

    it was cool 🥰..tanks for this video man !!

  • @hazem2121
    @hazem2121 ปีที่แล้ว +1

    Thank you for your efforts

  • @Musician_Robert
    @Musician_Robert ปีที่แล้ว

    Luv your vids!!

  • @Percyjay
    @Percyjay ปีที่แล้ว +3

    I was trying to brute force this machine (kioptrix.level 1) using hydra and received an error saying: could not connect to ssh://:22 - kex error : no match for method kex algos:
    I used the same command as shown in this video, can someone help me on this?

  • @e-action
    @e-action ปีที่แล้ว +7

    Is reconnaissance, penetration testing and hacking in general going to be a lot more challenging when IPv6 goes mainstream?

    • @Aarabstrait
      @Aarabstrait ปีที่แล้ว +1

      Ipv6 will never be mainstream on internal networks. Maybe for iot devices but it’s easier to maintain access list for ipv4 subnets. Maybe in 2070 when every firewall has a Jarvis AI

  • @Strategic.
    @Strategic. ปีที่แล้ว +1

    super informative!

  • @B1ADE99
    @B1ADE99 ปีที่แล้ว +2

    This dude is the real fucking top G

  • @zness-ps7qv
    @zness-ps7qv ปีที่แล้ว

    Best video on youtube on hacking

  • @Khal_Rheg0
    @Khal_Rheg0 5 หลายเดือนก่อน +1

    Just finished these videos, going to buy the certification exam next :D

    • @TCMSecurityAcademy
      @TCMSecurityAcademy  5 หลายเดือนก่อน +1

      Happy to hear it!

    • @lukuwazzow9553
      @lukuwazzow9553 2 หลายเดือนก่อน +1

      How did you go about the buffer overflow part?

    • @ifty7017
      @ifty7017 2 หลายเดือนก่อน

      @@lukuwazzow9553 good question lol. this part was most confusing, i had to go through the videos thrice

  • @programthis3805
    @programthis3805 8 หลายเดือนก่อน +1

    4:22:04 I FINISHED THE COURSE!!! OMGGG

  • @arnavgoel3865
    @arnavgoel3865 ปีที่แล้ว +10

    I ma getting an error of "Error: Virustotal probably now is blocking our requests" this while running sublist3r.... anyone who knows how to fix it?

  • @lostmountainresearchco
    @lostmountainresearchco ปีที่แล้ว +2

    If you can't get the badchars portion to work and you have Python3, here's the cheat code - You already know that you have to add 'b' infront of certain things in Python3, but you can't do that with 'badchars' since it'll already be a string and think you're trying to do "bbadchars". You need to: bytes(badchars, encoding = "utf-8")

    • @douarmedouailislam1840
      @douarmedouailislam1840 ปีที่แล้ว

      i dont understand where do you put this bytes(badchars, encoding = "utf-8") ? cuz i have the same problem

  • @lowkeylyesmith
    @lowkeylyesmith ปีที่แล้ว

    Hey,
    thanks for the super awesome video.
    I'm just about to sign up for the monthly The All-Access Membership. I have a question about hardware. Which notebook would you recommend as a pro? A MacBook or a Windows/Linux notebook?
    Thank you

  • @mukaramkhan135
    @mukaramkhan135 ปีที่แล้ว +1

    good course. where can i get the VMs used in this course like blue, blackpearl, dev, academy etc.

  • @SamuelEdi80
    @SamuelEdi80 7 หลายเดือนก่อน +3

    Kioptrix IP will not show up in the arp scan with the NAT config on both machines.
    Other than that great tutorial, too bad it can't be followed

    • @gergosz07
      @gergosz07 29 วันที่ผ่านมา

      I'm running both Kali and Kioptrix as virtual machines, at the same time. In VirtualBox, you can make your own NAT network. In the network settings of each machine, make sure you have chosen "NAT network", then choose the NAT network you have just made. Doing this meant that the arp-scan in the Kali VM was able to see the IP of the Kioptrix VM.

  • @alvarosg7
    @alvarosg7 ปีที่แล้ว +3

    Is anyone running into issues with sublist3r? Any suggestions on how to fix it? I got rid off the virustotal error but sublist3r does not give me any output.

  • @joanofzackkk610
    @joanofzackkk610 2 หลายเดือนก่อน

    Hey! might not get an answer, but nothing came up online so I've got nothing to lose since apparently my google skills are weak: around 2:43:00-2:44:00 you've spoken about 4444 as default being too obvious, any substitute works?
    Tried looking for recommended ports, nothing came up, so just a random port is better?

  • @massylii
    @massylii ปีที่แล้ว +2

    Thank you sir ❤️

  • @noctavel
    @noctavel ปีที่แล้ว

    This is BRILLIANT! thank you so much for sharing

  • @flioink
    @flioink 5 หลายเดือนก่อน

    Awesome!
    Went through everything..well except the buffer overflow manual method - that would probably need another 15 hrs alone :D
    Otherwise managed to follow all the rooting walkthroughs successfully.

  • @MichaelValenzuel4
    @MichaelValenzuel4 ปีที่แล้ว

    This is something I am VERY good at and will love to do as a job. If I was a consultant and was to have a business to do Ethical Hacking. How much would a small company pay for a 32-40 hours pen test or for what you did in these videos.

  • @trikymirkygaming2701
    @trikymirkygaming2701 8 หลายเดือนก่อน +1

    How I can get the dev machine?
    Please help me it is not in the provided links.

  • @VALENT3CH
    @VALENT3CH ปีที่แล้ว +1

    Hi! I'm not using VM. I'm with Parrot OS directly installed on my laptop. Everything is going perfect but i can't install kioptrix. Is there any alternative to it?

  • @navid_1633
    @navid_1633 ปีที่แล้ว

    Thanks again for those videos, just a quick question when you were using nessus and running those scan's, are you getting detected from the site administrator?

  • @QQ-gn7tc
    @QQ-gn7tc ปีที่แล้ว

    👋Thank you so much for such a greate course, I just finished the course and 100% I need more 🤟. Which course/s at TCM you recommend to start with?, any discounts if possible. Thank you so much again🙏.

  • @fernandopierola
    @fernandopierola ปีที่แล้ว +1

    Thanks a lot!!

  • @WilliamCotterell-y7e
    @WilliamCotterell-y7e 11 หลายเดือนก่อน +1

    what is that assessment notes program you use for taking notes? I love the organization

    • @srgarner0
      @srgarner0 11 หลายเดือนก่อน

      It's called cherrytree. Available on most OSes.

  • @mjmares
    @mjmares ปีที่แล้ว +2

    Why is the https not working when I try and go too the web address? http is working but not 443

  • @programthis3805
    @programthis3805 8 หลายเดือนก่อน +1

    woooo ROOTED MY FIRST MACHINE!! hahaha

  • @toleranceedwardnyakabau773
    @toleranceedwardnyakabau773 ปีที่แล้ว +1

    Hey Health , after completing your practical ethical hacking . Do I receive a certificate ?

  • @esoochannel3864
    @esoochannel3864 ปีที่แล้ว +1

    Hello, is this course is same one on the TCM academy? Or what is the difference between them

  • @lemidemesew1256
    @lemidemesew1256 ปีที่แล้ว +1

    My favourite part fo the video 2:13:48

  • @naeem8434
    @naeem8434 ปีที่แล้ว

    Amazing sir 👍

  • @theobdr599
    @theobdr599 หลายเดือนก่อน +1

    This course is awesome but i have a question. In all the course, each time we attack something, we already have the ip address of the target and we are in the same network. IRL we probably need to find the ip address of the target and even perhaps break into the network to use all the tools like nmap, msf... How can we do that ?

    • @NnGgnT
      @NnGgnT 3 วันที่ผ่านมา +1

      It's ethical hacking so it means that the victim gives you the consent so you are already in their network I guess

    • @theobdr599
      @theobdr599 2 วันที่ผ่านมา

      @@NnGgnT y but for exemple when you do red team u have to break into the network

    • @NnGgnT
      @NnGgnT 2 วันที่ผ่านมา

      @@theobdr599 If you know the hostname you can find the ip

    • @NnGgnT
      @NnGgnT 2 วันที่ผ่านมา

      @@theobdr599 But you can get easily the ip of an hostname

  • @afolayanolaoluwa3511
    @afolayanolaoluwa3511 ปีที่แล้ว

    thanks so much Heath. Learned so much. please, when i did the pinging on kioptrix level 1, it returned "network is unrecheable". What could be the problrm please?

  • @RandyCornwell
    @RandyCornwell ปีที่แล้ว +1

    What application are you using for your notes? I am not sure if I caught that.

    • @yipyiphooray339
      @yipyiphooray339 ปีที่แล้ว

      He introduces the note-taking software in the previous part

    • @kahlilb9602
      @kahlilb9602 ปีที่แล้ว

      I believe he is using keepnote although there are better options

  • @HaraldEllingsen85
    @HaraldEllingsen85 ปีที่แล้ว

    @tcmsecurityacademy
    Thanks for a great video course, i have a question regarding the buffer overflow payload.
    I dont understand the position of the payload. You put the pointer to JMP ESP in the EIP. So we jump to the ESP to execute the shellcode, but you position the shellcode after the EIP at a higher memoryaddress. When looking at the anatomy slide, is the lowest address on top or bottom? Please explain.

  • @elite_kid656
    @elite_kid656 ปีที่แล้ว

    Nice video 👍🏾

  • @ismailrabie1940
    @ismailrabie1940 4 หลายเดือนก่อน +1

    Can I use c++ instead of python in this course??

  • @ignatiouskazussah9713
    @ignatiouskazussah9713 ปีที่แล้ว

    Thank you too for the teaching us.😁

  • @Dahlah.FightMe
    @Dahlah.FightMe ปีที่แล้ว

    Nice Sir :D

  • @michoghorra4490
    @michoghorra4490 2 หลายเดือนก่อน

    do you recommend using a vm of windows or just use my host windows machine? i just don't know how risky it is and don't have enough ram to run 2 windows and kali at the same time? what do you think?

    • @michoghorra4490
      @michoghorra4490 2 หลายเดือนก่อน

      for context: 3:24:27 in the video the part of: downloading our material

  • @LastIntrepidElf
    @LastIntrepidElf 2 หลายเดือนก่อน

    How long should take every section, for a normal person, to grasp the most? How long is good/wise? Cause I realize that I forget a lot of things, cause too fast me.

  • @lostmountainresearchco
    @lostmountainresearchco ปีที่แล้ว +4

    Fuzzing script will not work if you have Python3. If you have issues with it crashing at 100 bytes, I suggest looking online for Python3 specific scripts. Here is one I found that may or may not work for my after I tweak it a little. It may work for you or you may find a better one. The important thing to know is that Python3 did not work with this script.

    • @anummalik7563
      @anummalik7563 ปีที่แล้ว

      I have the same issue. Then I used another script and it's working.

    • @douarmedouailislam1840
      @douarmedouailislam1840 ปีที่แล้ว

      @@anummalik7563 can you give the script that worked please ?

    • @yipyiphooray339
      @yipyiphooray339 ปีที่แล้ว

      Uhhh which script ru referrin to?

    • @ragnar_9083
      @ragnar_9083 2 หลายเดือนก่อน

      indeed, was just testing and doesn't work, try this one:
      #!/usr/bin/python3
      import sys
      import socket
      from time import sleep
      buffer = b"A" * 100
      HOST = ''
      PORT = 9999
      while True:
      try:
      sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
      sock.connect(('HOST, PORT))
      payload = b'shitstorm /.:/' + buffer
      sock.send(payload)
      sock.close()
      sleep(1)
      buffer += b"A" * 100
      except:
      print("Fuzzing crash at %s bytes" % str(len(buffer)))
      sys.exit()

    • @andrej4806
      @andrej4806 14 วันที่ผ่านมา

      When sending the payload convert the string to utf-8 with .encode('utf-8') like this:
      payload = ("TRUN /.:/"+"buffer").encode('utf-8')
      s.send(payload)

  • @naimaali5237
    @naimaali5237 ปีที่แล้ว +1

    Thank you i learned a lot
    from you

    • @leysledge438
      @leysledge438 ปีที่แล้ว

      did he teach cryptography?

    • @naimaali5237
      @naimaali5237 ปีที่แล้ว

      @@leysledge438 No this video was all about pen-testing but i really don't know if he has a tutorial for cryptography

  • @amirjafari9538
    @amirjafari9538 ปีที่แล้ว +3

    Hi, thanks for your awesome tutorial. In fuzzing section of course when when execute 1.py script ,denied try part and just except part of script execute and return crashed at 100bytes.how i can resolve this?

    • @rmk1553
      @rmk1553 ปีที่แล้ว

      The problem is in the python version, in python2 by default all the values are considered as bytes and in python 3 it is string.
      Add the .encode('utf-8') in the send line and it should work (at least worked for me).
      s.send(('TRUN /:./' + buffer).encode('utf-8'))

    • @GalaXYZe
      @GalaXYZe ปีที่แล้ว +1

      I am running into the same, have you found a solution? The comment below this one doesn't seem to open for me

    • @rmk1553
      @rmk1553 ปีที่แล้ว

      @@GalaXYZe further in the video he explains it, but you need to change this line
      s.send(('TRUN /:./' + buffer).encode('utf-8'))
      python 2 uses bytes as default, but in python 3 the default is string, so you have to encode it.

  • @testephone9980
    @testephone9980 ปีที่แล้ว +1

    In brazil the government and the police allow cybercrime since the hacker don't stole any money, but when they do nobody want the fault, so for cyber security it have been a very good country for cyber security to act because the population don't have lots of protection

  • @Axy-j2q
    @Axy-j2q หลายเดือนก่อน

    Today I have completed this 15 hour ethical Hacking journey.
    JazakAllah @heath Adams our mentor for this incredible course, you taught us very well. Looking forward to learn more new skills from you.

  • @theom9184
    @theom9184 8 หลายเดือนก่อน +1

    Hello,
    I installed kioptrix, but i can't change the settings as it automatically send me a 'VMWare unrecoverable error" if the vm has not started.
    I can run it , then access the settings, but can't change the Network to LAN as it is automacally in bridged and greyed when it is running.
    Can anyone help?

    • @محمداسامه-خ2غ
      @محمداسامه-خ2غ 7 หลายเดือนก่อน

      run the xioptrix and from inside it in the up left you will see something called "player" click on it then mange and from manage virtual machine setting.

  • @AtlasSticks64
    @AtlasSticks64 10 วันที่ผ่านมา

    what software are you using at 2h10m?

  • @issho8885
    @issho8885 ปีที่แล้ว +4

    Thanks for this. I really appreciate this information. However i have a question: how did you get the python script to print a string without parentheses, it keeps giving me errors and also i had to encode that trun string(i went online) before it could work. But im stuck at the offset(encoding isnt working and it doesn't connect)

    • @issho8885
      @issho8885 ปีที่แล้ว +7

      Update: it took me 3 hrs to find a solution for the offset. It just had to put a "b" before the string quotes both for TRUN and the offset variable, then remove the forward slashes in the trun
      So it was like:
      Offset = b"AA0AA1AA2..."
      s.send(b"TRUN ." + offset)
      Those are the only things that needed to be changed. I hope it was helpful to whoever came across such problems

  • @learnnepse5102
    @learnnepse5102 ปีที่แล้ว

    @The Cyber Mentor Can you explain 3:58:09 part please? I really cant understand

  • @adil60108
    @adil60108 ปีที่แล้ว

    Which Linux version and desktop environment you are using?

  • @theyosichannel8290
    @theyosichannel8290 ปีที่แล้ว +2

    when we do the spiking and the fuzzing one how would we know the exact "A" to send to the victim if we dont see the victims immunity debugger im kidda confusing anyone tell me how??
    🙏🙏

    • @matesatacker
      @matesatacker ปีที่แล้ว

      have you found the answer? i am puzzled as well.

    • @matesatacker
      @matesatacker ปีที่แล้ว

      i also dont understand how did we get the original EIP or how did we know the server crashed during spikeing phase...

    • @theyosichannel8290
      @theyosichannel8290 ปีที่แล้ว

      @@matesatacker nop bro still searching

  • @actiontv8835
    @actiontv8835 ปีที่แล้ว +1

    Thank you...

  • @controversychaos1
    @controversychaos1 4 หลายเดือนก่อน

    heath when i installed vulnserver in my windows 10 VMware the command:
    nc -nv ip address 9999
    Doesnt work it just says connection timed out i even turned off my fire wall in my victm windows machine and i have followed each and every step you have done in this course i am stuck at spiking part plz help me

  • @roysefanioz
    @roysefanioz 6 หลายเดือนก่อน

    Which software are you using?

  • @nisatdev
    @nisatdev ปีที่แล้ว

    Love you
    you are the best best and the besttt

  • @malua7021
    @malua7021 ปีที่แล้ว

    Nice 💯💯💯😎😎

  • @Axy-j2q
    @Axy-j2q 2 หลายเดือนก่อน

    Bro I am solving black pearl and dev room but I did not get my IP. I have Changed from bridge to Nat and vice verse try different commands but it does not show up how to solve it?