ofc a lot has changed in 5 years, but this video is still highly discoverable and helpful with nmap 7.94 worth mentioning, nmap users now must include "vulscan/vulscan.nse" and/or "nmap-vulners/vulners.nse" after the --script. not just "vulscan" anymore, or youll get an error for empty directory
Give this guy a like, he is taking the time to share the knowledge to even the beginners and he has great tips! One of my favorites.. Thank you 🙏, you are appreciated!
Null Byte No Thank YOU! Your taking the time to do what many hackers/pentesters etc and pass on your skill.. Most of the people have the attitude of I”learned it myself, and so should you” But some people need a push.. And u are that push for me, you made me go buy a raspberry and WiFi adapters, first time I clips influenced me like this so keep doing what ur doing..Do you provide any online courses that i can take and pay for like live sessions, that would be so dope.. You are appreciated 🙏 .
Man Kody scares the shit outta me!! lol I mean like i wouldn't wanna piss him off! But they do produce some pretty amazing content! I'm training to become a PenTester now and between this channel and Cybrary I'll be penetrating people's networks in no time!
If we take all the content on this channel and compare it to other content out there we gonna find that this content here is not available out there, thats why this channel worth more than 1m$, Oops I said that last time, by updating my packages, its worth now 1. 000000*10 b$
Your content is just amazing. By far one of the best security channels I have ever seen. Love the cat images in the background ;) perfect reference to deep learning if you ask me.
Thanks Kody, excellent as always. Would be great to get an overview of how you got into hacking/InfoSec, experience and how you recommend getting into the industry.
@Null Byte i have to find a Linux Kernel vulnerability on a machine however when i run the code i am unable to find the correct one, they are listed there but not the kernel one, any chance you can help
(4:17) Like the vulscan and the nmap-vulners script. Thank you for sharing. One thing I am not clear about, it looks like you would have to pull the script down from Github and this is not out of the box script from Nmap?
Pls how to interact with router by using python i want to write a code that do similar to reaver it send wps pin and receive output to see if the pin was correct . What module i have to use i heard of piramiko and scapy and heard that i have to logine to router by ssh but we need hostname to do that . Pls if you can do a video about it or tell me where i can find a answer . Thank you
U can work round that with -Pn or use -D and for decoy to spoof an IP you type in. So they don't really know its you if you don't want them to know that you scanned them.
Quick question about cracking wifi hashes : can an attacker be thinking that it got the right password if the target clients use wrong password when the handshake was captured? An attacker launches deauth attack and listens for handshakes and in the time the attacker listens someone tries to connect to target wifi using wrong password then the attacker gets the handshake and tries to decrypt it and will the final password be the correct one or the invalid used by the someone who tried to connect while an attacker was listening? Im sorry for my english
Yes after deauth is finished there is a possibility that someone is typing password right at that time and that u will catch wrong password he typed instead of other devices automaticly connecting back, tho the chances for that are almost close to 0
Hey bro, how are you doing? I’m having some trouble with assignment. I was wondering if you could reach out and we could get in contact and you could help me please
NSE: failed to initialize the script engine: /usr/bin/../share/nmap/nse_main.lua:821: directory '/usr/bin/../share/nmap/scripts/vulscan' found, but will not match without '/' stack traceback: [C]: in function 'error' /usr/bin/../share/nmap/nse_main.lua:821: in local 'get_chosen_scripts' /usr/bin/../share/nmap/nse_main.lua:1312: in main chunk [C]: in ? QUITTING!
Hi. I need help. Whenever I am trying to do a Vulnerabilities scan or Service scan. I am receiving following error AllProbes::compileFallbacks: Unknown fallback specified in Probe DNSVersionBindReqTCP: 'DNSVersionBindReq' . Could you please help out solving this error or anyone can give any clue for the same?
Hi, i hope anyone can help me with this. when i execute "nmap --script vulscan,nmap-vulners -sV " everything was clean and i remember that the server was installed some apache 2.2 , so do i have to connect in the same network or i can do a vulscan on the public IP?
@@vamsikrishna9737 yeah i have permission as i would like to use nmap vulscan to check for the vulnerability. but it doesnt show at all. appreciate any help?
@@garytan3531 if the commands you run are executing without any errors then I think the vunlerablity is patched or they are updated so you are not getting anything other way is to try Nessus or openvas
@@vamsikrishna9737 I used trial version nessus on the internal network and scan with bunch of vulnerabilities but when I use another computer not within the network to nmap vulscan no vulnerability.
ofc a lot has changed in 5 years, but this video is still highly discoverable and helpful with nmap 7.94
worth mentioning, nmap users now must include "vulscan/vulscan.nse" and/or "nmap-vulners/vulners.nse" after the --script. not just "vulscan" anymore, or youll get an error for empty directory
Give this guy a like, he is taking the time to share the knowledge to even the beginners and he has great tips! One of my favorites.. Thank you 🙏, you are appreciated!
Thank you!
Null Byte No Thank YOU! Your taking the time to do what many hackers/pentesters etc and pass on your skill.. Most of the people have the attitude of I”learned it myself, and so should you” But some people need a push.. And u are that push for me, you made me go buy a raspberry and WiFi adapters, first time I clips influenced me like this so keep doing what ur doing..Do you provide any online courses that i can take and pay for like live sessions, that would be so dope.. You are appreciated 🙏 .
I love this channel so much. I learned a lot of things, especially writing your own script. That was amazing.
I'm glad it's helpful! Thanks for watching
Kody, you and your team need a tv program. I Love what you do and I’m sure I ain’t the only one.
Man Kody scares the shit outta me!! lol I mean like i wouldn't wanna piss him off! But they do produce some pretty amazing content! I'm training to become a PenTester now and between this channel and Cybrary I'll be penetrating people's networks in no time!
@@roberthorn6707 Hahaha thank you
@@roberthorn6707 lols right! I don't think anyone wants to land on his blacklist. That has to be a pretty scary spot to be in.
@@NullByteWHT Kody, If you ever do a meet & greet somewhere let me know I'm very interested, sounds like a lot of fun.
Jean Suriel what is tv program
Top man just love your tutorials - thank you very much for all the effort you put in to publishing these.
Thank you for watching
If we take all the content on this channel and compare it to other content out there we gonna find that this content here is not available out there, thats why this channel worth more than 1m$,
Oops I said that last time, by updating my packages, its worth now 1. 000000*10 b$
I really enjoy making these for all of you, I'm glad you think so highly of them!
How can I create phishing page
Please guide me
Steps to do this needed
@@NullByteWHT NSE: failed to initialize the script engine:
/usr/local/bin/../share/nmap/nse_main.lua:264: vulscan:7: unexpected symbol near '
Your content is just amazing. By far one of the best security channels I have ever seen. Love the cat images in the background ;) perfect reference to deep learning if you ask me.
Very useful, Kody and Tokyoneon number one!
Stumbled upon this site and love the content it helped me tremendously.
Glad it's helpful to you!
congratulations 500k dude hope keep going
Thanks
No dislikes damn! Btw keep up these tutorials they are awesome!
So good as usual. Thanks Kody. Been learning so much from you.
I'd love to scan my whole network at once for vulnerabilities since I have so many things connected here... But how would I do that instead?
Look into deploying Tenable Nessus Home. It's an excellent vulnerability scanner that is free for home use.
Just run the same scan but do the whole range of IPS in the network. Thats how u scan your whole network.
i watch all your videos really helpful 💖🔥 #nullbyte fan
@NullByte
Great content, and i'm lovin' extra energy in recent videos.
But could you please blink, at least once
You can have more energy or more blinking but not both
@@NullByteWHT I rlly don't know which comment is better XD
I always like the video before hitting play. Never regret it.
mocheford agreed. If you take the time to make a comprehensive video and make it available for free, it deserves likes.
Thank both of you, we don't make much from this so it's the community I do it for.
@@NullByteWHT What else do you guys do? How can people support you? Do you teach?
@@mr_mr wht doesn't want a patreon, so we're looking for other ways
thanks sir,,,, i'm from indonesia very like your channel
Can you proove you are human your eyes are not blinking
Que buenos videos! que buena terminación! seguí así maestro! gracias por enseñarnos!!!!!!!!
His eyes never blinking
Thank you bro this video helps me so much.....
Great tutorial man...
Thanks Sarika Payili! We really do put in a lot of hard work.
Always the best content... Great work mate !
How can u get a laptop, I need to start learning programming 🥺
Thanks Kody, your videos are very helpful as always ! Absolutely no regrets for subscribing at all. ;D
awesome content man!!
Amazing videos make me to try my kali linux machin and dig more things you make what i need to teach like this
Thanks Kody, excellent as always. Would be great to get an overview of how you got into hacking/InfoSec, experience and how you recommend getting into the industry.
Good idea BamBam, I've added it to the list of video ideas.
@Null Byte i have to find a Linux Kernel vulnerability on a machine however when i run the code i am unable to find the correct one, they are listed there but not the kernel one, any chance you can help
make a vid on pupy and how to bind the payload. thx again!
Exactly what directory would you clone the git repository?
(4:17) Like the vulscan and the nmap-vulners script. Thank you for sharing. One thing I am not clear about, it looks like you would have to pull the script down from Github and this is not out of the box script from Nmap?
Ignore - I went to your site and got my answer; a great write up by the way.
Did you lightly paint your laptop? How did you get the tint over your stickers, I like it.
Thnks ❤ work
Very intresting video, im quite late. But doesn't this leave alot of footprints?
Amazing content bro...
keep up the good work
Do you have much experience in the pentesting field?
This channel is fucking fantastic I love you
Great video bro thank you
Can we use that mnap script for bug bounty?
Pls how to interact with router by using python i want to write a code that do similar to reaver it send wps pin and receive output to see if the pin was correct . What module i have to use i heard of piramiko and scapy and heard that i have to logine to router by ssh but we need hostname to do that . Pls if you can do a video about it or tell me where i can find a answer . Thank you
If you get a error:
Try to list the scripts like this_ sudo nmap --script nmap-vulners/,vulns/ -sV [host]
hope it helped
love you man :)))
Kody my boy much love big fan.luv ur vids
We appreciate it bro please keep helping us tnx
Grat videos thanks ... Try to blink more !
Can you use nmap to perform authenticated scans?
awesome video, Keep it up :)
Thank You Kody Real 👽
Love you.... Thank you... Respect you...
Thank you!
can we do this for websites as well?
Hello, I get this following error:
failed to initialize the script engine
'vulscan' did not match a category, filename or directory stack traceback.
NullByte another diferents vulscan ? please tell me
i can use this to found host to create vpn connection? with for example: http injector?
Hey man! Could you do a video on metasploit? I’m a beginner and would like to learn from you, since you are so clear. Thx!
Yes, we can do that
Null Byte omfg thanks dude!!!
Is Nmap a noisy tool to use? From what I’ve heard, it’s easy to detect with a firewall or an IDS on the network.
U can work round that with -Pn or use -D and for decoy to spoof an IP you type in. So they don't really know its you if you don't want them to know that you scanned them.
Which version of Kali do you use?
u are best hacker ... bro u must be OSCP ?
I will test it today
How come I can run this command on my IP and get results, but I do not get any results with another computer on my network?
nice video bro
Thanks for the info!
Is there any way to discover available linux kernel network vulnerabilities ?
Pretty awesome ! 👍
Actually I want to ask one question that will this scan create a log file on target
@Null byte plzzz reply
Quick question about cracking wifi hashes : can an attacker be thinking that it got the right password if the target clients use wrong password when the handshake was captured?
An attacker launches deauth attack and listens for handshakes and in the time the attacker listens someone tries to connect to target wifi using wrong password then the attacker gets the handshake and tries to decrypt it and will the final password be the correct one or the invalid used by the someone who tried to connect while an attacker was listening?
Im sorry for my english
Yes after deauth is finished there is a possibility that someone is typing password right at that time and that u will catch wrong password he typed instead of other devices automaticly connecting back, tho the chances for that are almost close to 0
Hey bro, how are you doing? I’m having some trouble with assignment. I was wondering if you could reach out and we could get in contact and you could help me please
Hello, how can i get firewall name and version, tried wawoof, but its giving a wrong name. any other way?
can you do a video on bettercap 2 ??
Yeah that would be amazing. Thanks
PLEASE MAKE A VIDEO ON SQL INJECTION ATTACK
Hola cuando lo ejecuto el reporte sale diferente ... no sale la puntuación ni la url del cve
alguien que me pueda orientar por favor
please make a video about click jacking
When I execute git clone getting an error : bash: git: command not found... Failed to search for file: cannot update read-only report. Please help
Which company do you work for?
My friends and I produce videos independently, right now we manage Null Byte's channel
Please friend can u help .i install kali linux in my laptot and whene i want to back to windows 7 i cant .there is any solution god bless u
looking at your videos impressions you lately get a lot of attention. Make sure you secure your videos to reupload to vimeo or something.
LBRY is good too, its like RUclips, but decentralized, so complete content freedom.
Thank you so much!
Hi, do you use Kali inside VM on your computer?
Check this for more details
Is it possible to use these scripts on a android device using the turmux app?
Yes
How do u come up with this it’s amazing
Bro my nmap is giving error..
So how to solve that error?
Can you help me??
how to avoid arp detection of wireshark pls reply
how do i fix ‘all 1000 ports scanned are filtered’ ?
Will you do a review on the ALFA AC1900 adapter doing a wpa2 pw crack on kali linux, You're the best
i got one what a terrible setup hey haha
NSE: failed to initialize the script engine:
/usr/bin/../share/nmap/nse_main.lua:821: directory '/usr/bin/../share/nmap/scripts/vulscan' found, but will not match without '/'
stack traceback:
[C]: in function 'error'
/usr/bin/../share/nmap/nse_main.lua:821: in local 'get_chosen_scripts'
/usr/bin/../share/nmap/nse_main.lua:1312: in main chunk
[C]: in ?
QUITTING!
I got the same error
Kody how i use 2 wifi adapters in bridge mode to use in a evil twin / honeypot without virtual machine?
Gold!
Does anyone know the intro music?
Make a video with this theme please buddy
Hi. I need help. Whenever I am trying to do a Vulnerabilities scan or Service scan. I am receiving following error
AllProbes::compileFallbacks: Unknown fallback specified in Probe DNSVersionBindReqTCP: 'DNSVersionBindReq' .
Could you please help out solving this error or anyone can give any clue for the same?
Sorry I have no experience with that you should contact the devs.
why doesnt he blink 😨
Hi, i hope anyone can help me with this. when i execute "nmap --script vulscan,nmap-vulners -sV " everything was clean and i remember that the server was installed some apache 2.2 , so do i have to connect in the same network or i can do a vulscan on the public IP?
Be in the same network and don't perform on public ip's until you have permission to do so
@@vamsikrishna9737 yeah i have permission as i would like to use nmap vulscan to check for the vulnerability. but it doesnt show at all. appreciate any help?
@@garytan3531 if the commands you run are executing without any errors then I think the vunlerablity is patched or they are updated so you are not getting anything other way is to try Nessus or openvas
@@vamsikrishna9737 I used trial version nessus on the internal network and scan with bunch of vulnerabilities but when I use another computer not within the network to nmap vulscan no vulnerability.
good job
Good video
Thus script doesn't work anymore
After the python and kali updates
When he blinks, you need to blink.. try it out
At the point you run the script with nmap, should you also include techniques to hide from IDSs? Like decoys, bits and zombies to name a few
How to make a CVE ?
I like your cat pictures
Why is hour blurred?
To protect our aircraft
great trick