very instructive and interesting video. I often used nmap before that is why i specially appreciate your lesson concerning the -A option. I believe that when learning (school, uni, cert, or by yourself), we seldom have to consider the fingerprints we leave or have to deal with a complex or sizeable system. We usually have a single practice target with existing vulnerabilities . Under such conditions the -A returns acceptable results without having to understand or learn about the other options and their differences. What i am trying to say is that -A is a good introduction option when starting on the security path but a bad option if we mostly rely on it as we progress
@pentest_TV Жыл бұрын
Very insightful comment and one I would 100% agree with. It's a really good point that the -A is very helpful when we're learning because it truly is. It spews forth a lot of really good information. But to your point most beginners (and some seniors) don't fully understand the totality of their actions or the tools themselves, which is one of the reasons I started doing videos again. If I can help just one person avoid some of the pitfalls I've encountered over the decades then the work to make these videos are worth it. :) Thanks again for the comment - it is very much appreciated.
@soulei1990 Жыл бұрын
@@pentest_TV As a person who has actually benefited from watching this video, i am truly thankful to you and the efforts you made to share your wisdom and experience with us. This is why, as an aficionado of cybersecurity and pentesting in particular(my dream job), i am enthusiastically looking forward to any future videos you will share.
@pentest_TV Жыл бұрын
Thanks - we have a whole slew of videos in the queue to work on. Glad you enjoyed the video, and feel free to spread the word about this channel! I've pinned your post. :)
@chaiBreuer Жыл бұрын
I watch a lot of videos about pentesting. I come across this one, and you are doing a really good job. The speed and the way how you explain things are on point. Most videos go off the point and make things to detailed or too complicated. I already know alot about Nmap, but this video would saved me so much time 😂.
@pentest_TV Жыл бұрын
Thanks for the feedback! It’s really great to hear your take on the video and I appreciate you taking the time to leave the comment. Happy hacking!… and lmk if there are any topics you’d like to see covered.
@dave24-736 ай бұрын
I’m in the same boat, stumbled onto this, and now watching a few others, I like the format.
@LokiCDK9 ай бұрын
I've been doing this long enough not to learn anything new here, but the information is ABSOLUTELY useful, accurate, and encourages people to understand what and why. Good job.
@pentest_TV9 ай бұрын
Thanks for the comment and validation of the contents of the video - really appreciate it! Yeah, I've been doing this a while as well and a lot of times I find misinformation or bad practices being regurgitated on videos within KZbin. Felt it was a good time to provide my two cents based on my experience. Thanks again!!
@WillSmith63957 Жыл бұрын
This guy is awesome. Nmap is covered heavily at this point but this is a very good exploration of it. Great job
@pentest_TV Жыл бұрын
Glad I was able to provide a new perspective on the tool. Appreciate the feedback and comment!👍👍
@_K_W Жыл бұрын
Cool, I'm doing nmap in a bootcamp this week so I looked this up to gain some perspective.
@pentest_TV Жыл бұрын
Awesome - remember that there's a difference between real-world application and what is typically taught in course material. Real-world is so driven by being effective in your time management... courses don't really mention that much. Enjoy the journey!
@walterpfeffer55386 ай бұрын
Best video by far!
@pentest_TV6 ай бұрын
Thanks for watching and glad you enjoyed it!
@Krazy0 Жыл бұрын
For a 439 + 1 (me) subscribers channel it's an impressive work you've done here, keep it up!
@pentest_TV Жыл бұрын
Thanks for the sub! Glad you enjoyed the video. Lmk if there’s any topic you’d like covered.
@Krazy0 Жыл бұрын
@@pentest_TV It would be a nice to see a series covering most of the red team utilities (packages), but instead of using Kali, installing them and doing their setup, which will certainly gain many views, especially that Kali is literally bloated in terms of amount of stuff in it, and I wouldn't want to depend on a distro, so I chose base Artix (systemd-less Arch) and got into installing Black Arch (Kali but for Arch) packages in it, and it's just an incredible experience, being able to man package everything and learn every technical detail and history about each package, taught me a lot of things and I'm very grateful for every moment I spent doing it.
@rosenote2462 Жыл бұрын
another great channel with low sub number I can't believe what I see, love that vid
@pentest_TV Жыл бұрын
Glad you enjoyed it! Just started a few weeks ago, so I’m hopeful 😄 Thanks for the comment - feel free to lmk if there is any topic you want covered.
@timk7749 Жыл бұрын
Great explanation. Now i need to watch again and take notes! Keep up the good work.
@pentest_TV Жыл бұрын
Thanks for watching!... glad it helped and that you enjoyed it.
@MunitionsDudTester Жыл бұрын
Just started my journey and this information is great
@pentest_TV Жыл бұрын
Thank you so much for your kind words! I'm glad you found the information helpful. Best of luck on your journey!
@bishoptrees Жыл бұрын
Nice summary mate
@pentest_TV Жыл бұрын
Appreciate the feedback and thanks for watching! 👍👍👍
@JasonBillingham Жыл бұрын
This was a great video. Gave me exactly the information I was looking for. Precise information, perfect examples and great advice regarding using -A. Thanks for a great video!
@pentest_TV Жыл бұрын
Hey, thanks for the feedback! I'm glad to know that the video gave you exactly what you were looking for. Stay tuned for more helpful content in the future!
@joeyhenry7312 Жыл бұрын
Enjoying this video. I've recently started my journey into learning cycber security basics and i'm just learning how to use Linux and Kali for the first time and I'm loving it. Looking for a career change after years of working in finance. Also the video quality and pace are really good and make it enjoyable to watch. Definitely will rewatch again when not at work. Subbed and looking forward to more videos. 🙏🏼
@pentest_TV Жыл бұрын
Hey, thanks for the comment! I'm truly glad you enjoyed it and I appreciate you subscribing! LMK if there are any topics you'd like to see and good luck with your career change!
@NotDaveidt Жыл бұрын
Great video! This definitely helped me use nmap more effectively!
@pentest_TV Жыл бұрын
Thanks for watching and I appreciate you commenting! Glad it helped and lmk if there are any other topics you'd like to see covered. Thanks again!
@NotDaveidt Жыл бұрын
@@pentest_TV i love the theme of showing us how these tools are commonly mis used by professionals. I believe it'd help a-lot of beginners avoid these habits
@pentest_TV Жыл бұрын
Awesome - thanks for the feedback! I’ll keep doing more of that. 😃
@anthonyharper4877 Жыл бұрын
you need more likes and followers, this is very educational and helpful for a career path in cybersecurity
@pentest_TV Жыл бұрын
Thank you… I really appreciate it! Just trying to share my experience and help others avoid some of the pitfalls and challenges I’ve encountered over the decades. Glad to know it’s valuable to others. 👍👍👍
@jcg702 Жыл бұрын
Good explanations, looking forward to your other videos.
@pentest_TV Жыл бұрын
Thanks for watching - glad you found it useful!!
@TazioBaker Жыл бұрын
Great video. Thank you for making it.
@pentest_TV Жыл бұрын
Glad you liked it! Thanks for letting me know. 👍👍
@george1356 Жыл бұрын
i didnt know all that about -A. Thanks man!
@pentest_TV Жыл бұрын
Hey, thanks for the feedback! Yeah, it’s insidious 😜
@Piedrasama Жыл бұрын
Thanks for the knowledge shared. Good video & advise. Funny, engaging and educational.
@pentest_TV Жыл бұрын
My pleasure and glad you found it worthwhile! Thanks for watching!
@davege946311 ай бұрын
thank you very informative and helpful
@pentest_TV11 ай бұрын
Glad it was helpful! Thanks for the comment and for watching!
@Rafael-oq9vu Жыл бұрын
Awesome video. I'm waiting for the next
@pentest_TV Жыл бұрын
Thanks! Coming very soon… make sure to click the bell for notification when it drops.
@bertinndayizeye_Tino9 ай бұрын
Geat explanation. Thank you
@pentest_TV9 ай бұрын
You’re very welcome. Thanks for watching and providing a comment!
@thoscofer Жыл бұрын
Great video, much appreciated, will help avoid some easily made mistakes. Very informative.
@pentest_TV Жыл бұрын
Glad you enjoyed it and thanks a lot for the comment! LMK if there are any topics you'd like to see.
@0oNoiseo0 Жыл бұрын
Great tutorial! thank you
@pentest_TV Жыл бұрын
You are very welcome - glad you enjoyed it! Also, appreciate you letting me know.
@UFKx Жыл бұрын
Great video Kevin!
@pentest_TV Жыл бұрын
Thanks! Name’s Thomas Wilhelm, though… appreciate your watching the video and glad you liked it.
@cybersecurity-gq9rr11 ай бұрын
Ver insightful content
@pentest_TV11 ай бұрын
Thanks for letting me know!
@tahersadeghi6773 Жыл бұрын
Great video. thank you.
@pentest_TV Жыл бұрын
My pleasure - thanks for letting me know you enjoyed it. 👍👍
@mukut5ul Жыл бұрын
is it possible to scan vms behind loadbalancer?
@pentest_TV Жыл бұрын
Really good question. Yes, but load balancers are a bit weird. the backend systems may not be identical or patched the same, so you might keep getting different results against the same IP. Just be aware that it's a possibility. Also, some scanning tools can identify load balancers (Nessus / openVAS) to give you a heads up as well. Thanks for the question and thanks for watching!
@johnheintz4772 Жыл бұрын
Thanks for the crash course and warnings! 🙂
@pentest_TV Жыл бұрын
Thanks for watching! Glad it was helpful. 👍👍
@battery2xa22 Жыл бұрын
very good video. it was all easy to understand
@pentest_TV Жыл бұрын
Oh good! Glad it was helpful. If you have any other tools you want me to highlight, lmk. Thanks for watching!
@pabloqp7929 Жыл бұрын
great video sire
@pentest_TV Жыл бұрын
Much appreciated - thanks for watching and commenting!!
@bibi9984 Жыл бұрын
like your video which are well explained
@pentest_TV Жыл бұрын
I appreciate the feedback and glad you enjoyed it!
@patytrico Жыл бұрын
Thank you for the class!
@pentest_TV Жыл бұрын
Thanks for watching and commenting! If there is anything you’re interested in me covering, don’t hesitate to lmk.
@liubomyrsiusar6589 Жыл бұрын
How to make the same style of terminal? It s cool
@pentest_TV Жыл бұрын
It’s the Windows 11 command window connected to kali Linux on the AWS network.
@liubomyrsiusar6589 Жыл бұрын
Thanks, I will try it, btw - great course 👍
@pentest_TV Жыл бұрын
Awesome! Glad you enjoyed it!!
@charittaroach9580 Жыл бұрын
Great video!
@pentest_TV Жыл бұрын
Glad you enjoyed it! And thanks for the comment… lmk if there is any other topic you want covered.
@youssefbenghorbel1982 Жыл бұрын
good video sir , keep up !
@pentest_TV Жыл бұрын
Glad you enjoyed it, and seems like it’s beneficial to more than a few people… so guess I’ll keep making them. 🤗
@Gotlove321 Жыл бұрын
Hello 😅😅 i like your video from Thailand bro🎉🎉🎉❤
@pentest_TV Жыл бұрын
Thanks for watching! Lmk if there’s any topic you’d like to see.
@limitless2352 Жыл бұрын
why when i scan it shows all are in ignored states ??? doesnt show any ports or any other stuff
@pentest_TV Жыл бұрын
Could be because of the target's firewall, but I'd have to know more. This is a great question to bring over to the discord server: discord.gg/pee5WDfnxv Thanks for posting the question and watching the video!
@kazimali572 Жыл бұрын
this is some crazy stuff, thanks
@pentest_TV Жыл бұрын
Hope it helps and thanks for watching!!
@shellcatt Жыл бұрын
Point taken.
@pentest_TV Жыл бұрын
Thanks for watching!
@soullessman9049 Жыл бұрын
Good video
@pentest_TV Жыл бұрын
Thanks for watching and glad you enjoyed it!
@pramodjogdand0 Жыл бұрын
Useful 👍
@pentest_TV Жыл бұрын
Thanks for the feedback!
@PaulBiyabiya Жыл бұрын
Can we use nmap Scripts on bug bounty to find vulnerabilities???
@pentest_TV Жыл бұрын
Really good question! The answer is “maybe? Probably?”… but it totally depends on the rules of engagement the the big bounty provides. So make sure you read and absolutely follow their rules. Some may not permit brute force, so you’ll have to exclude those, etc. Thanks for the question!
@codelinx Жыл бұрын
That was great info
@pentest_TV Жыл бұрын
Glad it was helpful! Thanks for watching. 👍👍👍
@Channel-ev5ks Жыл бұрын
Wow really good
@pentest_TV Жыл бұрын
Thanks for watching and commenting!!
@estigoyunli Жыл бұрын
I try the commands and it's work accurately.but one thing I don't know.sir.dirctor.the command for chopping of the file.tnx for the info.
@pentest_TV Жыл бұрын
Thanks for watching and the question. Not sure exactly what you’re trying to do but I use the -oA flag for output, which allows me to export findings into other tools if necessary. The xml and grep files I use to programmatically identify potentially exploitable vulnerabilities, and the standard output is just easier for me to read. Hope that helps. Thanks again!
@Gomorzo Жыл бұрын
Awesome
@pentest_TV Жыл бұрын
Glad you enjoyed it!
@AkshatBhardwaj-yf7ck11 ай бұрын
I did script http along the video it took me 7736 sec (2+ hr) 🙂
@pentest_TV11 ай бұрын
Yeah… fine if you have the time but it’s a poor way to test. Thanks for letting us know!👍👍👍
@bilalbasheir Жыл бұрын
Please tell me there is no need to be good in maths and coding for becoming the pentester 😂.......leave it aside to be honest i feel lucky to gain some knowledge from you sir..its my request to you please make some roadmap vedios like what should we beginners follow from early stages to get this feild
@pentest_TV Жыл бұрын
Roadmap videos… good idea! And no, math or coding isn’t really required unless you’re more interested in app pentesting or code reviews. As a network pentester, I haven’t written a script in years, and I lost all my math knowledge except for some algebra. Thanks for the comment and idea!
@bilalbasheir Жыл бұрын
@@pentest_TV I don't feel sorry for your lost sir😆.... thankyou
@pentest_TV Жыл бұрын
Lmao!! Same. Thanks for watching and commenting!
@FranklySecure Жыл бұрын
I appreciate your channel and wisdom however I can not say positive things about your Alienware PC...
@pentest_TV Жыл бұрын
LMAO - don't get me started! Didn't want to make my own gaming system, ordered this, had it not work (random shutdown) for two months, and when they finally replaced it, they sent it in the wrong color! Geezus! I'll tell you what though... the 4090 kicks ass. Thanks for watching and the comment!!
@Random_life_for_you Жыл бұрын
WE NEED PYTHON COURSE PLEASE..........
@pentest_TV Жыл бұрын
My wife just said “well, yeah!” Guess I need to make a python course for hackers. 😝
@Random_life_for_you Жыл бұрын
@@pentest_TV sure u do :)
@Linux333 Жыл бұрын
Idk why Network Chuck is so popular, very basic and barely goes into detail. This guy got the job done
@pentest_TV Жыл бұрын
Thanks for your vote of confidence! Glad you enjoyed the content as well. Lmk if there any topics you’d like to see, otherwise thanks for watching!👍👍👍
@hehehe4450 Жыл бұрын
But aren't you exposing yourself to that website you are scanning? You are not using a vpn, proxy chains or tor, so you have not much anonymity. 🤔
@pentest_TV Жыл бұрын
You are 100 percent correct, but in all external, ethical pentests anonymity is not a concern. In fact, we ask customers beforehand if they block external connections, and if they do, to whitelist us so we don't get throttled or blocked. The only time we care about detection is during a red team so we don't alert the blue team (SOC). Remember, a pentest is a very short engagement so the fewer delays or obstacles we have, the better. Thanks for your question!
@hehehe4450 Жыл бұрын
@@pentest_TV Thank you very much for your answer! But it would be pretty cool, if all this could be done anonymously. I don't know how it can function with proxychains, and I'm not even sure if proxychains actually are that anonymous. May I also ask what you mean by red team and blue team, and what an SOC is?
@pentest_TV Жыл бұрын
Intrusion detection systems monitoring internet-facing servers usually have thresholds on what to report. You can use timing techniques to scan below those thresholds. Problem is the customer can change what those thresholds are, so what you think is “slow enough” can still get detected. The alarms that can get generated by scanning too fast is monitored by a Security Operations Center (SOC) and it’s with them that we try to avoid detection when doing red team exercises. Hope that helps a bit. Thanks for reaching back out!
@seanlow91848 ай бұрын
Hey this guy is really good
@pentest_TV8 ай бұрын
Glad you enjoyed the video, and thanks for the feedback!!