ofc a lot has changed in 5 years, but this video is still highly discoverable and helpful with nmap 7.94 worth mentioning, nmap users now must include "vulscan/vulscan.nse" and/or "nmap-vulners/vulners.nse" after the --script. not just "vulscan" anymore, or youll get an error for empty directory
Man Kody scares the shit outta me!! lol I mean like i wouldn't wanna piss him off! But they do produce some pretty amazing content! I'm training to become a PenTester now and between this channel and Cybrary I'll be penetrating people's networks in no time!
Give this guy a like, he is taking the time to share the knowledge to even the beginners and he has great tips! One of my favorites.. Thank you 🙏, you are appreciated!
Null Byte No Thank YOU! Your taking the time to do what many hackers/pentesters etc and pass on your skill.. Most of the people have the attitude of I”learned it myself, and so should you” But some people need a push.. And u are that push for me, you made me go buy a raspberry and WiFi adapters, first time I clips influenced me like this so keep doing what ur doing..Do you provide any online courses that i can take and pay for like live sessions, that would be so dope.. You are appreciated 🙏 .
Your content is just amazing. By far one of the best security channels I have ever seen. Love the cat images in the background ;) perfect reference to deep learning if you ask me.
If we take all the content on this channel and compare it to other content out there we gonna find that this content here is not available out there, thats why this channel worth more than 1m$, Oops I said that last time, by updating my packages, its worth now 1. 000000*10 b$
(4:17) Like the vulscan and the nmap-vulners script. Thank you for sharing. One thing I am not clear about, it looks like you would have to pull the script down from Github and this is not out of the box script from Nmap?
Pls how to interact with router by using python i want to write a code that do similar to reaver it send wps pin and receive output to see if the pin was correct . What module i have to use i heard of piramiko and scapy and heard that i have to logine to router by ssh but we need hostname to do that . Pls if you can do a video about it or tell me where i can find a answer . Thank you
U can work round that with -Pn or use -D and for decoy to spoof an IP you type in. So they don't really know its you if you don't want them to know that you scanned them.
Thanks Kody, excellent as always. Would be great to get an overview of how you got into hacking/InfoSec, experience and how you recommend getting into the industry.
@Null Byte i have to find a Linux Kernel vulnerability on a machine however when i run the code i am unable to find the correct one, they are listed there but not the kernel one, any chance you can help
Quick question about cracking wifi hashes : can an attacker be thinking that it got the right password if the target clients use wrong password when the handshake was captured? An attacker launches deauth attack and listens for handshakes and in the time the attacker listens someone tries to connect to target wifi using wrong password then the attacker gets the handshake and tries to decrypt it and will the final password be the correct one or the invalid used by the someone who tried to connect while an attacker was listening? Im sorry for my english
Yes after deauth is finished there is a possibility that someone is typing password right at that time and that u will catch wrong password he typed instead of other devices automaticly connecting back, tho the chances for that are almost close to 0
Hi. I need help. Whenever I am trying to do a Vulnerabilities scan or Service scan. I am receiving following error AllProbes::compileFallbacks: Unknown fallback specified in Probe DNSVersionBindReqTCP: 'DNSVersionBindReq' . Could you please help out solving this error or anyone can give any clue for the same?
Hi, i hope anyone can help me with this. when i execute "nmap --script vulscan,nmap-vulners -sV " everything was clean and i remember that the server was installed some apache 2.2 , so do i have to connect in the same network or i can do a vulscan on the public IP?
@@vamsikrishna9737 yeah i have permission as i would like to use nmap vulscan to check for the vulnerability. but it doesnt show at all. appreciate any help?
@@garytan3531 if the commands you run are executing without any errors then I think the vunlerablity is patched or they are updated so you are not getting anything other way is to try Nessus or openvas
@@vamsikrishna9737 I used trial version nessus on the internal network and scan with bunch of vulnerabilities but when I use another computer not within the network to nmap vulscan no vulnerability.
NSE: failed to initialize the script engine: /usr/bin/../share/nmap/nse_main.lua:821: directory '/usr/bin/../share/nmap/scripts/vulscan' found, but will not match without '/' stack traceback: [C]: in function 'error' /usr/bin/../share/nmap/nse_main.lua:821: in local 'get_chosen_scripts' /usr/bin/../share/nmap/nse_main.lua:1312: in main chunk [C]: in ? QUITTING!
Hey bro, how are you doing? I’m having some trouble with assignment. I was wondering if you could reach out and we could get in contact and you could help me please
ofc a lot has changed in 5 years, but this video is still highly discoverable and helpful with nmap 7.94
worth mentioning, nmap users now must include "vulscan/vulscan.nse" and/or "nmap-vulners/vulners.nse" after the --script. not just "vulscan" anymore, or youll get an error for empty directory
I love this channel so much. I learned a lot of things, especially writing your own script. That was amazing.
I'm glad it's helpful! Thanks for watching
Kody, you and your team need a tv program. I Love what you do and I’m sure I ain’t the only one.
Man Kody scares the shit outta me!! lol I mean like i wouldn't wanna piss him off! But they do produce some pretty amazing content! I'm training to become a PenTester now and between this channel and Cybrary I'll be penetrating people's networks in no time!
@@roberthorn6707 Hahaha thank you
@@roberthorn6707 lols right! I don't think anyone wants to land on his blacklist. That has to be a pretty scary spot to be in.
@@NullByteWHT Kody, If you ever do a meet & greet somewhere let me know I'm very interested, sounds like a lot of fun.
Jean Suriel what is tv program
Give this guy a like, he is taking the time to share the knowledge to even the beginners and he has great tips! One of my favorites.. Thank you 🙏, you are appreciated!
Thank you!
Null Byte No Thank YOU! Your taking the time to do what many hackers/pentesters etc and pass on your skill.. Most of the people have the attitude of I”learned it myself, and so should you” But some people need a push.. And u are that push for me, you made me go buy a raspberry and WiFi adapters, first time I clips influenced me like this so keep doing what ur doing..Do you provide any online courses that i can take and pay for like live sessions, that would be so dope.. You are appreciated 🙏 .
Top man just love your tutorials - thank you very much for all the effort you put in to publishing these.
Thank you for watching
Your content is just amazing. By far one of the best security channels I have ever seen. Love the cat images in the background ;) perfect reference to deep learning if you ask me.
Stumbled upon this site and love the content it helped me tremendously.
Glad it's helpful to you!
Very useful, Kody and Tokyoneon number one!
So good as usual. Thanks Kody. Been learning so much from you.
If we take all the content on this channel and compare it to other content out there we gonna find that this content here is not available out there, thats why this channel worth more than 1m$,
Oops I said that last time, by updating my packages, its worth now 1. 000000*10 b$
I really enjoy making these for all of you, I'm glad you think so highly of them!
How can I create phishing page
Please guide me
Steps to do this needed
@@NullByteWHT NSE: failed to initialize the script engine:
/usr/local/bin/../share/nmap/nse_main.lua:264: vulscan:7: unexpected symbol near '
congratulations 500k dude hope keep going
Thanks
I'd love to scan my whole network at once for vulnerabilities since I have so many things connected here... But how would I do that instead?
Look into deploying Tenable Nessus Home. It's an excellent vulnerability scanner that is free for home use.
Just run the same scan but do the whole range of IPS in the network. Thats how u scan your whole network.
No dislikes damn! Btw keep up these tutorials they are awesome!
Que buenos videos! que buena terminación! seguí así maestro! gracias por enseñarnos!!!!!!!!
(4:17) Like the vulscan and the nmap-vulners script. Thank you for sharing. One thing I am not clear about, it looks like you would have to pull the script down from Github and this is not out of the box script from Nmap?
Ignore - I went to your site and got my answer; a great write up by the way.
Pls how to interact with router by using python i want to write a code that do similar to reaver it send wps pin and receive output to see if the pin was correct . What module i have to use i heard of piramiko and scapy and heard that i have to logine to router by ssh but we need hostname to do that . Pls if you can do a video about it or tell me where i can find a answer . Thank you
Exactly what directory would you clone the git repository?
thanks sir,,,, i'm from indonesia very like your channel
i watch all your videos really helpful 💖🔥 #nullbyte fan
@NullByte
Great content, and i'm lovin' extra energy in recent videos.
But could you please blink, at least once
You can have more energy or more blinking but not both
@@NullByteWHT I rlly don't know which comment is better XD
Thank you bro this video helps me so much.....
Great tutorial man...
Thanks Sarika Payili! We really do put in a lot of hard work.
I always like the video before hitting play. Never regret it.
mocheford agreed. If you take the time to make a comprehensive video and make it available for free, it deserves likes.
Thank both of you, we don't make much from this so it's the community I do it for.
@@NullByteWHT What else do you guys do? How can people support you? Do you teach?
@@mr_mr wht doesn't want a patreon, so we're looking for other ways
Is Nmap a noisy tool to use? From what I’ve heard, it’s easy to detect with a firewall or an IDS on the network.
U can work round that with -Pn or use -D and for decoy to spoof an IP you type in. So they don't really know its you if you don't want them to know that you scanned them.
Thanks Kody, excellent as always. Would be great to get an overview of how you got into hacking/InfoSec, experience and how you recommend getting into the industry.
Good idea BamBam, I've added it to the list of video ideas.
Always the best content... Great work mate !
make a vid on pupy and how to bind the payload. thx again!
awesome content man!!
Amazing videos make me to try my kali linux machin and dig more things you make what i need to teach like this
Did you lightly paint your laptop? How did you get the tint over your stickers, I like it.
Thanks Kody, your videos are very helpful as always ! Absolutely no regrets for subscribing at all. ;D
Hello, I get this following error:
failed to initialize the script engine
'vulscan' did not match a category, filename or directory stack traceback.
Amazing content bro...
His eyes never blinking
Great video bro thank you
keep up the good work
@Null Byte i have to find a Linux Kernel vulnerability on a machine however when i run the code i am unable to find the correct one, they are listed there but not the kernel one, any chance you can help
Do you have much experience in the pentesting field?
We appreciate it bro please keep helping us tnx
Thank You Kody Real 👽
How do u come up with this it’s amazing
Love you.... Thank you... Respect you...
Thank you!
Hey man! Could you do a video on metasploit? I’m a beginner and would like to learn from you, since you are so clear. Thx!
Yes, we can do that
Null Byte omfg thanks dude!!!
Thnks ❤ work
Thanks for the info!
If you get a error:
Try to list the scripts like this_ sudo nmap --script nmap-vulners/,vulns/ -sV [host]
hope it helped
love you man :)))
I will test it today
Can you use nmap to perform authenticated scans?
Which version of Kali do you use?
When I execute git clone getting an error : bash: git: command not found... Failed to search for file: cannot update read-only report. Please help
Pretty awesome ! 👍
Please friend can u help .i install kali linux in my laptot and whene i want to back to windows 7 i cant .there is any solution god bless u
Can you proove you are human your eyes are not blinking
nice video bro
i can use this to found host to create vpn connection? with for example: http injector?
Is there any way to discover available linux kernel network vulnerabilities ?
Can we use that mnap script for bug bounty?
Quick question about cracking wifi hashes : can an attacker be thinking that it got the right password if the target clients use wrong password when the handshake was captured?
An attacker launches deauth attack and listens for handshakes and in the time the attacker listens someone tries to connect to target wifi using wrong password then the attacker gets the handshake and tries to decrypt it and will the final password be the correct one or the invalid used by the someone who tried to connect while an attacker was listening?
Im sorry for my english
Yes after deauth is finished there is a possibility that someone is typing password right at that time and that u will catch wrong password he typed instead of other devices automaticly connecting back, tho the chances for that are almost close to 0
Hello, how can i get firewall name and version, tried wawoof, but its giving a wrong name. any other way?
Grat videos thanks ... Try to blink more !
This channel is fucking fantastic I love you
How can u get a laptop, I need to start learning programming 🥺
How come I can run this command on my IP and get results, but I do not get any results with another computer on my network?
awesome video, Keep it up :)
Thank you so much!
Very intresting video, im quite late. But doesn't this leave alot of footprints?
can we do this for websites as well?
Kody my boy much love big fan.luv ur vids
Hi. I need help. Whenever I am trying to do a Vulnerabilities scan or Service scan. I am receiving following error
AllProbes::compileFallbacks: Unknown fallback specified in Probe DNSVersionBindReqTCP: 'DNSVersionBindReq' .
Could you please help out solving this error or anyone can give any clue for the same?
Sorry I have no experience with that you should contact the devs.
Gold!
Which company do you work for?
My friends and I produce videos independently, right now we manage Null Byte's channel
how do i fix ‘all 1000 ports scanned are filtered’ ?
Kody how i use 2 wifi adapters in bridge mode to use in a evil twin / honeypot without virtual machine?
Hi, do you use Kali inside VM on your computer?
Check this for more details
Bro my nmap is giving error..
So how to solve that error?
Can you help me??
u are best hacker ... bro u must be OSCP ?
Actually I want to ask one question that will this scan create a log file on target
@Null byte plzzz reply
Is it possible to use these scripts on a android device using the turmux app?
Yes
Hi, i hope anyone can help me with this. when i execute "nmap --script vulscan,nmap-vulners -sV " everything was clean and i remember that the server was installed some apache 2.2 , so do i have to connect in the same network or i can do a vulscan on the public IP?
Be in the same network and don't perform on public ip's until you have permission to do so
@@vamsikrishna9737 yeah i have permission as i would like to use nmap vulscan to check for the vulnerability. but it doesnt show at all. appreciate any help?
@@garytan3531 if the commands you run are executing without any errors then I think the vunlerablity is patched or they are updated so you are not getting anything other way is to try Nessus or openvas
@@vamsikrishna9737 I used trial version nessus on the internal network and scan with bunch of vulnerabilities but when I use another computer not within the network to nmap vulscan no vulnerability.
good job
NSE: failed to initialize the script engine:
/usr/bin/../share/nmap/nse_main.lua:821: directory '/usr/bin/../share/nmap/scripts/vulscan' found, but will not match without '/'
stack traceback:
[C]: in function 'error'
/usr/bin/../share/nmap/nse_main.lua:821: in local 'get_chosen_scripts'
/usr/bin/../share/nmap/nse_main.lua:1312: in main chunk
[C]: in ?
QUITTING!
I got the same error
Hey bro, how are you doing? I’m having some trouble with assignment. I was wondering if you could reach out and we could get in contact and you could help me please
Good video
NullByte another diferents vulscan ? please tell me
can you do a video on bettercap 2 ??
Yeah that would be amazing. Thanks
Does anyone know the intro music?
At the point you run the script with nmap, should you also include techniques to hide from IDSs? Like decoys, bits and zombies to name a few
how to avoid arp detection of wireshark pls reply
Hola cuando lo ejecuto el reporte sale diferente ... no sale la puntuación ni la url del cve
alguien que me pueda orientar por favor
Will you do a review on the ALFA AC1900 adapter doing a wpa2 pw crack on kali linux, You're the best
i got one what a terrible setup hey haha
great trick
looking at your videos impressions you lately get a lot of attention. Make sure you secure your videos to reupload to vimeo or something.
LBRY is good too, its like RUclips, but decentralized, so complete content freedom.
Thanks
PLEASE MAKE A VIDEO ON SQL INJECTION ATTACK
please make a video about click jacking
Thus script doesn't work anymore
After the python and kali updates
I like this video
why doesnt he blink 😨
Does not work anymore
Make a video with this theme please buddy
Why do they recommend kali linux always, can't i do such stuff on ubuntu?
It already has a lot of required tools and drivers preinstalled.
Null Byte so that means that other versions of linux all can do the job but you have to install lots of tools first.
Thannks :)