as someone who just got into cyber security and looking to move into a pen-testing role , this video is gold, this has been the best video explaining metasploit I have watched
I started learning ethical hacking on my own and I used Metasploit against my VMs but I never used that many options. Now I will check out them out and how you configure your VMs for testing. Thanks again!!!
Chapters: 1:21 Intro 2:15 The Lab 4:29 Recon Phase | Network Discovery 5:54 Recon Phase | OS Identification and IP List 9:38 Recon Phase | Vulnerability Scan and Bonus Scripts 16:06 Exploitation Phase Part 1 21:11 Exploitation Phase Part 2 --- Please Like and Subscribe by clicking here: studio.ru-vid.com/show-UC39GKRsNps38x7UzydcOZ9w Follow me on Twitter: twitter.com/NielsenNTWKING
Thank you brother. I swear man out of all the stuff I've sifted through thus far, you video was the most easiest to follow. You laid it out systematically and each step made perfect sense. Keep up the great work and soon as I get my new budget down on paper there will def be a slot for you subscription. All day everyday!
hello! i set my own network with 2 virtual machines. when i nmap my network, none of the ports are open and nmap cant tell the operative system, any ideas?
Hi, Check out my video on setting up a virtual lab. Skip to the part about Metasploitable if needed, to see a Linux box that you should be using to test with.
Hello @Nielsen, went through all the steps. But I kept on getting "unable to find accessible named pipe!" when exploiting my target machine. Please advise. Thanks.
@@NNAdmin Thanks for your response Sir. That's what it says, it came up after hitting run to start exploiting the target. I was able to execute the set rhosts command, which shown the IP address of the target machine. I kept on pausing the video to make sure I did exactly the right thing. Anyway, I worked with other method using a python script found on github. Thanks again.
sir, i am learning using my win10 on virtualbox, when i tried to scanner, its say that my ip is not vulnerable (i already turn off firewall and security), any solution? thanks.
I'm here to stealthily snatch the wisdom of this cool cat. He's dishing out cybersecurity secrets, and I'm ready to sprinkle some witty commentary on his video content. :))
Hello im pretty new to this, you by far have the best content with Network chuck, but can you tell me what is the authentication password to start postgreSQL, i tried starting msf console , used to start but now it doesnt
@@NNAdminI’m relatively new to all this too, but he’s probably wondering regarding how commands protections can be put in place to defend against exploitation methods used by these tools. Still kind of vague and wide range of interpretations, but idk lol
i dont understand, you explained everything very well but does this mean a hacker would have to be connected to the wifi of a company to hack it like this? seems pretty impossible
@@NNAdmin oh, so you can connect to a network over the internet? didnt know that, thanks! could you also make videos about hacking web applications? That would be amazing since you actually explain stuff.
Thanks player. Got yo say, that now is getting more clear and use it on metasploitable virtual machine, this way we do not get in trouble, but practice to become really great at it! Now, what I wonder is how to get your first client or a job with this type of knowledge.