Found your courses today on Udemy! Thanks a lot! Imm very glad i Found you and i love the Way you explain everything
@LoiLiangYang3 жыл бұрын
Fantastic! For those who are keen to join our community in Udemy to learn all about ethical hacking, click here! www.udemy.com/course/full-ethical-hacking-course/
@ashwinshetty27163 жыл бұрын
Name of the course on Udemy so that I can take plz
@choudhary33343 жыл бұрын
@@LoiLiangYang hello sir will you suggest how I can start hacking. I am new in this field. Any guidance or prerequisite before start ????
@aakashpatwa49413 жыл бұрын
@@LoiLiangYang A Front facing camera would be better.❤️ Amazing video 🔥🙏🏽
@075_mmshahriarshakil23 жыл бұрын
@@LoiLiangYang please give some course free giveaway on udemy
@indiegaming5713 жыл бұрын
"i can zoom it a little more so is easier for you to see" A hacker with a smooth voice... Love it...
@smittywermen84183 жыл бұрын
Wow! I’m taking an introductory cyber security class and always wondered how nmap and metasploit were used. This was awesome! Very informative!
@zasbirrahmanzayan86482 жыл бұрын
broooo ur pfp matches your emotions *so deep*
@x0rZ15t3 жыл бұрын
Protip. Instead of copy-pasting the path to module you'd like to use you can just use the corresponding number you get for your search results. Example: use 39
@aFynoX3 жыл бұрын
Sir If I attack my host windows 10 machine With this eternal blue attack will it cause errors and bsod in my machine plz reply sir
@aFynoX3 жыл бұрын
@@mrri8403 thnks But if I will use the same exploit used by loi sir Will my host develop bsod plz reply sir
@saft25292 жыл бұрын
@@aFynoX eternal blue exploit is made to be hidden, not a stupid mess of batch scripts that interrupt system processes
@quantumblurrr6 ай бұрын
Also you can just use smb_mb17_010, no need for containing directories
@jadenewton3663 жыл бұрын
Thank you! FIINALLY! a video that explains the process of going from open ports to selecting the right exploit to implement, I have used metasploit a few times now and had various levels of success but only on a few exploits . All the videos i have watched prior to this do not show the process of howand why you chose the exploit. Thank you that was clear and precise. exactly what i have been looking for
@7Andiego3 жыл бұрын
Ive been watching 5hour videos for a 10 min content. thank you so much
@Localhost_71008 ай бұрын
The struggle is real😅
@pugboi80173 жыл бұрын
me 2 i got ur course last week. I’m also frm singapore and trying hard 2 break into cybersec but opportunities are lesser compared to software eng and its harder to self teach :( picking up any networking book already has so much jargon. Thanks for your course, i’m working through it as best as i can. His course is really good guys, if you think his open courseware is good, the one on udemy is even better!
@LoiLiangYang3 жыл бұрын
Awesome! Feel free to post your questions in Udemy and our team will respond to you to help you learn better! Yes, lots of technical jargons in the tech and cybersecurity field which can take a long time to understand! Stay motivated and let us learn cybersecurity together!
@Fried-Tofu2 жыл бұрын
Looking to eventually make a lateral move into pen-testing & ethical hacking. Using your video guides along with metasploit community guides/wikis has helped a ton. Thanks so much!
@buenology Жыл бұрын
I just found you today 2/28/23, and I am a newbie at this. I wonder if this channel would be too much for me since I am new, or what you do recommend. I would love to learn more, and I like your style of teaching/training. Thank you!
@a24s449 ай бұрын
How is it so far
@omeshhedaoo27752 ай бұрын
Truly a simplistic and excellent approach of teaching ❤
@Mbro-dq2do Жыл бұрын
ive watched so many on this topic. by far you're the best brother. thank you
@rajatc49113 жыл бұрын
Thank you for the video and very good explanations. It would be better if you can also add a part 2 of this video about the coutermeasures one should take to stop this particular attack. I think this will complete the learning !
@atikattar11043 жыл бұрын
hello sir. i am actually new to this but i have a question (it might sound silly, sorry) but, "can we gain access to windows computer or any other computer or device (like android, ios, etc.) which is not connected to any network? by using external triggering method which can make device discoverable (e.g. - which can turn on bluetooth or wifi or turn on usb debugging in android phone) if there's any triggering method?" thanks.
@shawndotb13322 жыл бұрын
Completed my first lab exploit thanks to this video. Thanks!
@JanRautiainen3 жыл бұрын
Short and concise, found your channel by accident and glad I did. I have learnt some extra pieces of knowledge I have not found on other videos. Thanks for the good content and keep up the good work!
@toddmaek54362 жыл бұрын
Word
@thechewy213gmail3 жыл бұрын
You are a great teacher! I do have a question though...when you say double tap to see your options for the payload, what are you actually doing? I've tried everything! Thank you again!
@keycontroller3 жыл бұрын
If you cant find 🤓TAB you should not even try running this 😂🤣🙄
@nugettynoob78383 жыл бұрын
@@keycontroller it could'a been one of those things where you know everything well in a subject and then that one basic thing you forget.. no need to shame him at all really
@lowkeysolo3 жыл бұрын
@@nugettynoob7838 exactly thank you . finally someone
@alexanderschmitt46942 жыл бұрын
@@nugettynoob7838 if keycontroller had a single braincell he wouldve realized Daniel Mardis isnt a native speaker, so he confused TAB with TAP which is the same pronunciation for both. Yikes
@abhishek.rathore2 жыл бұрын
Its not double tap its double TAB.. I got confused there too
@franksilval2 жыл бұрын
I love the way you teach these. Better than my Security paper teacher...way better !!!!
@Drusher103 жыл бұрын
finally youtube has recommended me what i needed :D
@edgejoel19712 жыл бұрын
You have a wonderful and quick way of teaching. Thank you so much... I will be watching all I can from your.
@ashwinshetty27163 жыл бұрын
Lots of Love from India brother, u r 🔥🔥🔥plz plz make the video for the Android also.
@The-Dev-Ninja3 жыл бұрын
use andronix, dowload linux, then do the tutorial (you need keyboard and mouse)
@tatanexonevmax40503 жыл бұрын
Y u want to hack ur any girls phone😂😂😂
@TekHck3 жыл бұрын
youtube suspended my previous account for uploading this kind of video. but this guy's videos are still untouched. i dont get it..
@k0vacs5272 жыл бұрын
@@TekHck because he stresses that it's for educational purposes only and clearly states that he isn't responsible or condones illegal activity. It also helps that he is verified and a big KZbinr who has actually has cybersecurity degrees and certificates
@tehyanyang69596 күн бұрын
is this considered a trojan and backdoor attempt?
@mrguy302911 ай бұрын
I love this channel for legal reasons
@Myst8766 ай бұрын
do you need to create a payload for using nmap i just want to check also my vulnerabilities to secure and also the password cracking for security purposes only
@shocker94343 жыл бұрын
i appreciate this video please convert it into series
@X-razcal-X Жыл бұрын
The Content i was searching for to get into CS . Thank you 🙏
@SkreenGG2 жыл бұрын
Wow, this was great! I love your very clear instructions, and the pace of the video.
@johnnymann143 жыл бұрын
I have an question about the udemy coruse what does it teach you abt ethical hacking? because i wanted to buy it.
@davidlp30192 жыл бұрын
This is handy for my ethical hacking class. Thanks mate! I have a proctored exam for it tomorrow I'm gonna need it lol
@AjarnSpencer10 ай бұрын
Do you find it a good idea to have wireshark running to watch in and outgoing requests for suspicious activity?
@MotionInMotion1975 Жыл бұрын
I will boy your udemy courses today. Ive a question, is it better to run these tools on a VM instead of the daily use computer?
@shalahagoopta6942 жыл бұрын
Hi I have seen alot of videos on KZbin this actually one of the few who are legit and don't make it a setup thanks for the videos
@its_code3 жыл бұрын
Unbelievable video WOW 😲. I Love 💕 this video. Without touching Target machine it's Hacked the target system. Love 💕 you Sir. Love 💕 from Pakistan.
@santonopoulou Жыл бұрын
Hey great video! Good showing of your thought process to using metasploit. Just so folks know you can also just enter the number of the exploit/tool/etc after use. You don't have to type the full name or path :)
@Uncle_Buzz8 ай бұрын
This is all great, if you have access inside someone's network. Nobody ever addresses getting in from outside, through public IP. Seems like that's where vulnerability matters more.
@assassingaming71023 жыл бұрын
Hey bro. Can u pls explain how to gain access to the computers which are not connected on the same network pls. And also pls teach us how to properly do port forwarding bro. Really really a great video bro. Been following u for a very long time and u are the best bro❤️❤️
@laizz-65663 жыл бұрын
it would literally just not be a local ip
@kiocode3 жыл бұрын
Bro ip of host and open ports
@assassingaming71023 жыл бұрын
@@kiocode can u explain a bit more bro?
@PreparationH1N Жыл бұрын
Great tutorial man! Just a helpful hint instead of copying and pasting the exploit you can use the number associated with the exploit for instance instead of "use auxiliary/smb/smb_ms17_010" you can do "use 41" Hope that helps!
@sammedbanu89623 жыл бұрын
could you upload videos related to web application penetration testing and bug bounty please mr.loi
@chaitu0073 жыл бұрын
It is only works on local network?
@CocoNutz_IV3 жыл бұрын
Man, you are such a great teacher. You have a new follower. Thumbs up.
@jorgepulido3332 жыл бұрын
so at this time you should be using proxy change to anonymize your self right?
@ashrafalameldin7173 Жыл бұрын
Can i use zorin os for ethical hacking? Or i must install kali?
@stollenjack66993 жыл бұрын
Thanks you are best teacher
@ryangamerguruji75003 жыл бұрын
Do you use kali os in virtual box or windows 10in virtual box
@dragona.jarpitjain7264 Жыл бұрын
Sir i hava a question that how you determine in nmap scan that smb ir running *please tell me*
@arunawasthi98733 жыл бұрын
Bro please make a video on persistent android hacking using document like pdf or image instead of apk. Thanks
@blackcoffee69233 жыл бұрын
Those type of hacks have been patched and only work on old phones Pdf = Instead of a windows payload make an android payload
@arunawasthi98733 жыл бұрын
@@blackcoffee6923 and how can I embed that payload in a pdf?
@Eddysstrangesituationplayers3 жыл бұрын
How do I get rid of ghost framework . I dont know alot about kali linux,, but my hackers chant it all the time...
@ailavedhsathvik30193 жыл бұрын
@@blackcoffee6923 hi
@blackcoffee69233 жыл бұрын
@@ailavedhsathvik3019 hello
@LoiLiangYang3 жыл бұрын
Like, share and subscribe! :)
@mdlikhon28393 жыл бұрын
Sir ,,, How are you ???? Love you from Bangladesh 💜💜💜💜💖💖
@harshithmanish60893 жыл бұрын
sir many errors pls help
@zullakai9274 Жыл бұрын
great explanation. i tried to copy the step one by one and at the auxiliary i found one error after run. it say an smb login error occurred while connecting to the ipc tree. can you sugggest me solution to this problem
@jsp47862 жыл бұрын
when you type ipconfig on cmd does it give you someones actual info or pregenerated
@sarcophiIus3 жыл бұрын
Do you know where I can find his background? It looks so cool
@naturalsoundlab43073 жыл бұрын
Do i have to use ngrok or somthing like that to do this on outside my network?
@azizkouiki3 жыл бұрын
how do you know which vulnrebility option to choose in order to check wether its gonna vulnerable or not.
@DarkMeyer777 Жыл бұрын
It's more of trial and error based on intuition....
@PaeNomoАй бұрын
Basically check vulnerabilities on open ports
@azizkouikiАй бұрын
@@PaeNomo Hahhahaah Thanks mate
@epheseoule2682 жыл бұрын
I got a virtual machine like you and I want to penetrate the physical machine but whatever I did even if I changed nat to bridged and "sudo ufw enable" all the firewall open I got wrong : I will try to follow the same process like you to 1 : scan 2 : search exploit 3 : set the payload and exploit
@daanishsaifi48258 ай бұрын
Thank you so much Loi, just a little issue I have, when I enter "exploit" it's showing me Rex::Connection Timeout: The connection with (x.x.x.x) timed out..
@anilv97883 жыл бұрын
perfectly explained... can we use Metasploit to see my windows desktop
@johnnobody36282 жыл бұрын
Short and to the point. Nice vid!
@jayrayizzle95863 жыл бұрын
you just helped me so much on my homework, you have no idea! thank you so much for your informational videos!
@suhastata28583 жыл бұрын
How do we find remote pc information? Also I tried by different method but I was unable to go further as all firewalls were blocking. I'll try this one.
@mdnazmulhasannaim24863 жыл бұрын
can i do it over internet.. or wan
@abdullahmuhsin73393 жыл бұрын
Hasdump or Smart hash dump which 1 should I use?
@anonymoushacker28603 жыл бұрын
Thats very appreate man thats good and I have small suggestion please try to hack Mac os latest version
@sherozali34983 жыл бұрын
It's not easy
@staterstat3 жыл бұрын
Is this only possible by having the targets local ip or will a normal ip work?
@pelegkislasi87234 ай бұрын
Does this also work with smbv2?
@laurinlechner76483 жыл бұрын
What Programm do you use
@kailash_yt147 Жыл бұрын
superb eposide sir. finally learned to exploit the vulnerability
@awakeus80803 жыл бұрын
Best tutorial on KZbin
@konfarris8486 Жыл бұрын
Does this work if the target is connected to a different network
@ahsannaqvi2012Ай бұрын
Really Helped A lot ❤❤
@smishra98013 жыл бұрын
What if Windows Defender will block this incoming attack.....!! Sir, please make a video on eternal- blue double pulsar.. And also make tutorial on Windows 10 privileged escalation with bypass AV(defender)🙏🙏 thanks Love your videos🙏
@xen0monster5243 жыл бұрын
For bypassing AV’s try to use an encoder or an evasion
@smishra98013 жыл бұрын
@@xen0monster524 what about veil!!??
@propolipropoli9 ай бұрын
Very helpfull video ,please do more on this topic , and compliment for your channel
@illuripolireddy32823 жыл бұрын
For how of time the session will continue or untill to getout of this once the session was opened
@am0300013 жыл бұрын
Very well, when try to do the scan over my windows machine msfconsole says An SMB login error occurred while connecting to the IPC$ tree. How can I bypass that?
@cirklare2 жыл бұрын
There is a PowerShell script you can run on your Windows machine to make sure that eternal-blue can hack it or not I will upload the script to my github page and overview the eternal-blue vulnerability and exploit it in video I'm making cyber security tutorials Please check them out
@jorgeluiscontrerac Жыл бұрын
bro used wannacry style exploits to hack on a pc. what a legend🎉
@whoizali3 жыл бұрын
Thank u brother, I'm a student of cyber security, ur videos are insanely knowledgeable, much love ♥️
@danielluigi1393 жыл бұрын
Really easy learn whith you.... Thank's..... Have' learn a lot. You the best
@Andrew-mh6cl3 жыл бұрын
Sir a doubt tht u use ur kali in virtual box .... Thn our RHOST should be our system ip or linux ip
@hondaromio2 жыл бұрын
Real life Mr. Robot, Thank you for your wisdom!
@professionalhub14963 жыл бұрын
What will be your advice if I want to master all the command and which step will you advice me to start with as a beginner
@antimatter67283 жыл бұрын
As a beginner myself...start using linux and play ctf from hackthebox or tryhackme website
@AngelMaldonado22 жыл бұрын
Sir, what if nmap shows nothing? Like "All 1000 scanned ports on localhost xxx.x.x.x are in ignored states. Not Shown: 1000 closed tcp ports (conn-refuesed)" ??
@messaoudpolitique92085 ай бұрын
easy simple to understand thank you Sir
@BILLION8792 жыл бұрын
can this be done using windows cmd?
@defyteryt24523 жыл бұрын
i love your vedios . keep it up BIG fan
@MajikCatSecurity3 ай бұрын
What if all ports scanned are filtered? How do you work past that to actually find a vulnerable port?
@osamrx3 жыл бұрын
sheeeeesh i hacked my self, i can do what ever i want. damn. Keep going man, u r amaizing
@ramadhani28193 жыл бұрын
"exploit complete, but no session was created." what should I do? try again or change the payloads?
@saurrav38013 жыл бұрын
Sir your videos are awesome....sir how to evade firewall of windows 7...when we tick block all incoming connections, including those in the list of allowed programs
@fabian_ftn66043 жыл бұрын
Does my target need to be in my same network?
@drownedsnowmjweni3 жыл бұрын
Love how straightforward he is
@MyNameIsJeff_tv4 ай бұрын
What if my target system isnt vulnerable to the ms17-010 ? Is the way to test all of the auxilerys or how do i proceed from there?
@dailymessages13 жыл бұрын
What are you supposed to do when he says double tap on it after he write set payload?
@cybrogs6433 жыл бұрын
Sir make a video for begginers from where should we start learning hacking
@zeneto21573 жыл бұрын
hey. I understand there are some systems to prevent nmap scans. How to bypass ? What is the alternative ?
@mohammadalihanfi82373 жыл бұрын
Sir we have to install that payload in victims computer or not
@noorfortune91863 жыл бұрын
Is this possible from windows to windows mac to mac linux to linux?
@David-bw4gp3 жыл бұрын
this attack is in the same network??
@PawsGigglesCN Жыл бұрын
thanks sir for the details need more support on udemy
@itzmehsamsta2 жыл бұрын
After following your video to where you use command "exploit" near the end of the video. I have a message "[-] Rex :: ConnectionTimeout: The connection with (my ip address) timed out. and then, "[*] Exploit completed, but no session was created. what am I doing wrong?
@5wholepizzas2842 жыл бұрын
Is the auxiliary part 100% necessary?
@KamiSamaPIANIST3 жыл бұрын
is updating the system helps?
@TheMaddman1873 жыл бұрын
But i would have to be part of the network to get the ip address of the victim right?