Metasploit For Beginners - #2 - Understanding Metasploit Modules
HTML-код
- Опубликовано: 6 окт 2024
- Hey, guys HackerSploit here, back again with another video. In this video, we will be starting the Complete Metasploit Course, that will take you from a beginner to expert with Metasploit.
The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development.
------------------------------------------------------
HackerSploit Website: hsploit.com/
Pure VPN Affiliate Link:
PureVPN: billing.purevp...
📗 Get My Courses at $10 Only!
The Complete Deep Web Course 2017:
www.udemy.com/...
I Hope you enjoy/enjoyed the video.
If you have any questions or suggestions feel free to ask them in the comments section or on my social networks as well as my blog.
✔️SOCIAL NETWORKS
-------------------------------
Facebook: / hackersploit
Twitter: / hackersploit
Discord: / discord
Kik Username: HackerSploit
Patreon: / hackersploit
--------------------------------
Thanks for watching!
Благодаря за гледането
感谢您观看
Merci d'avoir regardé
Grazie per la visione
Gracias por ver
شكرا للمشاهدة
देखने के लिए धन्यवाद
I am SO HAPPY that I found your channel!!!! Honestly you're my favorite when it comes to learning about tech
I'm from Brazil...
My english is not very good but I'm studying every day and your videos are very good for me.
Congratulations for the great work. :)
Merry Christmas!
Thank you very much, and merry Christmas and a happy new year to you too
Checkout simple.wikipedia.org/wiki/Main_Page for wikipedia articles in simple English that are easy to understand and help develop your english skills
Thanks, this gonna help a lot.
I've seen Americans with worse English then you bro.
the best metasploit explanation ever. Dude you are awesome . I like the ways you clearly explain concepts
Great tutorials. Thank you for your effort to teach us, the unenlightened ones, your powerful hacking skills. I'll keep watching your videos over and over until I really get a hand of your instructions.
Been following along, having a blast learning this thank you.
Wow you guys to go check out gwin_tech on Instagram men that guy is a genius and a computer freak and also reliable he’s the best 💯💯
sir, please start making videos on how to write exploit in detail from beginner level
Yeah pls
if you are looking at this video, then no, it's a really bad idea. It's a really time consuming and a hard thing to do. You don't just write a exploit, it takes time and thought and most people are not able to do it.
I think what you mean is you want to learn how to "use" the exploits within Metasploit. This is a very involved application and just learning to use a couple exploits is not enough. You need to start learning and researching how to use Metasploit including clearing your tracks.
@@ghosthookcc2050 What it takes is 1) A good knowledge of protocols and networking 2) Knowledge of programming hopefully in Ruby 3) A good general knowledge of Windows, Mac, Solaris, UNIX, etc. to write exploits for. But yes, you do JUST write an exploit. LOL
@@MajikCatSecurity No you dont just write a exploit you need a lot of knowledge not to mention that you need to know what you want to exploit and how to exploit it, so no you dont just write a exploit.
YOU ARE A LEGEND! Best videos and best explanations EVER . In 40 minutes already have gather a huge amount of information ! and not just that . Fully understood and in depth ! Thanks alot ❤
Now 'evasion' is added in cd /modules
auxiliary | encoders | exploits | nops | payloads | post | evasion
@Elroy Keaffaber lol its bot msg
@@8080VB even if you do hack the password its just gonna detect an unusual login and notify her
@@deltashot5608 Stop
@@8080VB its gonna notify the person whos account you tried to login, they will know, and then they will change their password and enable 2 factor authentication if they havent already
@@deltashot5608hmm hmm
Great video and refreshing to see the clear, diagram, on practicing, searching and exploring vulnerabilities, by OS's and sub-categories.
Thank you very much
Absolutely wonderful video. This completely takes away the overwhelming feeling you have when you realize all the different options that are available in msf. Also makes me realize that I need to start learning some basic Ruby.
I enjoyed thus particular episode as you kept encouraging even to those who don't know the basics and were very explanatory
This is a brilliant piece of work. I hope the rest of the series is exactly like this.👍
U said u used to crack windows activation key during school days!! Omg i wasted my school days
You are a gem in cyber community
Best value video for understanding metasploit, really really simple to understand the things. Thank you for the video
Welcome.
Glad to have found your videos. People who both take hacking seriously (non skids) who are willing to also be informative to noobs are hard to come by on RUclips. Thanks for your passion and dedication my friend #subscribe
Thank you very much for your understanding and interpretation of my work, I always strive to educate. Thanks! 😀
Your !! EXPLANATION !! IS !! fabulos !! THANK YOU VERY MUCH !!
I love You man, I truly do. Your the best in so many ways
how sexy to find a woman in here
@@amrozein8683 how sexy to be a thirsty idiot and get ignored :3
@@saulgoodman5662 how sexy to be a simp LuL
@@saulgoodman5662 and btw stop using my last name like this i feel u guys are calling me out :(
@@saulgoodman5662 why you were attracted to that comment, did it exploited you :P
felling like little chandler :D
I'm actually a black and I find it sweet cos deep down me I wanna be a White hat but I don't have the tools for it but I don't know if Termux non root is okay to be a White hat....
I've really learnt alot from you HACKERSPLOIT ☺️☺️☺️...
I just wish you were one of my brothers ☺️☺️☺️☺️☺️
To open a new tab in the terminal, use the shortcut CTRL+SHIFT+T
not always the case, in my manjaro vm with i3wm it's actually super+enter
he knows that. he just does it that way so its easier to follow
very helpful to be able to go back to the beginning when I get lost, I dig this series! 😎
very detail explanation and hope to hear further more hacking tools from you
Wonderful video! Thank you gentlemen! Om Nama Shivaya
It's just getting good. Don't stop the vids. Do more wireless wpa2 cracking or client/server side attacks without client authentication
Alright.
HackerSploit or maybe reliable delivery methods for the payloads... excluding physical access and social engineering....as far as the wpa2. I'm tired or using evil twins and key loggers. Aircrack takes to long. Pyrit has been working for me,but that's still in hopes of having the exact psk in your word list. & I'm tired of everyone's only answer being use "fluxion".. any input or vids would be great! Love your series about metasploit. Keep em coming
Value FOUND! 👍😎 Thank You Sir
great explanation of metasploit. It is all so much clearer now . Many thanks for these 2 videos :)
There is a new category added in metasploit, evasions
like he dont know it till know, plz shazy plz
@@User00571 The comment wasnt for him. That was for beginners
@@Shahzaib786ik 👍
i love this channel you explain everything very well. im currently just messing around with some windows xp vm, seeing how many different exploits i can use to actually break shell. open for a couple ideas, getting kinda bored.
Awesome, I am glad you enjoy the videos.
When is the next video coming up? I really like those videos about Metasploit, I learn a lot from them! ;D
They will be coming.
I'm taking a bunch of notes here mate. Takes me instantly back to school :-) Great and helpfull explanation of the Metasploit series! Thank you sir!
Dont take notes , only register into your mind
Learning "nops" is very important. real-life scenarios are not like a lab environment.
Awesome explanation, thank's dude! I'm in the web app testing field for some time and I'm starting my transition into the pen testing area (or at least that's the plan).
Watched only two of your videos but I'm sure they will become even better later on. I have few questions for you and I would be really happy if you find the time to answer them.
Is ADVANCED Linux knowledge mandatory for a pen tester to be better at his job? In that sense should I try to focus on Linux first and then go with the tools?
Which certifications would you recommend to take prior to start looking for a job? Do you thin they are important?
Can you say that learning the tools is probably the most vital part of becoming a pen tester?
Is it vital if you don't understand the very deep details about let's say buffer overflow exploits? Is it enough to just know that it's possible and how to execute it?
Thanks again, keep up the good work!
Hello,
Thank you for the support and i am glad the videos are helping you.
I would recommend learning Linux and networking first ( The Linux+ and Network + certifications are available)
You can then move on to hacking, where certification like CEH will come in handy.
Yes, a good understanding of tools is very important.
thank you for doing these videos its amazing
im beginner,can you give me any suggestion or recommendation?
My favourite Lecture ..🥰
If u can't find the modules type /opt/metasploit-framework/embedded/framework/modules
Hey Alexis, would you consider making a playlist of this series?
Thanks for all the content it is beyond helpful!
Thank you sir for making this video.
Excellent video!!! Keep up the great work!!!
Great tuts, man. It would be amazing if you’d plan your videos upfront that helps with English and the flow. You’ve missed “posts” explanation :(
Who else noticed this: "In payloads you can find even rootkits, **um shit I shouldn't said that so clearly, let me fix** well they separated and not all the payloads are rootkits" *lol*
He smoked cat-nip 😃
Bro, I have a doubt, as you said ,In metasploit payloads are created based on vlunerability, if the vlunerability is fixed by the victim then how this payloads are working in feature?
great stuff.. thank you
Can anyone suggest more good channels like this ... which can help for OSCP?
Thanks.
Thank's a lot for this great job. You are very useful to me.
Welcome.
Hi could you talk about workgroups.
IF I HACKED AN ANDROID PHONE USING METASPLOIT BY SENDING AN APK,HOW CAN I ACCESS THE HACKED ANDROID DEVICE LATER?
thank you so much mate!
give a complete video on how to be anonymous in android or while using termux in android
Hey Hackersploit, i was wondering if you could teach us how to use Tails OS. It seems to be the closest thing to "safe" .net surfing. And I know that with Tails it is verey important to configure EVERYTHING correctly and maybe how we can test that connection by a self-pen test own our newly configured network. Your channel gives me great inspirartion. cowsay "Namaste"
Lol, i just found your vid on it. Hahaha well, im still leaving the post. :^) or what realy gets me intersted is how even the white spaces in a line of code matters. How say a certain name of file bieng so many bytes can turn into "magic" files. I like getting down to the byte in code ... it's so easy to explain if i were in a terminal.....
+Mr Go Fuck Yourself Haha I'm glad you get it
Please upload the hashing videos and steganography and cryptography videos
does it actually work nowadays in real life with all the vulns closed quickly and old ones not opened with new computers. this videos is pretty old. what do you recommend . is there another pen testing framework which is being used with pen testers
17:02 my man just woke up and started spitting facts
Thank you sir for amazing lecture .. one quick question when I am in msf console and i use exploit it say “couldn’t find the module” what should I do to use exploit..... I can use payload or auxiliary but not exploit....
try apt-get update or apt-get upgrade
your videos are awesome make further videos on metasploit
Thank you very much.
Great great great great 👌 😎
Best tutorial ever
Hello I am writing to say that when I am inside /usr/share/ there is a /metasploit-framework/ but I cannot direct to it?
try longing as root or add sudo at the start of the command
I wish I could count the number of times you said "Very very" but I'm so focus on understanding the core functionality of Metasploit framework 😂
Wish they'd add some stuff for TempleOS. Everyone knows TempleOS is the most popular operating system around
Sir I have compromised a network and now I want to jump on another network how will I do this
Thank you, that was very useful
Thank you 🙏🏽
thank you for all your work you are pretty awesome
thank you very much
Great content, amazing...
hello sir, i have a question related to privilege escalation technique book, the book cost is so high is there any boucher to get at lowest price if it is avail please refer me sir
I want to learn metasploit over the network????
Great video! I am confused on one thing. The "cd /usr/share/metasploit-framework/" command only works in rootkali# and not msfconsole. Why is this?
your "rootkali#" that you are using is your root folder to your OS vs msfconsole being the "program" that is used. I.E., you can find all directories via the terminal but not through msf.
Did that help?
I cant find ls -all on the termux application please help me if possible !! What i need to do !!
Yo! the discord link doesn't work, btw good videos
i am new to all this realy help me thks :)
What does the pdf subdirectory do under auxiliary module?
Finally bro found his keyboard ⭐⭐
you are great man
that kali interface is cool does anyone know what it is?? ?
Amazing video , tysm
Generally love your videos xxx
Sir please help me starting the payload handler..not showing
Superb vedio 🙏👍🔥
you are awesome man but we need someone to delve into details plz
What details
you know like how to hack wireless networks step by step plz
Ok
I think that after some time things like that will be shown
Abd Qz that's where google comes into play he can only tell how to work the program if he went into detail videos be hours long. If u want to learn u need to research and study on ur own. Thats only way you are going to learn
Where do I learn more about this bitcoin jacker file.?
Thank you so much!
1:28(1st part of modules.)
10:56 part 2 1st module-18:41
your subscription at your own webpage is not working
Thanks for the video.
good work
beautiful.
Thank You Sir !
There is a new one on Metasploit called Evasion. What is this new module?
there's only a few modules in there and they all deal with evading windows applocker or windows defender
I can't found the modules in that directory
Hi thanks for the video, can I still follow your kali linux tutorials even if I dual booted my laptop instead of using vm??. Would the tutorials still work for me? Thanks
Yes they will work just fine
@HackerSploit great videos
Hey @hackersploit...Is there any good book over metaploit which could further elaborate about these attacks given here.Peace !
repo.zenk-security.com/Metasploit/Metasploit-The%20Penetration%20Tester%20s%20Guide.pdf
whats the games folder for in windows folder in modules folder?
THE BEST VIDEO EVER
when i am typing ls command in modules its displaying nothing can anyone please say why
thanks man
bash: cd: /usr/share/metasploit=framework/: No such file or directory
what shold i do to overcome this error?
Great video. Ty