Metasploit For Beginners - How To Scan And Pwn A Computer | Learn From A Pro Hacker

  Рет қаралды 559,924

Loi Liang Yang

Loi Liang Yang

Күн бұрын

Пікірлер: 683
@comanmatei3210
@comanmatei3210 3 жыл бұрын
Found your courses today on Udemy! Thanks a lot! Imm very glad i Found you and i love the Way you explain everything
@LoiLiangYang
@LoiLiangYang 3 жыл бұрын
Fantastic! For those who are keen to join our community in Udemy to learn all about ethical hacking, click here! www.udemy.com/course/full-ethical-hacking-course/
@ashwinshetty2716
@ashwinshetty2716 3 жыл бұрын
Name of the course on Udemy so that I can take plz
@choudhary3334
@choudhary3334 3 жыл бұрын
@@LoiLiangYang hello sir will you suggest how I can start hacking. I am new in this field. Any guidance or prerequisite before start ????
@aakashpatwa4941
@aakashpatwa4941 3 жыл бұрын
@@LoiLiangYang A Front facing camera would be better.❤️ Amazing video 🔥🙏🏽
@075_mmshahriarshakil2
@075_mmshahriarshakil2 3 жыл бұрын
@@LoiLiangYang please give some course free giveaway on udemy
@indiegaming571
@indiegaming571 3 жыл бұрын
"i can zoom it a little more so is easier for you to see" A hacker with a smooth voice... Love it...
@x0rZ15t
@x0rZ15t 3 жыл бұрын
Protip. Instead of copy-pasting the path to module you'd like to use you can just use the corresponding number you get for your search results. Example: use 39
@aFynoX
@aFynoX 3 жыл бұрын
Sir If I attack my host windows 10 machine With this eternal blue attack will it cause errors and bsod in my machine plz reply sir
@aFynoX
@aFynoX 3 жыл бұрын
@@mrri8403 thnks But if I will use the same exploit used by loi sir Will my host develop bsod plz reply sir
@saft2529
@saft2529 2 жыл бұрын
@@aFynoX eternal blue exploit is made to be hidden, not a stupid mess of batch scripts that interrupt system processes
@quantumblurrr
@quantumblurrr 7 ай бұрын
Also you can just use smb_mb17_010, no need for containing directories
@smittywermen8418
@smittywermen8418 3 жыл бұрын
Wow! I’m taking an introductory cyber security class and always wondered how nmap and metasploit were used. This was awesome! Very informative!
@zasbirrahmanzayan8648
@zasbirrahmanzayan8648 2 жыл бұрын
broooo ur pfp matches your emotions *so deep*
@jadenewton366
@jadenewton366 3 жыл бұрын
Thank you! FIINALLY! a video that explains the process of going from open ports to selecting the right exploit to implement, I have used metasploit a few times now and had various levels of success but only on a few exploits . All the videos i have watched prior to this do not show the process of howand why you chose the exploit. Thank you that was clear and precise. exactly what i have been looking for
@7Andiego
@7Andiego 3 жыл бұрын
Ive been watching 5hour videos for a 10 min content. thank you so much
@Localhost_7100
@Localhost_7100 9 ай бұрын
The struggle is real😅
@pugboi8017
@pugboi8017 3 жыл бұрын
me 2 i got ur course last week. I’m also frm singapore and trying hard 2 break into cybersec but opportunities are lesser compared to software eng and its harder to self teach :( picking up any networking book already has so much jargon. Thanks for your course, i’m working through it as best as i can. His course is really good guys, if you think his open courseware is good, the one on udemy is even better!
@LoiLiangYang
@LoiLiangYang 3 жыл бұрын
Awesome! Feel free to post your questions in Udemy and our team will respond to you to help you learn better! Yes, lots of technical jargons in the tech and cybersecurity field which can take a long time to understand! Stay motivated and let us learn cybersecurity together!
@Fried-Tofu
@Fried-Tofu 3 жыл бұрын
Looking to eventually make a lateral move into pen-testing & ethical hacking. Using your video guides along with metasploit community guides/wikis has helped a ton. Thanks so much!
@buenology
@buenology Жыл бұрын
I just found you today 2/28/23, and I am a newbie at this. I wonder if this channel would be too much for me since I am new, or what you do recommend. I would love to learn more, and I like your style of teaching/training. Thank you!
@a24s44
@a24s44 10 ай бұрын
How is it so far
@shawndotb1332
@shawndotb1332 2 жыл бұрын
Completed my first lab exploit thanks to this video. Thanks!
@rajatc4911
@rajatc4911 3 жыл бұрын
Thank you for the video and very good explanations. It would be better if you can also add a part 2 of this video about the coutermeasures one should take to stop this particular attack. I think this will complete the learning !
@JanRautiainen
@JanRautiainen 3 жыл бұрын
Short and concise, found your channel by accident and glad I did. I have learnt some extra pieces of knowledge I have not found on other videos. Thanks for the good content and keep up the good work!
@YouGotOptions2
@YouGotOptions2 2 жыл бұрын
Word
@shalahagoopta694
@shalahagoopta694 2 жыл бұрын
Hi I have seen alot of videos on KZbin this actually one of the few who are legit and don't make it a setup thanks for the videos
@Mbro-dq2do
@Mbro-dq2do Жыл бұрын
ive watched so many on this topic. by far you're the best brother. thank you
@franksilval
@franksilval 2 жыл бұрын
I love the way you teach these. Better than my Security paper teacher...way better !!!!
@santonopoulou
@santonopoulou Жыл бұрын
Hey great video! Good showing of your thought process to using metasploit. Just so folks know you can also just enter the number of the exploit/tool/etc after use. You don't have to type the full name or path :)
@LoiLiangYang
@LoiLiangYang 3 жыл бұрын
Like, share and subscribe! :)
@mdlikhon2839
@mdlikhon2839 3 жыл бұрын
Sir ,,, How are you ???? Love you from Bangladesh 💜💜💜💜💖💖
@harshithmanish6089
@harshithmanish6089 3 жыл бұрын
sir many errors pls help
@whoizali
@whoizali 3 жыл бұрын
Thank u brother, I'm a student of cyber security, ur videos are insanely knowledgeable, much love ♥️
@Drusher10
@Drusher10 3 жыл бұрын
finally youtube has recommended me what i needed :D
@osamrx
@osamrx 3 жыл бұрын
sheeeeesh i hacked my self, i can do what ever i want. damn. Keep going man, u r amaizing
@davidlp3019
@davidlp3019 2 жыл бұрын
This is handy for my ethical hacking class. Thanks mate! I have a proctored exam for it tomorrow I'm gonna need it lol
@arunawasthi9873
@arunawasthi9873 3 жыл бұрын
Bro please make a video on persistent android hacking using document like pdf or image instead of apk. Thanks
@blackcoffee6923
@blackcoffee6923 3 жыл бұрын
Those type of hacks have been patched and only work on old phones Pdf = Instead of a windows payload make an android payload
@arunawasthi9873
@arunawasthi9873 3 жыл бұрын
@@blackcoffee6923 and how can I embed that payload in a pdf?
@Eddysstrangesituationplayers
@Eddysstrangesituationplayers 3 жыл бұрын
How do I get rid of ghost framework . I dont know alot about kali linux,, but my hackers chant it all the time...
@ailavedhsathvik3019
@ailavedhsathvik3019 3 жыл бұрын
@@blackcoffee6923 hi
@blackcoffee6923
@blackcoffee6923 3 жыл бұрын
@@ailavedhsathvik3019 hello
@thechewy213gmail
@thechewy213gmail 3 жыл бұрын
You are a great teacher! I do have a question though...when you say double tap to see your options for the payload, what are you actually doing? I've tried everything! Thank you again!
@keycontroller
@keycontroller 3 жыл бұрын
If you cant find 🤓TAB you should not even try running this 😂🤣🙄
@nugettynoob7838
@nugettynoob7838 3 жыл бұрын
@@keycontroller it could'a been one of those things where you know everything well in a subject and then that one basic thing you forget.. no need to shame him at all really
@lowkeysolo
@lowkeysolo 3 жыл бұрын
@@nugettynoob7838 exactly thank you . finally someone
@alexanderschmitt4694
@alexanderschmitt4694 2 жыл бұрын
@@nugettynoob7838 if keycontroller had a single braincell he wouldve realized Daniel Mardis isnt a native speaker, so he confused TAB with TAP which is the same pronunciation for both. Yikes
@abhishek.rathore
@abhishek.rathore 2 жыл бұрын
Its not double tap its double TAB.. I got confused there too
@shocker9434
@shocker9434 3 жыл бұрын
i appreciate this video please convert it into series
@its_code
@its_code 3 жыл бұрын
Unbelievable video WOW 😲. I Love 💕 this video. Without touching Target machine it's Hacked the target system. Love 💕 you Sir. Love 💕 from Pakistan.
@edgejoel1971
@edgejoel1971 2 жыл бұрын
You have a wonderful and quick way of teaching. Thank you so much... I will be watching all I can from your.
@omeshhedaoo2775
@omeshhedaoo2775 2 ай бұрын
Truly a simplistic and excellent approach of teaching ❤
@ashwinshetty2716
@ashwinshetty2716 3 жыл бұрын
Lots of Love from India brother, u r 🔥🔥🔥plz plz make the video for the Android also.
@The-Dev-Ninja
@The-Dev-Ninja 3 жыл бұрын
use andronix, dowload linux, then do the tutorial (you need keyboard and mouse)
@tatanexonevmax4050
@tatanexonevmax4050 3 жыл бұрын
Y u want to hack ur any girls phone😂😂😂
@TekHck
@TekHck 3 жыл бұрын
youtube suspended my previous account for uploading this kind of video. but this guy's videos are still untouched. i dont get it..
@k0vacs527
@k0vacs527 2 жыл бұрын
@@TekHck because he stresses that it's for educational purposes only and clearly states that he isn't responsible or condones illegal activity. It also helps that he is verified and a big KZbinr who has actually has cybersecurity degrees and certificates
@X-razcal-X
@X-razcal-X 2 жыл бұрын
The Content i was searching for to get into CS . Thank you 🙏
@Uncle_Buzz
@Uncle_Buzz 9 ай бұрын
This is all great, if you have access inside someone's network. Nobody ever addresses getting in from outside, through public IP. Seems like that's where vulnerability matters more.
@SkreenGG
@SkreenGG 2 жыл бұрын
Wow, this was great! I love your very clear instructions, and the pace of the video.
@PreparationH1N
@PreparationH1N Жыл бұрын
Great tutorial man! Just a helpful hint instead of copying and pasting the exploit you can use the number associated with the exploit for instance instead of "use auxiliary/smb/smb_ms17_010" you can do "use 41" Hope that helps!
@jayrayizzle9586
@jayrayizzle9586 3 жыл бұрын
you just helped me so much on my homework, you have no idea! thank you so much for your informational videos!
@mrguy3029
@mrguy3029 Жыл бұрын
I love this channel for legal reasons
@assassingaming7102
@assassingaming7102 3 жыл бұрын
Hey bro. Can u pls explain how to gain access to the computers which are not connected on the same network pls. And also pls teach us how to properly do port forwarding bro. Really really a great video bro. Been following u for a very long time and u are the best bro❤️❤️
@laizz-6566
@laizz-6566 3 жыл бұрын
it would literally just not be a local ip
@kiocode
@kiocode 3 жыл бұрын
Bro ip of host and open ports
@assassingaming7102
@assassingaming7102 3 жыл бұрын
@@kiocode can u explain a bit more bro?
@atikattar1104
@atikattar1104 3 жыл бұрын
hello sir. i am actually new to this but i have a question (it might sound silly, sorry) but, "can we gain access to windows computer or any other computer or device (like android, ios, etc.) which is not connected to any network? by using external triggering method which can make device discoverable (e.g. - which can turn on bluetooth or wifi or turn on usb debugging in android phone) if there's any triggering method?" thanks.
@sarcophiIus
@sarcophiIus 3 жыл бұрын
Do you know where I can find his background? It looks so cool
@stollenjack6699
@stollenjack6699 3 жыл бұрын
Thanks you are best teacher
@CocoNutz_IV
@CocoNutz_IV 3 жыл бұрын
Man, you are such a great teacher. You have a new follower. Thumbs up.
@smishra9801
@smishra9801 3 жыл бұрын
What if Windows Defender will block this incoming attack.....!! Sir, please make a video on eternal- blue double pulsar.. And also make tutorial on Windows 10 privileged escalation with bypass AV(defender)🙏🙏 thanks Love your videos🙏
@xen0monster524
@xen0monster524 3 жыл бұрын
For bypassing AV’s try to use an encoder or an evasion
@smishra9801
@smishra9801 3 жыл бұрын
@@xen0monster524 what about veil!!??
@hondaromio
@hondaromio 3 жыл бұрын
Real life Mr. Robot, Thank you for your wisdom!
@kailash_yt147
@kailash_yt147 Жыл бұрын
superb eposide sir. finally learned to exploit the vulnerability
@sammedbanu8962
@sammedbanu8962 3 жыл бұрын
could you upload videos related to web application penetration testing and bug bounty please mr.loi
@awakeus8080
@awakeus8080 3 жыл бұрын
Best tutorial on KZbin
@drownedsnowmjweni
@drownedsnowmjweni 3 жыл бұрын
Love how straightforward he is
@azizkouiki
@azizkouiki 3 жыл бұрын
how do you know which vulnrebility option to choose in order to check wether its gonna vulnerable or not.
@DarkMeyer777
@DarkMeyer777 Жыл бұрын
It's more of trial and error based on intuition....
@PaeNomo
@PaeNomo 2 ай бұрын
Basically check vulnerabilities on open ports
@azizkouiki
@azizkouiki 2 ай бұрын
@@PaeNomo Hahhahaah Thanks mate
@cyberthunder1012
@cyberthunder1012 3 жыл бұрын
thanks u so much Loi Liang Yang
@defyteryt2452
@defyteryt2452 3 жыл бұрын
i love your vedios . keep it up BIG fan
@Kurbante
@Kurbante 3 жыл бұрын
Thank you! im gonna tell my friends all the services they have open!
@anonymoushacker2860
@anonymoushacker2860 3 жыл бұрын
Thats very appreate man thats good and I have small suggestion please try to hack Mac os latest version
@sherozali3498
@sherozali3498 3 жыл бұрын
It's not easy
@jorgeluiscontrerac
@jorgeluiscontrerac Жыл бұрын
bro used wannacry style exploits to hack on a pc. what a legend🎉
@AfroDanceWithZeAmazingBreezy
@AfroDanceWithZeAmazingBreezy 3 жыл бұрын
🙌🙌🙌🙌🙌🙌 Another great video from my fav Ethical Hacking KZbinr keep the videos coming. I wish to buy you a beer or coffee and discuss for real 😭
@propolipropoli
@propolipropoli 10 ай бұрын
Very helpfull video ,please do more on this topic , and compliment for your channel
@ahsannaqvi2012
@ahsannaqvi2012 2 ай бұрын
Really Helped A lot ❤❤
@messaoudpolitique9208
@messaoudpolitique9208 6 ай бұрын
easy simple to understand thank you Sir
@TheHardikupadhyay87
@TheHardikupadhyay87 5 күн бұрын
which ip to use when using the remote computer ? the one in video is ur local pc which is connected in same lan. also sa.e wuesrion for webgoat video
@danielluigi139
@danielluigi139 3 жыл бұрын
Really easy learn whith you.... Thank's..... Have' learn a lot. You the best
@AjarnSpencer
@AjarnSpencer 11 ай бұрын
Do you find it a good idea to have wireshark running to watch in and outgoing requests for suspicious activity?
@epheseoule268
@epheseoule268 2 жыл бұрын
I got a virtual machine like you and I want to penetrate the physical machine but whatever I did even if I changed nat to bridged and "sudo ufw enable" all the firewall open I got wrong : I will try to follow the same process like you to 1 : scan 2 : search exploit 3 : set the payload and exploit
@am030001
@am030001 3 жыл бұрын
Very well, when try to do the scan over my windows machine msfconsole says An SMB login error occurred while connecting to the IPC$ tree. How can I bypass that?
@cirklare
@cirklare 2 жыл бұрын
There is a PowerShell script you can run on your Windows machine to make sure that eternal-blue can hack it or not I will upload the script to my github page and overview the eternal-blue vulnerability and exploit it in video I'm making cyber security tutorials Please check them out
@tariqbinbashar1180
@tariqbinbashar1180 2 жыл бұрын
I love you so much bro, basically, I love your teaching attitude.
@johnnobody3628
@johnnobody3628 2 жыл бұрын
Short and to the point. Nice vid!
@ThatGuy-rz6tv
@ThatGuy-rz6tv 14 күн бұрын
Can this same method also work against other Kali machines?
@robinsaifullah6692
@robinsaifullah6692 3 жыл бұрын
ur explanation is very clear and documented.thank you so much sir.
@mamadoumalalbalde8590
@mamadoumalalbalde8590 3 жыл бұрын
Thanks again for sharing your knowledge with us I continue to support this channel
@suhastata2858
@suhastata2858 3 жыл бұрын
How do we find remote pc information? Also I tried by different method but I was unable to go further as all firewalls were blocking. I'll try this one.
@abulkalam7729
@abulkalam7729 3 жыл бұрын
I love your videos, and been watching it for pretty long.. can u just explain bit more like softwares, or like what ur using? Step by step? since most of us are really a beginner..thanks.. overall ur amazing 🔥
@macbook6507
@macbook6507 3 жыл бұрын
Thank you sir for your educative tutorials we are really grateful❤️
@Myst876
@Myst876 7 ай бұрын
do you need to create a payload for using nmap i just want to check also my vulnerabilities to secure and also the password cracking for security purposes only
@saurrav3801
@saurrav3801 3 жыл бұрын
Sir your videos are awesome....sir how to evade firewall of windows 7...when we tick block all incoming connections, including those in the list of allowed programs
@franksilval
@franksilval 2 жыл бұрын
This is scary amazing !!!..Thank you !!!
@anilv9788
@anilv9788 3 жыл бұрын
perfectly explained... can we use Metasploit to see my windows desktop
@cybrogs643
@cybrogs643 3 жыл бұрын
Sir make a video for begginers from where should we start learning hacking
@AlexAntony4737
@AlexAntony4737 3 жыл бұрын
Sir I love ur tutorials it is helpful for me thku sir
@GghHfgGfFDg
@GghHfgGfFDg 3 жыл бұрын
thank you for teaching us new hacking skills.
@bertrandfossung1216
@bertrandfossung1216 3 жыл бұрын
Thank you very much sir. You’re a blessing to us beginner cyber security students. Please can you make a course on Ethical Hacking with Python and/Google hacking methodology? I’ll highly appreciate it.
@daanishsaifi4825
@daanishsaifi4825 9 ай бұрын
Thank you so much Loi, just a little issue I have, when I enter "exploit" it's showing me Rex::Connection Timeout: The connection with (x.x.x.x) timed out..
@omarjee4397
@omarjee4397 3 жыл бұрын
Your video is amazing. However, this is the first time I understand something properly. The rest of the time I couldn’t as your videos are mostly for advance students. Could you please make a video and upload for how to install HFish honeypot and then attack on it from other device to check if it is working or not?
@amirmohamed8748
@amirmohamed8748 3 жыл бұрын
Very interesting . Which exploit or auxilary to choose is the hardest think to do . It's more clear now . Can u plz explain other exploits and auxiliaries and their importance !! Thx a lot .
@antimatter6728
@antimatter6728 3 жыл бұрын
As far as i know exploit is used when you already know about the services the target used...auxiliary is when you want more info about the services like ou want to know specific version of the service
@amirmohamed8748
@amirmohamed8748 3 жыл бұрын
@@antimatter6728 thank you for the info . Really appreciate it .
@MotionInMotion1975
@MotionInMotion1975 Жыл бұрын
I will boy your udemy courses today. Ive a question, is it better to run these tools on a VM instead of the daily use computer?
@professionalhub1496
@professionalhub1496 3 жыл бұрын
What will be your advice if I want to master all the command and which step will you advice me to start with as a beginner
@antimatter6728
@antimatter6728 3 жыл бұрын
As a beginner myself...start using linux and play ctf from hackthebox or tryhackme website
@himelsarkar137
@himelsarkar137 3 жыл бұрын
I think this will help us to prevent ransomware from pc
@NardusVanStaden
@NardusVanStaden Жыл бұрын
Thanks for teaching
@SuperTommyjohn
@SuperTommyjohn 2 жыл бұрын
THIS GUY IS AWSOME
@dragona.jarpitjain7264
@dragona.jarpitjain7264 Жыл бұрын
Sir i hava a question that how you determine in nmap scan that smb ir running *please tell me*
@zullakai9274
@zullakai9274 Жыл бұрын
great explanation. i tried to copy the step one by one and at the auxiliary i found one error after run. it say an smb login error occurred while connecting to the ipc tree. can you sugggest me solution to this problem
@jorgepulido333
@jorgepulido333 2 жыл бұрын
so at this time you should be using proxy change to anonymize your self right?
@PawsGigglesCN
@PawsGigglesCN 2 жыл бұрын
thanks sir for the details need more support on udemy
@tehyanyang6959
@tehyanyang6959 29 күн бұрын
is this considered a trojan and backdoor attempt?
@nikitapolikarpov5022
@nikitapolikarpov5022 19 күн бұрын
is my computer should be in the same network?
@ali_T-
@ali_T- 2 жыл бұрын
I love his videos. I really learned a lot. But the screen shot took at 8:46pm . If you see the screenshot picture the time is 5:46pm. I think he changed the time maybe but anyone can explain?
@fifonoon
@fifonoon 3 жыл бұрын
Hello Mr. Yang I hope you doing good. Could you post a video about how to decrypt an NTLM hash. Thank you for the useful content, and the great explanation.
@yamarachido
@yamarachido 3 жыл бұрын
very good Explanation 1000 thanks i love you
@tzcommunity8799
@tzcommunity8799 3 жыл бұрын
how can i find and scan vulnerability of any computer connected on the same network in order to hack it ? because i have seen many tutorial use windows vmare
@antimatter6728
@antimatter6728 3 жыл бұрын
Use nmap to scan target open ports
@abigaellapid97
@abigaellapid97 Жыл бұрын
how do you determine which one in the "show options" you are going to use (e.g., RHOST, RPORT, LPORT)? Do you also limit your choices to the ones with "Yes" in the "required" column only?
@chaitu007
@chaitu007 3 жыл бұрын
It is only works on local network?
@mysticallife7177
@mysticallife7177 3 жыл бұрын
Scary stuff bro.. but great info - peace ✌️ love it
@TheLinuxAdmin88
@TheLinuxAdmin88 3 жыл бұрын
Nice one bro your way in explaining is so simple
@MajikCatSecurity
@MajikCatSecurity 4 ай бұрын
What if all ports scanned are filtered? How do you work past that to actually find a vulnerable port?
@greatness137
@greatness137 3 жыл бұрын
Love you man love from africa
NMAP Tutorial for Beginners! Network Attacks
15:51
Loi Liang Yang
Рет қаралды 119 М.
Simple Penetration Testing Tutorial for Beginners!
15:25
Loi Liang Yang
Рет қаралды 661 М.
How Many Balloons To Make A Store Fly?
00:22
MrBeast
Рет қаралды 152 МЛН
А я думаю что за звук такой знакомый? 😂😂😂
00:15
Денис Кукояка
Рет қаралды 4,8 МЛН
Nmap Tutorial to find Network Vulnerabilities
17:09
NetworkChuck
Рет қаралды 2,8 МЛН
Access Location, Camera  & Mic of any Device 🌎🎤📍📷
15:48
zSecurity
Рет қаралды 2,6 МЛН
Simple Penetration Testing Tutorial for Beginners!
13:08
Loi Liang Yang
Рет қаралды 51 М.
METASPLOIT - HOW TO SCAN AND EXPLOIT A TARGET
12:13
Guyo Wario
Рет қаралды 10 М.
Dangerous Hacking Gadgets in 2024 #hacker #tools
11:20
Hacker Joe
Рет қаралды 682 М.
Metasploit For Beginners - #1 - The Basics - Modules, Exploits & Payloads
22:59
how hackers hack any website in 8 minutes 6 seconds?!
8:06
Loi Liang Yang
Рет қаралды 114 М.
find social media accounts with Sherlock (in 5 MIN)
5:01
NetworkChuck
Рет қаралды 4,5 МЛН
How Many Balloons To Make A Store Fly?
00:22
MrBeast
Рет қаралды 152 МЛН