Using Shodan to Find Vulnerable Devices

  Рет қаралды 14,664

Professor K

Professor K

Күн бұрын

Пікірлер: 12
@chimuanyastephanie4465
@chimuanyastephanie4465 2 ай бұрын
Wow! Great teaching
@user-do3ss3kn7e
@user-do3ss3kn7e 2 жыл бұрын
ayooooo this is legit prof, thanks.
@dristenschtein
@dristenschtein 4 ай бұрын
gyatt sussy baka skididi toiter
@ineedabetterh4ndl3
@ineedabetterh4ndl3 8 ай бұрын
isn't what you just did illigal...
@ineedabetterh4ndl3
@ineedabetterh4ndl3 8 ай бұрын
ooo ops i posted that befor you sead you wouldn't do it, sorry
@Free.Education786
@Free.Education786 4 жыл бұрын
Awesome professor but How to see real ip of cloudflare WAF protected web site ? How to upload reverse shell when there is not a upload option or SQLi error '... Hope to get juicy reply with VIDEO tutorial soon. Love you uncle professor 🤝💐♥️💚💙👍
@krah8052
@krah8052 4 жыл бұрын
You need to go around and come in through the back door. Most attacks are going to originate from inside the network for this very reason. The front door is locked down. Finding the organizational chart or email addresses of the organizations employees is where you start. You would want to discover any social networking accounts used by the organization and/or it's employees. This is all part of your passive recon. You need to find an opening in the back door and that would be an end user. Once you have identified a group or an individual, you target them using smishing, vishing or a phishing campaign. In the lab it looks easy but in real life in can months to find a target and then longer to gain access. You need to get access or someone on the inside to complete the reverse shell connection.
@Free.Education786
@Free.Education786 4 жыл бұрын
@@krah8052 I got this error while installing AutoSploit on parrotsec os 4.10..Please educate how to fix this error. Thanks The following packages have unmet dependencies: python-pip : Depends: python-pip-whl (= 20.0.2-5kali1) but 20.1.1-2 is to be installed Recommends: python-all-dev (>= 2.6) but it is not going to be installed Recommends: python-setuptools but it is not going to be installed Recommends: python-wheel but it is not installable E: Unable to correct problems, you have held broken packages. ./install.sh: line 15: pip2: command not found
@krah8052
@krah8052 4 жыл бұрын
@@Free.Education786 The error says it needs depends on Python packages that are missing.
@Kinoti9
@Kinoti9 2 жыл бұрын
Beautiful explanation
@InfoSecDojo
@InfoSecDojo 3 жыл бұрын
really informative..thanks
@krah8052
@krah8052 3 жыл бұрын
Thank you!
Assigning a Random MAC Address in Kali
7:27
Professor K
Рет қаралды 817
7 Cybersecurity Tips NOBODY Tells You (but are EASY to do)
13:49
All Things Secured
Рет қаралды 366 М.
Worst flight ever
00:55
Adam W
Рет қаралды 27 МЛН
А ВЫ ЛЮБИТЕ ШКОЛУ?? #shorts
00:20
Паша Осадчий
Рет қаралды 9 МЛН
哈哈大家为了进去也是想尽办法!#火影忍者 #佐助 #家庭
00:33
Incredible: Teacher builds airplane to teach kids behavior! #shorts
00:32
Fabiosa Stories
Рет қаралды 11 МЛН
Shodan for Advanced Users!
16:16
Cody Bernardy
Рет қаралды 10 М.
how hackers hack any websites in minutes?!
23:17
Loi Liang Yang
Рет қаралды 231 М.
How To Use Shodan to Find Vulnerable Devices on the Internet
16:16
Joshua's Tech Tips
Рет қаралды 2,7 М.
Information Gathering With Shodan
21:43
HackerSploit
Рет қаралды 44 М.
Using Shodan to Search for Vulnerable Databases
8:08
Professor K
Рет қаралды 5 М.
Shodan: A Beginner's Journey
7:22
Gary Ruddell
Рет қаралды 35 М.
SHODAN Explained! (It's Scary Easy to do) | Let's Hack
7:58
Let's Hack
Рет қаралды 351 М.
Hunting for ICS and Other Tricks on Shodan!
25:20
Cody Bernardy
Рет қаралды 15 М.
Find Vulnerable Services & Hidden Info Using Google Dorks [Tutorial]
13:37
Getting Started and Having Fun With The Shodan Search Engine
16:15
Lawrence Systems
Рет қаралды 44 М.
Worst flight ever
00:55
Adam W
Рет қаралды 27 МЛН