Penetration Testing with Metasploit: A Comprehensive Tutorial

  Рет қаралды 79,567

Nielsen Networking

Nielsen Networking

Күн бұрын

Пікірлер: 84
@etchimanga3299
@etchimanga3299 10 ай бұрын
One of the best, simplest, and most easily explained tutorials. It's all that I needed for my understanding of how to carry out Penetration testing.
@martinbaran7570
@martinbaran7570 9 ай бұрын
as someone who just got into cyber security and looking to move into a pen-testing role , this video is gold, this has been the best video explaining metasploit I have watched
@Christopher-c3k
@Christopher-c3k 5 ай бұрын
Thank you brother. I swear man out of all the stuff I've sifted through thus far, you video was the most easiest to follow. You laid it out systematically and each step made perfect sense. Keep up the great work and soon as I get my new budget down on paper there will def be a slot for you subscription. All day everyday!
@Phantom-Protocol
@Phantom-Protocol 3 ай бұрын
I started learning ethical hacking on my own and I used Metasploit against my VMs but I never used that many options. Now I will check out them out and how you configure your VMs for testing. Thanks again!!!
@flameera1093
@flameera1093 5 ай бұрын
thank you so much. I'm currently atending a security class in my university and your videos are a lifesaver, incredible info and guides.
@NNAdmin
@NNAdmin 5 ай бұрын
Glad it was helpful!
@Johnny_Jackpott
@Johnny_Jackpott Жыл бұрын
Super underrated. Your videos are GOLD broski, ty!
@NNAdmin
@NNAdmin Жыл бұрын
Glad you think so!
@IzyiumPrivkta
@IzyiumPrivkta 8 ай бұрын
this guy is great I am in with him he knows how to teach newbies Amen
@NNAdmin
@NNAdmin 2 жыл бұрын
Chapters: 1:21 Intro 2:15 The Lab 4:29 Recon Phase | Network Discovery 5:54 Recon Phase | OS Identification and IP List 9:38 Recon Phase | Vulnerability Scan and Bonus Scripts 16:06 Exploitation Phase Part 1 21:11 Exploitation Phase Part 2 --- Please Like and Subscribe by clicking here: studio.kzbin.info/door/39GKRsNps38x7UzydcOZ9w Follow me on Twitter: twitter.com/NielsenNTWKING
@luckyadeloye3452
@luckyadeloye3452 11 ай бұрын
Thank you so much for making it clearer!
@NNAdmin
@NNAdmin 11 ай бұрын
Glad it was helpful!
@rafeahmed7420
@rafeahmed7420 11 ай бұрын
finally a good explaination thank you very much for making this clear looking forward to watch all of the other helpful series
@NNAdmin
@NNAdmin 11 ай бұрын
You're very welcome!
@pagnean4234
@pagnean4234 11 ай бұрын
@@NNAdmin Been loving your content, greatly appreciative as I'm a current Cybersecurity major and am making great use of your videos.
@comedydaddy8074
@comedydaddy8074 10 ай бұрын
You are GREAT at explaining this! Thanks!
@NNAdmin
@NNAdmin 10 ай бұрын
You're very welcome!
@shivamdubey9214
@shivamdubey9214 Жыл бұрын
Loved this, finally I'm cleared about this concept, thanks
@NNAdmin
@NNAdmin Жыл бұрын
Glad it was helpful!
@Melarona23
@Melarona23 9 ай бұрын
Thank u so much for this❤ As a cyber undergrad, u were clear and precise so i subscribed.
@NNAdmin
@NNAdmin 9 ай бұрын
Thanks for subbing!
@Melarona23
@Melarona23 9 ай бұрын
@@NNAdmin btw could u do an sql injection in a VM video if u have time?
@rickg672
@rickg672 2 жыл бұрын
Awesome. Very clearly explained. Thanks again.
@NNAdmin
@NNAdmin 2 жыл бұрын
Glad you liked it
@Xubair313
@Xubair313 7 ай бұрын
Nice explained. Thanks sir
@ange1vega
@ange1vega Жыл бұрын
Subscribed 😅, Amazing video!! 💪🏻
@NNAdmin
@NNAdmin Жыл бұрын
Awesome! Thank you!
@sinaighani2349
@sinaighani2349 2 ай бұрын
Good stuff! thank you!!!!
@NNAdmin
@NNAdmin 2 ай бұрын
Glad you like it!
@Spunksterr
@Spunksterr Жыл бұрын
I'm here to stealthily snatch the wisdom of this cool cat. He's dishing out cybersecurity secrets, and I'm ready to sprinkle some witty commentary on his video content. :))
@ibrahimgambo4904
@ibrahimgambo4904 2 ай бұрын
very educative
@GalokVonGreshnak
@GalokVonGreshnak 11 ай бұрын
Very detailed and concise, thank you. Found out that one of our production servers are potentially vulnerable 💀
@NNAdmin
@NNAdmin 11 ай бұрын
Glad it was helpful!
@gman5
@gman5 3 ай бұрын
hello! i set my own network with 2 virtual machines. when i nmap my network, none of the ports are open and nmap cant tell the operative system, any ideas?
@NNAdmin
@NNAdmin 3 ай бұрын
Hi, Check out my video on setting up a virtual lab. Skip to the part about Metasploitable if needed, to see a Linux box that you should be using to test with.
@damianpodgorski6977
@damianpodgorski6977 11 ай бұрын
Enjoyed this video !
@NNAdmin
@NNAdmin 11 ай бұрын
So glad!
@dekra6242
@dekra6242 Жыл бұрын
Great Video. I learned a lot. Thx!
@NNAdmin
@NNAdmin Жыл бұрын
Glad you enjoyed it!
@JuanitoEmia
@JuanitoEmia 3 ай бұрын
Hello @Nielsen, went through all the steps. But I kept on getting "unable to find accessible named pipe!" when exploiting my target machine. Please advise. Thanks.
@NNAdmin
@NNAdmin 3 ай бұрын
I would need to see the entire input and the error to see if I could help.
@Imoriarty96
@Imoriarty96 3 ай бұрын
@@NNAdmin I am also getting the same thing as well. How can I send the output to you?
@Imoriarty96
@Imoriarty96 3 ай бұрын
@@NNAdmin Disregard, it worked after I added the SMB credentials.
@JuanitoEmia
@JuanitoEmia 3 ай бұрын
@@Imoriarty96 May I know how did you get into the SMB credentials? My target machine is XP64bit.
@JuanitoEmia
@JuanitoEmia 3 ай бұрын
@@NNAdmin Thanks for your response Sir. That's what it says, it came up after hitting run to start exploiting the target. I was able to execute the set rhosts command, which shown the IP address of the target machine. I kept on pausing the video to make sure I did exactly the right thing. Anyway, I worked with other method using a python script found on github. Thanks again.
@XBEAST321
@XBEAST321 2 жыл бұрын
Great Video
@NNAdmin
@NNAdmin 2 жыл бұрын
Thanks!
@MuhoRulz
@MuhoRulz 11 күн бұрын
Where did you get this Win 10 machine image from? Was it a custom image from VulnHub or does a regular Win 10 installation still has many unpatched vulnerabilities?
@NNAdmin
@NNAdmin 10 күн бұрын
Honestly, I don't recall. I am guessing it was an un-patched install. It definitely wasn't from vulnhub.
@MuhoRulz
@MuhoRulz 10 күн бұрын
@@NNAdmin That makes sense. I'm assuming I can download older images to practice these exploits because I don't think Microsoft backports these security patches to older versions of ISOs? Looking for suggestions here for some Windows machines since I have been practicing on Linux environments mostly so far.
@albertchristofen7330
@albertchristofen7330 7 ай бұрын
sir, i am learning using my win10 on virtualbox, when i tried to scanner, its say that my ip is not vulnerable (i already turn off firewall and security), any solution? thanks.
@abduones
@abduones 2 жыл бұрын
Please don't leave without subscribing to the channel just the button.
@ryanvuinovic9608
@ryanvuinovic9608 11 ай бұрын
Im brand new at this, what damage can be done with the information gained from the exploit command
@NNAdmin
@NNAdmin 11 ай бұрын
I am not sure what you mean damage?
@naprimary
@naprimary 6 ай бұрын
@@NNAdminI’m relatively new to all this too, but he’s probably wondering regarding how commands protections can be put in place to defend against exploitation methods used by these tools. Still kind of vague and wide range of interpretations, but idk lol
@itzpsych0513
@itzpsych0513 2 ай бұрын
I need help, the lubuntu machie im trying to exploit is only open on port 22, so when im trying the defaul rport 445, its saying that the connection is refused, but when im setting it to 22, im getting smb error since port 22 isnt for smb, does anyone know how to fix it?
@NNAdmin
@NNAdmin 2 ай бұрын
Hi! I don't clearly understand the issue, can you explain it again in detail and I will try to help?
@feiwoza
@feiwoza 2 жыл бұрын
educational indeed ..priceless ..are you able to post links to the resources? Thank you again for the video!
@rodrigozapata7113
@rodrigozapata7113 7 ай бұрын
Hello im pretty new to this, you by far have the best content with Network chuck, but can you tell me what is the authentication password to start postgreSQL, i tried starting msf console , used to start but now it doesnt
@NNAdmin
@NNAdmin 7 ай бұрын
Postgres is usually the default
@nilaxmodi7253
@nilaxmodi7253 10 ай бұрын
What if the target has sat firewall
@starlightfury4252
@starlightfury4252 8 ай бұрын
do you have a discord? would love one tbh!
@STOIC._-_462
@STOIC._-_462 Жыл бұрын
this is guy funnny as hell
@Xubair313
@Xubair313 7 ай бұрын
❤❤
@9260
@9260 Жыл бұрын
i dont understand, you explained everything very well but does this mean a hacker would have to be connected to the wifi of a company to hack it like this? seems pretty impossible
@NNAdmin
@NNAdmin Жыл бұрын
Wifi is only one means to access a network, it could be that you're physically plugged into a port, or over the internet, etc.
@9260
@9260 Жыл бұрын
@@NNAdmin oh, so you can connect to a network over the internet? didnt know that, thanks! could you also make videos about hacking web applications? That would be amazing since you actually explain stuff.
@firepygmygaming4409
@firepygmygaming4409 Жыл бұрын
If you deploy something like deploy a VPN or get an ssh shell to the computer you can do something like this
@FabricioBonilla-i5v
@FabricioBonilla-i5v Жыл бұрын
Thanks player. Got yo say, that now is getting more clear and use it on metasploitable virtual machine, this way we do not get in trouble, but practice to become really great at it! Now, what I wonder is how to get your first client or a job with this type of knowledge.
@S.O.N.E
@S.O.N.E Жыл бұрын
​@9260 You should look into how the internet works, great place to start learning about networks and routing.
@Kalem-Bae
@Kalem-Bae 10 ай бұрын
msfvenom ?
@roycampbell7180
@roycampbell7180 10 ай бұрын
more pls
@NNAdmin
@NNAdmin 10 ай бұрын
working on it
@TzMKnight
@TzMKnight 10 ай бұрын
Like, sub, and a comment brother nice video 👌
@NNAdmin
@NNAdmin 10 ай бұрын
Thanks :)
@johncambry1093
@johncambry1093 Жыл бұрын
I thought bro just left me hanging after teaching me how to open metasploit 😂😂😂
@NNAdmin
@NNAdmin Жыл бұрын
😅
Penetration Testing with Metasploit: A Comprehensive Tutorial | PT2
20:21
Nielsen Networking
Рет қаралды 12 М.
Penetration Testing with Nmap: A Comprehensive Tutorial
38:10
Nielsen Networking
Рет қаралды 333 М.
Ful Video ☝🏻☝🏻☝🏻
1:01
Arkeolog
Рет қаралды 14 МЛН
Какой я клей? | CLEX #shorts
0:59
CLEX
Рет қаралды 1,9 МЛН
24 Часа в БОУЛИНГЕ !
27:03
A4
Рет қаралды 7 МЛН
How To use Kali Linux Security Tools | EP1 | nmap
23:01
Nielsen Networking
Рет қаралды 36 М.
Essential Linux Commands for Ethical Hackers: A Comprehensive Tutorial
1:18:53
Expert Reveals TOP SECRET Kali Linux OSINT Tools!
9:12
Cyber Defense
Рет қаралды 8 М.
Metasploit For Beginners to Expert   The Basics Modules, Exploits And Payloads
2:00:03
Cyber Technical knowledge
Рет қаралды 3,5 М.
Ethical Hacking Deep Dive: Metasploit, Nmap, and Advanced Techniques
41:56
Nielsen Networking
Рет қаралды 97 М.
How A Server Can Easily Be Hacked (Metasploit)
7:02
Infosec Mastery - Ethical Hacking for Beginners
Рет қаралды 76 М.
Simple Penetration Testing Tutorial for Beginners!
29:41
Loi Liang Yang
Рет қаралды 89 М.
Tactics of Physical Pen Testers
44:17
freeCodeCamp Talks
Рет қаралды 944 М.
How to Hack Passwords with John The Ripper
30:42
Nielsen Networking
Рет қаралды 9 М.