Thank you so much for watching. Please consider subscribing. It's as easy as clicking this link: th-cam.com/users/thecybermentor Part 1: th-cam.com/video/3FNYvj2U0HM/w-d-xo.html Full Course: academy.tcm-sec.com/p/practical-ethical-hacking-the-complete-course All Course Resources/Links: github.com/Gr1mmie/Practical-Ethical-Hacking-Resources Wireless Adapter: amzn.to/3WdyJLc
i have watched part1 and i have watched 3 hours of part2 , this is by far the best step by step video i have seen for ethical hacking, thank you for making it available here on youtube
Completed the course already and also got the other courses. Very informational courses. Passing the PNPT and the OSCP seems to become more and more achievable for me. Thank you, Heath
@@keccak32 It is similar but the PEH course covers even more stuff such as active directory attacks or testing the OWASP Top 10 vulnerabilities on a web app.
Haha, the legend has dropped another epic video 😍. Thanks for the free videos you post here HEATH. Your channel has always been a support to me since I can't afford most paid courses😚
Oh no sir 7:16:15 you don't get to retire!!! : D haha now really, thank you SOOO much for your hard work, I'm doing the PEH on your web and loving it for real, the way that you explain and show man I know I am repeating myself but I'm afraid I can't help it, I love it, you make it so clear and easy to follow and actually I feel encourage to keep going, thank you so much. Currently working on the Dev machine from your PEH course. And you are showing me at least how cool and amazing all this part of the IT is. By the way I am amazed you are share all this much on youtube, I think this is brilliant, so people can access to this knowledge. By the way, love it so much that you start with Kali from the start, loving the OS so much. You and your team do amazing work, lots of praise to Dewalt for that pimpmykali! Bravo!! (I of course, confess I don't understand the 0,1% of it but still I am thankful for someone to help fix stuff for the rest of us who are clueless like me).
A note to anyone tackling Academy with Dirbuster -- I actually managed to fill / on the VM via overfilling the access logs. If you run into this, you'll have to log in and clear out the apache access & error logs and reboot it.
This is one of the best videos for anyone trying to start ethical hacking. I just have one doubt in the manual buffer overflow, if the vuln server and the immunity debugger both are running on the target system then how to get the EIP value for finding the offset. You just picked it up from the immunity debugger but we wouldnt actually have access to it as its on the target system.
@@leysledge438 it's like you go for cooking lessons and you ask if they teach how to cook beef wellington. fam this is a beginner overview about hacking, cryptography is it's own course in +6 hours. same with networking.
For anyone fighting with the shellcode section - continue on to the python3 and more, immediately my shellcode started working. Definitely was an encoding issue. This is amazing, thank you so much for the time and effort putting this up. Will 100% be getting the full courses.
Amazing, thank you so much for the content! I've been searching the past decade for the right career field. I've worn many hats across multiple industries. But I now know that this is it for me. It's fun to solve these puzzles. Looking forward to the other courses.
No need to follow the Cisco path with many CXYZ certificates. All the dpkg wrapped smouthly in that valuable video. Thanks !. You are the Super Cyber Mentor.
Im here to thank you very much for this course, i've learned a lot with you, im from cape verd🇨🇻 and i am in this journey to be a ethical hacker...god bless u man and keep up with a good work
Python-Venom Windows machine, which says minimum requirements are Windows 7, 8, 10 or newer (At around 3.26Hrs) only needs to go as far as 11, as Co-Spylot will be able to tell us what we were thinking of, in the future, removing the need for any pesky little things like tools, or curiosity, Cheers Adam, great course, as usual. Thanks for making them, all of them.
so glad to watch a step by step for noob like me. and I've been watching through part 1&2, does anyone know whatshould I do next? give me some advice plz
I was trying to brute force this machine (kioptrix.level 1) using hydra and received an error saying: could not connect to ssh://:22 - kex error : no match for method kex algos: I used the same command as shown in this video, can someone help me on this?
Ipv6 will never be mainstream on internal networks. Maybe for iot devices but it’s easier to maintain access list for ipv4 subnets. Maybe in 2070 when every firewall has a Jarvis AI
If you can't get the badchars portion to work and you have Python3, here's the cheat code - You already know that you have to add 'b' infront of certain things in Python3, but you can't do that with 'badchars' since it'll already be a string and think you're trying to do "bbadchars". You need to: bytes(badchars, encoding = "utf-8")
Hey, thanks for the super awesome video. I'm just about to sign up for the monthly The All-Access Membership. I have a question about hardware. Which notebook would you recommend as a pro? A MacBook or a Windows/Linux notebook? Thank you
I'm running both Kali and Kioptrix as virtual machines, at the same time. In VirtualBox, you can make your own NAT network. In the network settings of each machine, make sure you have chosen "NAT network", then choose the NAT network you have just made. Doing this meant that the arp-scan in the Kali VM was able to see the IP of the Kioptrix VM.
Is anyone running into issues with sublist3r? Any suggestions on how to fix it? I got rid off the virustotal error but sublist3r does not give me any output.
Hey! might not get an answer, but nothing came up online so I've got nothing to lose since apparently my google skills are weak: around 2:43:00-2:44:00 you've spoken about 4444 as default being too obvious, any substitute works? Tried looking for recommended ports, nothing came up, so just a random port is better?
Awesome! Went through everything..well except the buffer overflow manual method - that would probably need another 15 hrs alone :D Otherwise managed to follow all the rooting walkthroughs successfully.
This is something I am VERY good at and will love to do as a job. If I was a consultant and was to have a business to do Ethical Hacking. How much would a small company pay for a 32-40 hours pen test or for what you did in these videos.
Hi! I'm not using VM. I'm with Parrot OS directly installed on my laptop. Everything is going perfect but i can't install kioptrix. Is there any alternative to it?
Thanks again for those videos, just a quick question when you were using nessus and running those scan's, are you getting detected from the site administrator?
👋Thank you so much for such a greate course, I just finished the course and 100% I need more 🤟. Which course/s at TCM you recommend to start with?, any discounts if possible. Thank you so much again🙏.
This course is awesome but i have a question. In all the course, each time we attack something, we already have the ip address of the target and we are in the same network. IRL we probably need to find the ip address of the target and even perhaps break into the network to use all the tools like nmap, msf... How can we do that ?
thanks so much Heath. Learned so much. please, when i did the pinging on kioptrix level 1, it returned "network is unrecheable". What could be the problrm please?
@tcmsecurityacademy Thanks for a great video course, i have a question regarding the buffer overflow payload. I dont understand the position of the payload. You put the pointer to JMP ESP in the EIP. So we jump to the ESP to execute the shellcode, but you position the shellcode after the EIP at a higher memoryaddress. When looking at the anatomy slide, is the lowest address on top or bottom? Please explain.
do you recommend using a vm of windows or just use my host windows machine? i just don't know how risky it is and don't have enough ram to run 2 windows and kali at the same time? what do you think?
How long should take every section, for a normal person, to grasp the most? How long is good/wise? Cause I realize that I forget a lot of things, cause too fast me.
Fuzzing script will not work if you have Python3. If you have issues with it crashing at 100 bytes, I suggest looking online for Python3 specific scripts. Here is one I found that may or may not work for my after I tweak it a little. It may work for you or you may find a better one. The important thing to know is that Python3 did not work with this script.
Hi, thanks for your awesome tutorial. In fuzzing section of course when when execute 1.py script ,denied try part and just except part of script execute and return crashed at 100bytes.how i can resolve this?
The problem is in the python version, in python2 by default all the values are considered as bytes and in python 3 it is string. Add the .encode('utf-8') in the send line and it should work (at least worked for me). s.send(('TRUN /:./' + buffer).encode('utf-8'))
@@GalaXYZe further in the video he explains it, but you need to change this line s.send(('TRUN /:./' + buffer).encode('utf-8')) python 2 uses bytes as default, but in python 3 the default is string, so you have to encode it.
In brazil the government and the police allow cybercrime since the hacker don't stole any money, but when they do nobody want the fault, so for cyber security it have been a very good country for cyber security to act because the population don't have lots of protection
Today I have completed this 15 hour ethical Hacking journey. JazakAllah @heath Adams our mentor for this incredible course, you taught us very well. Looking forward to learn more new skills from you.
Hello, I installed kioptrix, but i can't change the settings as it automatically send me a 'VMWare unrecoverable error" if the vm has not started. I can run it , then access the settings, but can't change the Network to LAN as it is automacally in bridged and greyed when it is running. Can anyone help?
run the xioptrix and from inside it in the up left you will see something called "player" click on it then mange and from manage virtual machine setting.
Thanks for this. I really appreciate this information. However i have a question: how did you get the python script to print a string without parentheses, it keeps giving me errors and also i had to encode that trun string(i went online) before it could work. But im stuck at the offset(encoding isnt working and it doesn't connect)
Update: it took me 3 hrs to find a solution for the offset. It just had to put a "b" before the string quotes both for TRUN and the offset variable, then remove the forward slashes in the trun So it was like: Offset = b"AA0AA1AA2..." s.send(b"TRUN ." + offset) Those are the only things that needed to be changed. I hope it was helpful to whoever came across such problems
when we do the spiking and the fuzzing one how would we know the exact "A" to send to the victim if we dont see the victims immunity debugger im kidda confusing anyone tell me how?? 🙏🙏
heath when i installed vulnserver in my windows 10 VMware the command: nc -nv ip address 9999 Doesnt work it just says connection timed out i even turned off my fire wall in my victm windows machine and i have followed each and every step you have done in this course i am stuck at spiking part plz help me
Bro I am solving black pearl and dev room but I did not get my IP. I have Changed from bridge to Nat and vice verse try different commands but it does not show up how to solve it?
Thank you so much for watching. Please consider subscribing. It's as easy as clicking this link: th-cam.com/users/thecybermentor
Part 1: th-cam.com/video/3FNYvj2U0HM/w-d-xo.html
Full Course: academy.tcm-sec.com/p/practical-ethical-hacking-the-complete-course
All Course Resources/Links: github.com/Gr1mmie/Practical-Ethical-Hacking-Resources
Wireless Adapter: amzn.to/3WdyJLc
As a PNPT holder, I am curious as to of what is differences between the 2023 version and previous versions are. Is there a changelog somewhere?
The update log can be found in the Discord server.
TH-camr Jay Williams "Lets live life" recently has his channel hacked, any tips on getting it back?
Awesome... 14hrs... Subscribed and add for watch later... Thanks bro
How to hack wifi using fluxion. 👇
th-cam.com/video/AQ578zLAnDQ/w-d-xo.html
i have watched part1 and i have watched 3 hours of part2 , this is by far the best step by step video i have seen for ethical hacking, thank you for making it available here on youtube
Completed the course already and also got the other courses. Very informational courses. Passing the PNPT and the OSCP seems to become more and more achievable for me.
Thank you, Heath
It this same as the PEH course on the site?
@@keccak32 It is similar but the PEH course covers even more stuff such as active directory attacks or testing the OWASP Top 10 vulnerabilities on a web app.
u bought the course?
@@breakdance6989 I bought the PEH course when it was 0 dollars because of the pandemic
@@FMisicould you possibly share it
Haha, the legend has dropped another epic video 😍. Thanks for the free videos you post here HEATH. Your channel has always been a support to me since I can't afford most paid courses😚
You are a legend people from THM! Proud of taking your courses.
I am FINALLY getting around to start watching this video. Part-One is GOOD!
Just finished the series. Thanks Heath, learned a lot from you.
did he teach cryptography?
Oh no sir 7:16:15 you don't get to retire!!! : D haha now really, thank you SOOO much for your hard work, I'm doing the PEH on your web and loving it for real, the way that you explain and show man I know I am repeating myself but I'm afraid I can't help it, I love it, you make it so clear and easy to follow and actually I feel encourage to keep going, thank you so much.
Currently working on the Dev machine from your PEH course. And you are showing me at least how cool and amazing all this part of the IT is.
By the way I am amazed you are share all this much on youtube, I think this is brilliant, so people can access to this knowledge.
By the way, love it so much that you start with Kali from the start, loving the OS so much. You and your team do amazing work, lots of praise to Dewalt for that pimpmykali! Bravo!! (I of course, confess I don't understand the 0,1% of it but still I am thankful for someone to help fix stuff for the rest of us who are clueless like me).
going back to the roots and updated tutorials !! thx TCM this is what we want!
Thank you so much Heath, I'll will have to buy the full course. It is amazing 👏
Super insightful, Thanks for creating such videos for free
This was so awesome. Going back and watching it again to see if I can break these boxes in a different method.
Thank you Heath!!! I just finished 15 hours course and it was so fun and informative!!!!
Is this part 1 part 2 is enough forcomplete course
A note to anyone tackling Academy with Dirbuster -- I actually managed to fill / on the VM via overfilling the access logs. If you run into this, you'll have to log in and clear out the apache access & error logs and reboot it.
Thanks again. I am enjoying this course!
just popped my first shell! i can't express my happiness!!!
One of the fantastic ethical hacking course. Everything is well explained. Thank you so much for this fantastic course love it, keep it up.
Is this part 1 part 2 complete course for Ethical hacking and not more than that
thanks heath, hope you are doing great , i guess i'll check this course if there is new stuff
The guy named Joe Schmo living on Fake Street 123 be like 🤨
🤣
🤣😂
Best and beginner guide to Ethical Hacking
This is one of the best videos for anyone trying to start ethical hacking. I just have one doubt in the manual buffer overflow, if the vuln server and the immunity debugger both are running on the target system then how to get the EIP value for finding the offset. You just picked it up from the immunity debugger but we wouldnt actually have access to it as its on the target system.
Really really helpful for beginners, I learned so much from this🎉
Excellent Video
nah man after completing this course i can say that IT WORTH EVERY FKN SECOND. great explications and overall great experience. 👍👏
did he teach cryptography?
@@leysledge438 it's like you go for cooking lessons and you ask if they teach how to cook beef wellington. fam this is a beginner overview about hacking, cryptography is it's own course in +6 hours. same with networking.
Thank you, Heath. It is really a great course. Learnt a lot .❤❤
After this i will be qualified?
For anyone fighting with the shellcode section - continue on to the python3 and more, immediately my shellcode started working. Definitely was an encoding issue.
This is amazing, thank you so much for the time and effort putting this up. Will 100% be getting the full courses.
Thank you so much. You work has done wonders in life.
You're very welcome!
did he teach cryptography?
Amazing, thank you so much for the content! I've been searching the past decade for the right career field. I've worn many hats across multiple industries. But I now know that this is it for me. It's fun to solve these puzzles. Looking forward to the other courses.
No need to follow the Cisco path with many CXYZ certificates. All the dpkg wrapped smouthly in that valuable video. Thanks !. You are the Super Cyber Mentor.
this is a gold mine of information god bless you.
Glad it was helpful!
Thank you for everything Heath
Awesome course man!
Im here to thank you very much for this course, i've learned a lot with you, im from cape verd🇨🇻 and i am in this journey to be a ethical hacker...god bless u man and keep up with a good work
I made it. I signed up with your monthly TCM courses.
After this course i will be qualified ?
Python-Venom Windows machine, which says minimum requirements are Windows 7, 8, 10 or newer (At around 3.26Hrs) only needs to go as far as 11, as Co-Spylot will be able to tell us what we were thinking of, in the future, removing the need for any pesky little things like tools, or curiosity, Cheers Adam, great course, as usual. Thanks for making them, all of them.
Thank you for the upload. Should I use a VPN when practicing the bug crowd bug bounties? How crucial is it to protect your public IP in this field?
so glad to watch a step by step for noob like me. and I've been watching through part 1&2, does anyone know whatshould I do next? give me some advice plz
Hi, do you have a deep knowledge in IT?
@@mirshodoripov1035im afraid no
Legend ❤
great videos man exactly what i needed
did he teach cryptography?
dont think so@@leysledge438
I watched Part 1 and this Part 2. cool!
Is this part 1 part 2 complete for Ethical hacking
it was cool 🥰..tanks for this video man !!
Thank you for your efforts
Luv your vids!!
I was trying to brute force this machine (kioptrix.level 1) using hydra and received an error saying: could not connect to ssh://:22 - kex error : no match for method kex algos:
I used the same command as shown in this video, can someone help me on this?
Is reconnaissance, penetration testing and hacking in general going to be a lot more challenging when IPv6 goes mainstream?
Ipv6 will never be mainstream on internal networks. Maybe for iot devices but it’s easier to maintain access list for ipv4 subnets. Maybe in 2070 when every firewall has a Jarvis AI
super informative!
Glad it was helpful!
This dude is the real fucking top G
Best video on youtube on hacking
Just finished these videos, going to buy the certification exam next :D
Happy to hear it!
How did you go about the buffer overflow part?
@@lukuwazzow9553 good question lol. this part was most confusing, i had to go through the videos thrice
4:22:04 I FINISHED THE COURSE!!! OMGGG
I ma getting an error of "Error: Virustotal probably now is blocking our requests" this while running sublist3r.... anyone who knows how to fix it?
it's an older tool, switch to subfinder instead. almost identical in terms of use.
2:55:41
If you can't get the badchars portion to work and you have Python3, here's the cheat code - You already know that you have to add 'b' infront of certain things in Python3, but you can't do that with 'badchars' since it'll already be a string and think you're trying to do "bbadchars". You need to: bytes(badchars, encoding = "utf-8")
i dont understand where do you put this bytes(badchars, encoding = "utf-8") ? cuz i have the same problem
Hey,
thanks for the super awesome video.
I'm just about to sign up for the monthly The All-Access Membership. I have a question about hardware. Which notebook would you recommend as a pro? A MacBook or a Windows/Linux notebook?
Thank you
good course. where can i get the VMs used in this course like blue, blackpearl, dev, academy etc.
Kioptrix IP will not show up in the arp scan with the NAT config on both machines.
Other than that great tutorial, too bad it can't be followed
I'm running both Kali and Kioptrix as virtual machines, at the same time. In VirtualBox, you can make your own NAT network. In the network settings of each machine, make sure you have chosen "NAT network", then choose the NAT network you have just made. Doing this meant that the arp-scan in the Kali VM was able to see the IP of the Kioptrix VM.
Is anyone running into issues with sublist3r? Any suggestions on how to fix it? I got rid off the virustotal error but sublist3r does not give me any output.
Hey! might not get an answer, but nothing came up online so I've got nothing to lose since apparently my google skills are weak: around 2:43:00-2:44:00 you've spoken about 4444 as default being too obvious, any substitute works?
Tried looking for recommended ports, nothing came up, so just a random port is better?
Thank you sir ❤️
Most welcome
This is BRILLIANT! thank you so much for sharing
Awesome!
Went through everything..well except the buffer overflow manual method - that would probably need another 15 hrs alone :D
Otherwise managed to follow all the rooting walkthroughs successfully.
This is something I am VERY good at and will love to do as a job. If I was a consultant and was to have a business to do Ethical Hacking. How much would a small company pay for a 32-40 hours pen test or for what you did in these videos.
How I can get the dev machine?
Please help me it is not in the provided links.
Hi! I'm not using VM. I'm with Parrot OS directly installed on my laptop. Everything is going perfect but i can't install kioptrix. Is there any alternative to it?
Thanks again for those videos, just a quick question when you were using nessus and running those scan's, are you getting detected from the site administrator?
👋Thank you so much for such a greate course, I just finished the course and 100% I need more 🤟. Which course/s at TCM you recommend to start with?, any discounts if possible. Thank you so much again🙏.
Thanks a lot!!
what is that assessment notes program you use for taking notes? I love the organization
It's called cherrytree. Available on most OSes.
Why is the https not working when I try and go too the web address? http is working but not 443
woooo ROOTED MY FIRST MACHINE!! hahaha
Hey Health , after completing your practical ethical hacking . Do I receive a certificate ?
Hello, is this course is same one on the TCM academy? Or what is the difference between them
My favourite part fo the video 2:13:48
Amazing sir 👍
This course is awesome but i have a question. In all the course, each time we attack something, we already have the ip address of the target and we are in the same network. IRL we probably need to find the ip address of the target and even perhaps break into the network to use all the tools like nmap, msf... How can we do that ?
It's ethical hacking so it means that the victim gives you the consent so you are already in their network I guess
@@NnGgnT y but for exemple when you do red team u have to break into the network
@@theobdr599 If you know the hostname you can find the ip
@@theobdr599 But you can get easily the ip of an hostname
thanks so much Heath. Learned so much. please, when i did the pinging on kioptrix level 1, it returned "network is unrecheable". What could be the problrm please?
What application are you using for your notes? I am not sure if I caught that.
He introduces the note-taking software in the previous part
I believe he is using keepnote although there are better options
@tcmsecurityacademy
Thanks for a great video course, i have a question regarding the buffer overflow payload.
I dont understand the position of the payload. You put the pointer to JMP ESP in the EIP. So we jump to the ESP to execute the shellcode, but you position the shellcode after the EIP at a higher memoryaddress. When looking at the anatomy slide, is the lowest address on top or bottom? Please explain.
Nice video 👍🏾
Can I use c++ instead of python in this course??
Thank you too for the teaching us.😁
Nice Sir :D
do you recommend using a vm of windows or just use my host windows machine? i just don't know how risky it is and don't have enough ram to run 2 windows and kali at the same time? what do you think?
for context: 3:24:27 in the video the part of: downloading our material
How long should take every section, for a normal person, to grasp the most? How long is good/wise? Cause I realize that I forget a lot of things, cause too fast me.
Fuzzing script will not work if you have Python3. If you have issues with it crashing at 100 bytes, I suggest looking online for Python3 specific scripts. Here is one I found that may or may not work for my after I tweak it a little. It may work for you or you may find a better one. The important thing to know is that Python3 did not work with this script.
I have the same issue. Then I used another script and it's working.
@@anummalik7563 can you give the script that worked please ?
Uhhh which script ru referrin to?
indeed, was just testing and doesn't work, try this one:
#!/usr/bin/python3
import sys
import socket
from time import sleep
buffer = b"A" * 100
HOST = ''
PORT = 9999
while True:
try:
sock = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
sock.connect(('HOST, PORT))
payload = b'shitstorm /.:/' + buffer
sock.send(payload)
sock.close()
sleep(1)
buffer += b"A" * 100
except:
print("Fuzzing crash at %s bytes" % str(len(buffer)))
sys.exit()
When sending the payload convert the string to utf-8 with .encode('utf-8') like this:
payload = ("TRUN /.:/"+"buffer").encode('utf-8')
s.send(payload)
Thank you i learned a lot
from you
did he teach cryptography?
@@leysledge438 No this video was all about pen-testing but i really don't know if he has a tutorial for cryptography
Hi, thanks for your awesome tutorial. In fuzzing section of course when when execute 1.py script ,denied try part and just except part of script execute and return crashed at 100bytes.how i can resolve this?
The problem is in the python version, in python2 by default all the values are considered as bytes and in python 3 it is string.
Add the .encode('utf-8') in the send line and it should work (at least worked for me).
s.send(('TRUN /:./' + buffer).encode('utf-8'))
I am running into the same, have you found a solution? The comment below this one doesn't seem to open for me
@@GalaXYZe further in the video he explains it, but you need to change this line
s.send(('TRUN /:./' + buffer).encode('utf-8'))
python 2 uses bytes as default, but in python 3 the default is string, so you have to encode it.
In brazil the government and the police allow cybercrime since the hacker don't stole any money, but when they do nobody want the fault, so for cyber security it have been a very good country for cyber security to act because the population don't have lots of protection
Today I have completed this 15 hour ethical Hacking journey.
JazakAllah @heath Adams our mentor for this incredible course, you taught us very well. Looking forward to learn more new skills from you.
Hello,
I installed kioptrix, but i can't change the settings as it automatically send me a 'VMWare unrecoverable error" if the vm has not started.
I can run it , then access the settings, but can't change the Network to LAN as it is automacally in bridged and greyed when it is running.
Can anyone help?
run the xioptrix and from inside it in the up left you will see something called "player" click on it then mange and from manage virtual machine setting.
what software are you using at 2h10m?
Thanks for this. I really appreciate this information. However i have a question: how did you get the python script to print a string without parentheses, it keeps giving me errors and also i had to encode that trun string(i went online) before it could work. But im stuck at the offset(encoding isnt working and it doesn't connect)
Update: it took me 3 hrs to find a solution for the offset. It just had to put a "b" before the string quotes both for TRUN and the offset variable, then remove the forward slashes in the trun
So it was like:
Offset = b"AA0AA1AA2..."
s.send(b"TRUN ." + offset)
Those are the only things that needed to be changed. I hope it was helpful to whoever came across such problems
@The Cyber Mentor Can you explain 3:58:09 part please? I really cant understand
Which Linux version and desktop environment you are using?
when we do the spiking and the fuzzing one how would we know the exact "A" to send to the victim if we dont see the victims immunity debugger im kidda confusing anyone tell me how??
🙏🙏
have you found the answer? i am puzzled as well.
i also dont understand how did we get the original EIP or how did we know the server crashed during spikeing phase...
@@matesatacker nop bro still searching
Thank you...
You're welcome!
heath when i installed vulnserver in my windows 10 VMware the command:
nc -nv ip address 9999
Doesnt work it just says connection timed out i even turned off my fire wall in my victm windows machine and i have followed each and every step you have done in this course i am stuck at spiking part plz help me
Which software are you using?
Love you
you are the best best and the besttt
Nice 💯💯💯😎😎
Bro I am solving black pearl and dev room but I did not get my IP. I have Changed from bridge to Nat and vice verse try different commands but it does not show up how to solve it?