Simple Penetration Testing Tutorial for Beginners!

  Рет қаралды 648,453

Loi Liang Yang

Loi Liang Yang

Күн бұрын

Пікірлер: 391
@whatcatslove7479
@whatcatslove7479 2 жыл бұрын
I bought your cours. Its great !
@whatcatslove7479
@whatcatslove7479 2 жыл бұрын
*e
@abdulmuntasirmasum7914
@abdulmuntasirmasum7914 2 жыл бұрын
What is the link
@vikasrathi8256
@vikasrathi8256 2 жыл бұрын
Which website he uploaded the course...
@Y45H_is_Alive
@Y45H_is_Alive Жыл бұрын
Can i get video after buy this course?
@isasooner5
@isasooner5 Жыл бұрын
on kali linux on my VM workstation, on any of loi's videos, I cannot execute most of the commands, to get practice in these ethical hacking instructions
@Sasquatchbones
@Sasquatchbones Жыл бұрын
Been in a cyber security program for almost 6 months and you basically taught me more than all my instructors combined 🤦🏻‍♂️
@jawandapowell
@jawandapowell 11 ай бұрын
Facts they don’t teach nothing frfr
@eval_is_evil
@eval_is_evil 10 ай бұрын
Then your instructors really suck
@EarlZero0
@EarlZero0 8 ай бұрын
Then you don't focus on your lessons
@Stu81
@Stu81 7 ай бұрын
What cyber security course are you on? Most won't cover pentesting in any detail, they will cover it's purpose and objectives with some info on Kali and common areas of attack but nothing more, unless you are on an actual pentesting course.
@johnr39
@johnr39 Ай бұрын
Tell us what did he teach you🤡 he literally never explains anything! He simply gives commands without explaining anything
@ewncilo
@ewncilo 2 жыл бұрын
You are the treasure for any cybersecurity student, you are absolutely gold.
@nitefytercool1302
@nitefytercool1302 Жыл бұрын
yeah but he doesn't explain why he chooses the directories he wants to target he just chooses seemingly randomly
@isaacmihaeli3261
@isaacmihaeli3261 2 жыл бұрын
I am a programmer for a long time and moving to cyber security and it looks challenging. Well done tutorial.
@yamanarslanca8325
@yamanarslanca8325 Жыл бұрын
how was your experience so far, is it worth ?
@eval_is_evil
@eval_is_evil 10 ай бұрын
He didnt show anything useful.
@Godflay
@Godflay 2 жыл бұрын
this is literally the best video. sums up extremely well what i've been studying for the last few months in 15 minutes... for free!
@jesusdacoast872
@jesusdacoast872 2 жыл бұрын
You're right 😌
@chkharti3933
@chkharti3933 2 жыл бұрын
thresh is a penetration tester?!
@nhatduy9125
@nhatduy9125 2 жыл бұрын
Thresh is a hacker????
@saojimaou
@saojimaou 2 жыл бұрын
@@nhatduy9125 u mean hooker lol
@alexismedor6182
@alexismedor6182 Жыл бұрын
I feel like this just shows what I've been working on in a very quick and summed up way. Of course, if I was watching this before I'd started studying, I wouldn't understand jack shit. I'd be sitting here wondering why he was doing what he was doing and why it was working. Very nice video to show how a very basic pentest might go down
@davejackson88
@davejackson88 2 жыл бұрын
the passion for this sector has no limits... massive thanks Mr loi
@cuchitp
@cuchitp 2 жыл бұрын
Wow! I am an ex software engineer, now moving into the realm of hardware engineering, specifically into IoT. This complex subject is explained really well, with lucidity and clarity. Thank you Loi!
@antonpodolsky2273
@antonpodolsky2273 Жыл бұрын
You must have a very bad teacher, because he did not show anything. Linux, yeah, but behind a firewall. You need to get access to internal infra, after that the world is yours. Now try to get through DMZ.
@antonpodolsky2273
@antonpodolsky2273 Жыл бұрын
I just don't understand how he got through DMZ first, after that, it is fucking cake. We learned that in first quarter.
@cuchitp
@cuchitp Жыл бұрын
@@antonpodolsky2273 go play with your dolls fool. Who do you think you are.
@eval_is_evil
@eval_is_evil 10 ай бұрын
Wait you havent tackled this during your studies?!? Your engineering degree is crap then.
@miltonrosa9131
@miltonrosa9131 9 ай бұрын
I barely started getting into penetration testing and this linux video completely fried my brain loll
@jadersanctem
@jadersanctem 9 ай бұрын
Holy dang, that was wild to watch. You're quick and know your way around these things, that's amazing! (And scary)
@Abdulmalik-tu1uc
@Abdulmalik-tu1uc 2 жыл бұрын
The best short tutorial i’ve ever seen 👍🏻❤️
@Omni-knight
@Omni-knight Жыл бұрын
You're better than some of my cybersec professors.
@TheMeltzz
@TheMeltzz 2 жыл бұрын
What you explain about reverse shell make me understand in just a few minute, compare to what the lecturer have been teaching for the past few lessons ......
@johnyevugah8155
@johnyevugah8155 2 жыл бұрын
Thanks for making this, when i got ingame, the menyoo wouldn't load when i pressed F8, but now it works, thanks again!
@louisdiamond417
@louisdiamond417 4 ай бұрын
Thankyou for help.Gonna try pen testing for a liveing. 🙏
@mori-n5u
@mori-n5u 8 ай бұрын
I run a cyber security club at my University and I wanted to set this up as lab and was wondering if you had a tutorial on how to set it up
@flawlessong
@flawlessong 2 ай бұрын
he reminds me of network chuck lol. 2 Legendary professionals 👍
@petertemple3067
@petertemple3067 2 жыл бұрын
this is great mentor. I am learning from your videos everyday want to be like u
@epicdelvegaming1023
@epicdelvegaming1023 2 жыл бұрын
Wow I would love to learn from you all about hacking..... and your content is amazing it is absolutely fantastic keep it up...and most of all a big HUGE THANK YOU!!!!👌👌👌👌
@Kali9030
@Kali9030 7 ай бұрын
This is an eye-opening video for me, I am glad that I found it, great video.
@derrickkassen897
@derrickkassen897 2 жыл бұрын
Just JOINED - so excited to start this journey!!!
@devanshkanda9618
@devanshkanda9618 2 жыл бұрын
Loi sir 🙏🙏🙏 ❤️❤️ this is soo much informational video, as I'm stepping into cyber security domain , this really helped me to push my thought process while penetration testing, you are the best teacher and my mentor , please make more such videos we all love to see , how these bugs can lead to a more sophisticate level of exploit and post exploitation , and your valuable steps to be taken care of to protect the system , love from a future cybersecurity engineer ❤️❤️🙏🙏
@ricp
@ricp 3 ай бұрын
Do you have a video on how, you get organized, notes, prioritize, etc in a Pen test with multiple hosts? i.e. how do you get organized with what could seem like info overload? - Thanks, great video!
@abderrahimelayadi
@abderrahimelayadi 2 жыл бұрын
Thank You so Much sir Loi Liang Yang you are always doing great tutoriel on security, hacking, penetration testing , vulnerability
@shriramkp9292
@shriramkp9292 9 ай бұрын
Best video i watched till now in cybersecurity. great work
@aiPodcast19
@aiPodcast19 24 күн бұрын
thanks you , people will do a nmap video in 1 hour wtf . great job
@RomeoMark-b5w
@RomeoMark-b5w 10 ай бұрын
Amazing teacher. How do you remember all those commands?
@pwnge
@pwnge Жыл бұрын
THE CHANNEL I BEEN LOOKING FOR!!! Always was a PC gamer, now im grown and wanna move into a skill, and nothin seems cooler than bein red team. In the process of learning coding and OS linux with CS50 harvard course. not sure where to go after? maybe a road map for noobs???
@dharmendratelekom1263
@dharmendratelekom1263 2 жыл бұрын
Excellent Video Loi Liang Yang. I'm looking to expand my carrier into cybersecurity and with ethical hacking. However, I'm wondering would anyone be able to scan a network without actually be on that network in the first place. I'm puzzled how would this would work in an organization environment where you have to go pass domain logins before getting on the network. Do we assume that you will be provided the domain name credentials, before doing any ethical hacking stuff? I'm super new to this and confused, please can anyone help me understand this gap which I'm having Thanks in advance.
@jg5875
@jg5875 2 жыл бұрын
Usually there is a way to somewhat easily penetrate from the outside to get into the internal environment. Spearphising, default credentials or vulnerabilities on a public facing asset, etc. Once in, then credential theft, escalating privileges, etc, let you move laterally throughout the organization to get to sensitive assets and data.
@eval_is_evil
@eval_is_evil 10 ай бұрын
To me this tutorial makes no sense in a real world scenario.
@kayoutube690
@kayoutube690 2 жыл бұрын
wtf Loi you're such amazing hacker!!
@tamilbiographywebsite1952
@tamilbiographywebsite1952 2 жыл бұрын
Thanks for the lesson. Just brought soft soft
@arnhdgs
@arnhdgs Жыл бұрын
I’ve travelled pretty extensively and I’ve heard quite a few accents over the decades but I’ve never heard quite an accent like yours. Subscribing.
@codingworld7142
@codingworld7142 2 жыл бұрын
I am big FAN of yours because I love hacking and coding
@WillSanchez1129
@WillSanchez1129 Жыл бұрын
I am a brand new student. I have not launched anything yet. Got it all downloaded and ready to go. I want to know what should I do? I’m going to listen and binge watch all of your videos
@robertwilliams7969
@robertwilliams7969 2 жыл бұрын
New to your channel and love your teaching style and likes to know how one can become your apprentice without any tech learning?
@Godbless_Tech
@Godbless_Tech 6 ай бұрын
Thanks for this, my question is : Do you need to be connected to the target network? Or i can do this externally too with an external IP target
@adairlatiff7133
@adairlatiff7133 Жыл бұрын
This scan we can do in our internal network? Or in the internet? In other words, what I'm scanning exactly?
@Random3Mar2024
@Random3Mar2024 12 күн бұрын
Problem : - 3:41 doing pentest for my project analysis. In this part when i enter the domain into searching field it refuse to connect/open. I think it means this domain is already safe - 3:45 doing sudo also " 'sudo' is not recognized as an internal or external command,operable program or batch file" - 5:38 'dirb' is not recognized as an internal or external command operable program or batch file
@StiveSapanta
@StiveSapanta 7 ай бұрын
Idol I'm always inspired I watched you everyday you very genius I salute you idol that is my ambition tobecome expert with penetration testing idoñ
@seanriddicklundy5285
@seanriddicklundy5285 2 жыл бұрын
Thank you for the information! For the last few yrs I have been a toy to people! I watch a few videos of your after someone shut down my router shut me out of my phone and order a Uber ride ! I have never felt helpless!
@morioyaps
@morioyaps 2 жыл бұрын
No idea what hes talking about but watched the whole thing
@MidnightVentures
@MidnightVentures 2 жыл бұрын
lol
@mahmoudrouda8124
@mahmoudrouda8124 2 жыл бұрын
Roadmap for learning reverse engineering 🙏🙏❤️
@neovictorius
@neovictorius Ай бұрын
That one's easy. You need to REALLY understand x86 assembly first and to do that you need to understand computers to the core. A college course in computer architecture should suffice for that. But first you need to understand programming in general. Again a simple college course on programming is probably the easiest way to go here. After having taken those two courses, you would just need to learn how to use a relevant decompiler
@JonMurray
@JonMurray 2 ай бұрын
Thanks so much for making this video! It really helped visualising the things I’m learning about. Funny as well man hahah! Subscribed so I don’t get hacked ✌🏻
@cezarkhaloul1289
@cezarkhaloul1289 Жыл бұрын
This man is a legend
@cryproot9845
@cryproot9845 2 жыл бұрын
thansk very much Loi Liang ,i am learn with you
@alexdeo8869
@alexdeo8869 Жыл бұрын
Great video, i have one question before even scanning do you assume access to the organization network already to be able to see the scanned devices? I'm stuck and really want to understand this very first step before even scanning the network
@johnkbroderick
@johnkbroderick Жыл бұрын
Thanks for the video, very interesting stuff, You should make another vid to show how to protect yourself from this type of breach
@rhanditaher1468
@rhanditaher1468 6 ай бұрын
Thanks Mr. LOI for your efforts, but I have a question: you were root when you escalated privileges in the Linux server, why do you need to reconnect using SSH to another account? ??
@sterlinwright4173
@sterlinwright4173 2 жыл бұрын
I wish you would explain deeper for what you need for it like networks and what kind of routers and ect
@Gage95
@Gage95 Жыл бұрын
You sound like an AI generated Native Japanese Speaker who grew up in Australia and speaks with a stereotypical American accent. I love it, it's like ASMR to me and I most DEFINITELY be liking and following for more content!!! 👍🏻👍🏻👍🏻👍🏻
@francisbaldo8061
@francisbaldo8061 2 жыл бұрын
thank you sir you save us from our reporting
@ao4514
@ao4514 Жыл бұрын
Hello Loi, you lost me at 7:40 How did you set the targets ? Did you type out THE FOLOWING COMMANDS > set RHOSTS > set RPATH
@play-good
@play-good 2 жыл бұрын
3 Videos at once good job
@kalyanboro6338
@kalyanboro6338 2 жыл бұрын
Mr. Loi is the best!!!!!
@ishekamaturay4015
@ishekamaturay4015 2 жыл бұрын
What are the devices you recommend for a test like this?
@tamerajames5590
@tamerajames5590 2 жыл бұрын
Nmap, metasploit, wireshark, burpsuit & Nessus
@donkmartinez3473
@donkmartinez3473 9 ай бұрын
This was awesome to watch! Subbed!!
@travellingtrader3352
@travellingtrader3352 2 жыл бұрын
I am glad you made this video. Very helpful.
@JoseMaldonado-p7b
@JoseMaldonado-p7b 9 ай бұрын
That was great information thank you for the video
@UNITYINBELIEF
@UNITYINBELIEF 2 ай бұрын
I Feel Like This Beginner One is Harder Than Those Other Ones.
@sssapss
@sssapss 2 жыл бұрын
most of the people who working on protecting clouds they dont know how to do this, and all this is for free. thnx
@skorpyo331
@skorpyo331 Жыл бұрын
Most important first step: shielding yourself
@keithp7010
@keithp7010 2 жыл бұрын
Senor Loi, thank you for your awesome videos and educational content that go a long way in helping me pursue my career in ethical hacking. Quick question at time stamp 449 you show an "index of" the Apache website. How did you access it? It appears it is on its own page? You say Kali tool? Thank you again and keep creating great vids!
@josephekpaha
@josephekpaha 2 жыл бұрын
Are you running Kali virtually?
@josinjojy4268
@josinjojy4268 2 жыл бұрын
Sir can you please do advanced network penetration course, please a humble request for a subscriber
@nedzone1
@nedzone1 2 ай бұрын
hello hacker loi, so back to creating the cgi-bin folder, but ccreated a javascript/jquery folder (not exactly create), is that supposed to happen hacker loi?
@mpicuser
@mpicuser 2 жыл бұрын
As always very interesting video. Thanks!
@kristallmenschkristallwolf1969
@kristallmenschkristallwolf1969 Жыл бұрын
Hi from Germany also if i understud this right tha is already hacking the Security Pen Testing? My System my Port and Tools i am running?
@ndumisondumisoo2412
@ndumisondumisoo2412 2 жыл бұрын
Your inteernet is .....💥💥💥💥💥💥💥
@MasterITwithLagharii
@MasterITwithLagharii 2 жыл бұрын
Very complex
@itsm3dud39
@itsm3dud39 2 жыл бұрын
you didnt explain about the exploit-db script.why you took that particular script?
@skghostrider
@skghostrider 2 жыл бұрын
Your video is always best 😱
@JunLYeap
@JunLYeap 2 жыл бұрын
Sir you are my mentor!
@SouthernGIGI
@SouthernGIGI Жыл бұрын
Im confused. If you are on windows then you need to install nmap first. How would that help you if the program is not already installed on the device?
@vikasrathi8256
@vikasrathi8256 2 жыл бұрын
I am really interesting in hacking suggest me some book for beggnars...... Hope so you replied me......
@harishvanjari526
@harishvanjari526 7 ай бұрын
Wow that was a very valuable information
@pak_developer
@pak_developer 2 жыл бұрын
Sir i am your big fan can you teach ho to make protecting layer for system
@miragravat
@miragravat 2 жыл бұрын
Try looking into system hardening processes and tactics
@alyx3135
@alyx3135 2 жыл бұрын
Hi when using Nmap how long does it usually takes to show results, Does it depends on computer specs or what? Mine really took about 1-2 mins
@travisjg80
@travisjg80 2 жыл бұрын
It depends what you’re scanning and how; nmap is a powerful tool that can do a lot. Scanning a narrow range of ports is fast, as can be a simple scan of all ports. If you do a host range, it takes longer, and so does a detailed scan of a target. Mass scans are easily detected and nmap has options to do it slower to either reduce detection or to just not flood a target and get locked out by an app, firewall, etc. Computer specs don’t really matter as long as you’re not using an antique (take “antique” as you will; we’re talking about computers). Play with it (against yourself).
@alyx3135
@alyx3135 2 жыл бұрын
@@travisjg80 I see thank you for answering, I got good laptop so I dont thinks thats the issue.
@SimonRRFTP
@SimonRRFTP 2 жыл бұрын
@@travisjg80 Nice
@leeivorymariquit2195
@leeivorymariquit2195 2 жыл бұрын
You can also recover email add?
@HowwTech
@HowwTech 19 күн бұрын
hey please make a guide on termux also plz
@shanavas92
@shanavas92 Жыл бұрын
Do we have to use VPN before performing penetration test on Kali Linux?
@Asimpleyoutubechannel821
@Asimpleyoutubechannel821 2 жыл бұрын
What machine from vulnhub do you use?
@Adamn32
@Adamn32 Жыл бұрын
Wow. Great class
@toroddlnning6806
@toroddlnning6806 2 жыл бұрын
@Loi Liang Yang how would you protect yourself against such attacks. Would a 2fa device with physical interaction be sufficiant?
@MoveTrueRecords_
@MoveTrueRecords_ 2 жыл бұрын
Can you please make a video, on how to actually put those command options together. Thats my only issue and its frustrating. like how do you put them in a string i guess?? like nmap -s or nmap -sS or so on. But not just nmap i mean other tools as well Love your content by the way. Thank you
@lacouille5943
@lacouille5943 2 жыл бұрын
If you put a command in linux follow it by -h or --help and it'll give you the options. You can also do "man [command]"
@Diego-mq3ws
@Diego-mq3ws 2 жыл бұрын
you put those thing by reading documentation and experimenting indefinately
@befondofjohn
@befondofjohn 2 жыл бұрын
Also just to add to La Coullie, they are called command switches. And if you ever forget a switch but know a keyword like "port" for example and let's say you're using netcat, you can do: man netcat | grep "port" This will take the output of "man netcat" and search lines with that defined word. Often times the switch will be right there. Just a little trick so you don't have to search so much (does not work all the time)
@DhruvClaire
@DhruvClaire 2 жыл бұрын
which terminal are you using?
@alexramsey4618
@alexramsey4618 Жыл бұрын
Very well presented. Thank you
@jesusdacoast872
@jesusdacoast872 2 жыл бұрын
Great job 👍 😎
@lukelorenzo7940
@lukelorenzo7940 8 ай бұрын
cgi-bin/ is not showing. P.S I want/need to learn about network penetration to have more secure network. What training should I take sir?
@tonyweems271
@tonyweems271 6 ай бұрын
Do you have to learn to code to be good at this ?
@quinnlintott406
@quinnlintott406 2 ай бұрын
Whenever I try to enter a domain into a webbrowser (after using nmap) it doesnt connect. Any idea why?
@runsintunson9586
@runsintunson9586 4 ай бұрын
We found the voice of microsoft sam
@bolajibankole8079
@bolajibankole8079 Жыл бұрын
Nice approach
@certifiedmemer6000
@certifiedmemer6000 2 жыл бұрын
You are lucky my favourite nice tuto is nice tuto
@refinevalentine3206
@refinevalentine3206 2 жыл бұрын
Mr Hacker Loi, do you have a Udemy course?
@luizgustavomessias3680
@luizgustavomessias3680 2 жыл бұрын
Big fan, a course would be perfect
@Bandey747
@Bandey747 9 ай бұрын
Do you want to be promoted to an air conditioner
@jsatwal8261
@jsatwal8261 2 жыл бұрын
Make a series on oscp
@joaocipriani
@joaocipriani 2 жыл бұрын
But If we have a Trend running on linux, It could be easy anyway?
@RamonChiNangWong078
@RamonChiNangWong078 2 жыл бұрын
as a Linux user and a Generalist (who''s have to do everything myself) I have to say, GODDAMM. never though it was that easy to hack in a linux server
@bluesky8589
@bluesky8589 2 жыл бұрын
Hello, Are you available to chat offline about a special project?
@Alpha_zone84
@Alpha_zone84 Жыл бұрын
I have a question is it possible to hack the hacker I mean I have friend throwing a fit just in case what is the best possible way to stop him if he gains complete access. I am guessing he might try using software key loggers or something in any case I will not under estimate just seeking advise
@BoostedFA
@BoostedFA 7 ай бұрын
Loi is overpowered.
Simple Penetration Testing Tutorial for Beginners!
29:41
Loi Liang Yang
Рет қаралды 77 М.
Osman Kalyoncu Sonu Üzücü Saddest Videos Dream Engine 275 #shorts
00:29
Motorbike Smashes Into Porsche! 😱
00:15
Caters Clips
Рет қаралды 15 МЛН
Family Love #funny #sigma
00:16
CRAZY GREAPA
Рет қаралды 32 МЛН
Wait for the last one 🤣🤣 #shorts #minecraft
00:28
Cosmo Guy
Рет қаралды 23 МЛН
Kali Linux Tutorial For Beginners!
17:59
Loi Liang Yang
Рет қаралды 392 М.
Watch hackers break into the US power grid
15:51
Insider Tech
Рет қаралды 10 МЛН
do not open this file!
12:03
Loi Liang Yang
Рет қаралды 65 М.
FREE Cybersecurity Tool - Wazuh Tutorial for Beginners
36:10
Loi Liang Yang
Рет қаралды 17 М.
Why Cybersecurity Training is a SCAM
10:37
Technical Institute of America
Рет қаралды 221 М.
Hacking Bank from Hackthebox |  HTB Bank Walkthrough | Ethical Hacking
28:17
Watch me hack a Wordpress website..
28:52
Tech Raj
Рет қаралды 275 М.
how hackers hack any websites in minutes?!
23:17
Loi Liang Yang
Рет қаралды 234 М.
Tactics of Physical Pen Testers
44:17
freeCodeCamp Talks
Рет қаралды 911 М.
Osman Kalyoncu Sonu Üzücü Saddest Videos Dream Engine 275 #shorts
00:29