One of the best, simplest, and most easily explained tutorials. It's all that I needed for my understanding of how to carry out Penetration testing.
@martinbaran75709 ай бұрын
as someone who just got into cyber security and looking to move into a pen-testing role , this video is gold, this has been the best video explaining metasploit I have watched
@Christopher-c3k5 ай бұрын
Thank you brother. I swear man out of all the stuff I've sifted through thus far, you video was the most easiest to follow. You laid it out systematically and each step made perfect sense. Keep up the great work and soon as I get my new budget down on paper there will def be a slot for you subscription. All day everyday!
@Phantom-Protocol3 ай бұрын
I started learning ethical hacking on my own and I used Metasploit against my VMs but I never used that many options. Now I will check out them out and how you configure your VMs for testing. Thanks again!!!
@flameera10935 ай бұрын
thank you so much. I'm currently atending a security class in my university and your videos are a lifesaver, incredible info and guides.
@NNAdmin5 ай бұрын
Glad it was helpful!
@Johnny_Jackpott Жыл бұрын
Super underrated. Your videos are GOLD broski, ty!
@NNAdmin Жыл бұрын
Glad you think so!
@IzyiumPrivkta8 ай бұрын
this guy is great I am in with him he knows how to teach newbies Amen
@NNAdmin2 жыл бұрын
Chapters: 1:21 Intro 2:15 The Lab 4:29 Recon Phase | Network Discovery 5:54 Recon Phase | OS Identification and IP List 9:38 Recon Phase | Vulnerability Scan and Bonus Scripts 16:06 Exploitation Phase Part 1 21:11 Exploitation Phase Part 2 --- Please Like and Subscribe by clicking here: studio.kzbin.info/door/39GKRsNps38x7UzydcOZ9w Follow me on Twitter: twitter.com/NielsenNTWKING
@luckyadeloye345211 ай бұрын
Thank you so much for making it clearer!
@NNAdmin11 ай бұрын
Glad it was helpful!
@rafeahmed742011 ай бұрын
finally a good explaination thank you very much for making this clear looking forward to watch all of the other helpful series
@NNAdmin11 ай бұрын
You're very welcome!
@pagnean423411 ай бұрын
@@NNAdmin Been loving your content, greatly appreciative as I'm a current Cybersecurity major and am making great use of your videos.
@comedydaddy807410 ай бұрын
You are GREAT at explaining this! Thanks!
@NNAdmin10 ай бұрын
You're very welcome!
@shivamdubey9214 Жыл бұрын
Loved this, finally I'm cleared about this concept, thanks
@NNAdmin Жыл бұрын
Glad it was helpful!
@Melarona239 ай бұрын
Thank u so much for this❤ As a cyber undergrad, u were clear and precise so i subscribed.
@NNAdmin9 ай бұрын
Thanks for subbing!
@Melarona239 ай бұрын
@@NNAdmin btw could u do an sql injection in a VM video if u have time?
@rickg6722 жыл бұрын
Awesome. Very clearly explained. Thanks again.
@NNAdmin2 жыл бұрын
Glad you liked it
@Xubair3137 ай бұрын
Nice explained. Thanks sir
@ange1vega Жыл бұрын
Subscribed 😅, Amazing video!! 💪🏻
@NNAdmin Жыл бұрын
Awesome! Thank you!
@sinaighani23492 ай бұрын
Good stuff! thank you!!!!
@NNAdmin2 ай бұрын
Glad you like it!
@Spunksterr Жыл бұрын
I'm here to stealthily snatch the wisdom of this cool cat. He's dishing out cybersecurity secrets, and I'm ready to sprinkle some witty commentary on his video content. :))
@ibrahimgambo49042 ай бұрын
very educative
@GalokVonGreshnak11 ай бұрын
Very detailed and concise, thank you. Found out that one of our production servers are potentially vulnerable 💀
@NNAdmin11 ай бұрын
Glad it was helpful!
@gman53 ай бұрын
hello! i set my own network with 2 virtual machines. when i nmap my network, none of the ports are open and nmap cant tell the operative system, any ideas?
@NNAdmin3 ай бұрын
Hi, Check out my video on setting up a virtual lab. Skip to the part about Metasploitable if needed, to see a Linux box that you should be using to test with.
@damianpodgorski697711 ай бұрын
Enjoyed this video !
@NNAdmin11 ай бұрын
So glad!
@dekra6242 Жыл бұрын
Great Video. I learned a lot. Thx!
@NNAdmin Жыл бұрын
Glad you enjoyed it!
@JuanitoEmia3 ай бұрын
Hello @Nielsen, went through all the steps. But I kept on getting "unable to find accessible named pipe!" when exploiting my target machine. Please advise. Thanks.
@NNAdmin3 ай бұрын
I would need to see the entire input and the error to see if I could help.
@Imoriarty963 ай бұрын
@@NNAdmin I am also getting the same thing as well. How can I send the output to you?
@Imoriarty963 ай бұрын
@@NNAdmin Disregard, it worked after I added the SMB credentials.
@JuanitoEmia3 ай бұрын
@@Imoriarty96 May I know how did you get into the SMB credentials? My target machine is XP64bit.
@JuanitoEmia3 ай бұрын
@@NNAdmin Thanks for your response Sir. That's what it says, it came up after hitting run to start exploiting the target. I was able to execute the set rhosts command, which shown the IP address of the target machine. I kept on pausing the video to make sure I did exactly the right thing. Anyway, I worked with other method using a python script found on github. Thanks again.
@XBEAST3212 жыл бұрын
Great Video
@NNAdmin2 жыл бұрын
Thanks!
@MuhoRulz11 күн бұрын
Where did you get this Win 10 machine image from? Was it a custom image from VulnHub or does a regular Win 10 installation still has many unpatched vulnerabilities?
@NNAdmin10 күн бұрын
Honestly, I don't recall. I am guessing it was an un-patched install. It definitely wasn't from vulnhub.
@MuhoRulz10 күн бұрын
@@NNAdmin That makes sense. I'm assuming I can download older images to practice these exploits because I don't think Microsoft backports these security patches to older versions of ISOs? Looking for suggestions here for some Windows machines since I have been practicing on Linux environments mostly so far.
@albertchristofen73307 ай бұрын
sir, i am learning using my win10 on virtualbox, when i tried to scanner, its say that my ip is not vulnerable (i already turn off firewall and security), any solution? thanks.
@abduones2 жыл бұрын
Please don't leave without subscribing to the channel just the button.
@ryanvuinovic960811 ай бұрын
Im brand new at this, what damage can be done with the information gained from the exploit command
@NNAdmin11 ай бұрын
I am not sure what you mean damage?
@naprimary6 ай бұрын
@@NNAdminI’m relatively new to all this too, but he’s probably wondering regarding how commands protections can be put in place to defend against exploitation methods used by these tools. Still kind of vague and wide range of interpretations, but idk lol
@itzpsych05132 ай бұрын
I need help, the lubuntu machie im trying to exploit is only open on port 22, so when im trying the defaul rport 445, its saying that the connection is refused, but when im setting it to 22, im getting smb error since port 22 isnt for smb, does anyone know how to fix it?
@NNAdmin2 ай бұрын
Hi! I don't clearly understand the issue, can you explain it again in detail and I will try to help?
@feiwoza2 жыл бұрын
educational indeed ..priceless ..are you able to post links to the resources? Thank you again for the video!
@rodrigozapata71137 ай бұрын
Hello im pretty new to this, you by far have the best content with Network chuck, but can you tell me what is the authentication password to start postgreSQL, i tried starting msf console , used to start but now it doesnt
@NNAdmin7 ай бұрын
Postgres is usually the default
@nilaxmodi725310 ай бұрын
What if the target has sat firewall
@starlightfury42528 ай бұрын
do you have a discord? would love one tbh!
@STOIC._-_462 Жыл бұрын
this is guy funnny as hell
@Xubair3137 ай бұрын
❤❤
@9260 Жыл бұрын
i dont understand, you explained everything very well but does this mean a hacker would have to be connected to the wifi of a company to hack it like this? seems pretty impossible
@NNAdmin Жыл бұрын
Wifi is only one means to access a network, it could be that you're physically plugged into a port, or over the internet, etc.
@9260 Жыл бұрын
@@NNAdmin oh, so you can connect to a network over the internet? didnt know that, thanks! could you also make videos about hacking web applications? That would be amazing since you actually explain stuff.
@firepygmygaming4409 Жыл бұрын
If you deploy something like deploy a VPN or get an ssh shell to the computer you can do something like this
@FabricioBonilla-i5v Жыл бұрын
Thanks player. Got yo say, that now is getting more clear and use it on metasploitable virtual machine, this way we do not get in trouble, but practice to become really great at it! Now, what I wonder is how to get your first client or a job with this type of knowledge.
@S.O.N.E Жыл бұрын
@9260 You should look into how the internet works, great place to start learning about networks and routing.
@Kalem-Bae10 ай бұрын
msfvenom ?
@roycampbell718010 ай бұрын
more pls
@NNAdmin10 ай бұрын
working on it
@TzMKnight10 ай бұрын
Like, sub, and a comment brother nice video 👌
@NNAdmin10 ай бұрын
Thanks :)
@johncambry1093 Жыл бұрын
I thought bro just left me hanging after teaching me how to open metasploit 😂😂😂