Simple Penetration Testing Tutorial for Beginners!
HTML-код
- Опубликовано: 17 мар 2022
- // Membership //
Want to learn all about cyber-security and become an ethical hacker? Join this channel now to gain access into exclusive ethical hacking videos by clicking this link: / @loiliangyang
// Courses //
Full Ethical Hacking Course: www.udemy.com/course/full-web...
Full Web Ethical Hacking Course: www.udemy.com/course/full-web...
Full Mobile Hacking Course: www.udemy.com/course/full-mob...
// Books //
Kali Linux Hacking: amzn.to/3IUXaJv
Linux Basics for Hackers: amzn.to/3EzRPV6
The Ultimate Kali Linux Book: amzn.to/3m7cutD
// Social Links //
Website: www.loiliangyang.com
Facebook: / loiliangyang
Instagram: / loiliangyang
LinkedIn: / loiliangyang
// Disclaimer //
Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against the real hackers. - Наука
I bought your cours. Its great !
*e
What is the link
Which website he uploaded the course...
Can i get video after buy this course?
on kali linux on my VM workstation, on any of loi's videos, I cannot execute most of the commands, to get practice in these ethical hacking instructions
Been in a cyber security program for almost 6 months and you basically taught me more than all my instructors combined 🤦🏻♂️
Facts they don’t teach nothing frfr
Then your instructors really suck
Then you don't focus on your lessons
What cyber security course are you on? Most won't cover pentesting in any detail, they will cover it's purpose and objectives with some info on Kali and common areas of attack but nothing more, unless you are on an actual pentesting course.
the passion for this sector has no limits... massive thanks Mr loi
You are the treasure for any cybersecurity student, you are absolutely gold.
yeah but he doesn't explain why he chooses the directories he wants to target he just chooses seemingly randomly
The best short tutorial i’ve ever seen 👍🏻❤️
Thanks for making this, when i got ingame, the menyoo wouldn't load when i pressed F8, but now it works, thanks again!
I am a programmer for a long time and moving to cyber security and it looks challenging. Well done tutorial.
how was your experience so far, is it worth ?
He didnt show anything useful.
Wow I would love to learn from you all about hacking..... and your content is amazing it is absolutely fantastic keep it up...and most of all a big HUGE THANK YOU!!!!👌👌👌👌
Just JOINED - so excited to start this journey!!!
this is literally the best video. sums up extremely well what i've been studying for the last few months in 15 minutes... for free!
You're right 😌
thresh is a penetration tester?!
Thresh is a hacker????
@@nhatduy9125 u mean hooker lol
I feel like this just shows what I've been working on in a very quick and summed up way. Of course, if I was watching this before I'd started studying, I wouldn't understand jack shit. I'd be sitting here wondering why he was doing what he was doing and why it was working. Very nice video to show how a very basic pentest might go down
Holy dang, that was wild to watch. You're quick and know your way around these things, that's amazing! (And scary)
Loi sir 🙏🙏🙏 ❤️❤️ this is soo much informational video, as I'm stepping into cyber security domain , this really helped me to push my thought process while penetration testing, you are the best teacher and my mentor , please make more such videos we all love to see , how these bugs can lead to a more sophisticate level of exploit and post exploitation , and your valuable steps to be taken care of to protect the system , love from a future cybersecurity engineer ❤️❤️🙏🙏
Thank You so Much sir Loi Liang Yang you are always doing great tutoriel on security, hacking, penetration testing , vulnerability
I am glad you made this video. Very helpful.
Wow! I am an ex software engineer, now moving into the realm of hardware engineering, specifically into IoT. This complex subject is explained really well, with lucidity and clarity. Thank you Loi!
You must have a very bad teacher, because he did not show anything. Linux, yeah, but behind a firewall. You need to get access to internal infra, after that the world is yours. Now try to get through DMZ.
I just don't understand how he got through DMZ first, after that, it is fucking cake. We learned that in first quarter.
@@antonpodolsky2273 go play with your dolls fool. Who do you think you are.
Wait you havent tackled this during your studies?!? Your engineering degree is crap then.
Thanks for the lesson. Just brought soft soft
Best video i watched till now in cybersecurity. great work
You're better than some of my cybersec professors.
As always very interesting video. Thanks!
This is an eye-opening video for me, I am glad that I found it, great video.
This was awesome to watch! Subbed!!
this is great mentor. I am learning from your videos everyday want to be like u
Very well presented. Thank you
I barely started getting into penetration testing and this linux video completely fried my brain loll
THE CHANNEL I BEEN LOOKING FOR!!! Always was a PC gamer, now im grown and wanna move into a skill, and nothin seems cooler than bein red team. In the process of learning coding and OS linux with CS50 harvard course. not sure where to go after? maybe a road map for noobs???
thansk very much Loi Liang ,i am learn with you
3 Videos at once good job
New to your channel and love your teaching style and likes to know how one can become your apprentice without any tech learning?
Thankyou for help.Gonna try pen testing for a liveing. 🙏
I am big FAN of yours because I love hacking and coding
Sir you are my mentor!
What you explain about reverse shell make me understand in just a few minute, compare to what the lecturer have been teaching for the past few lessons ......
That was great information thank you for the video
Thanks for the video, very interesting stuff, You should make another vid to show how to protect yourself from this type of breach
Really simple and easiness.
thank you sir you save us from our reporting
Your video is always best 😱
Wow. Great class
Great video, i have one question before even scanning do you assume access to the organization network already to be able to see the scanned devices? I'm stuck and really want to understand this very first step before even scanning the network
Very good content! And quite funny, hacker loi!
I wish you would explain deeper for what you need for it like networks and what kind of routers and ect
Wow that was a very valuable information
This man is a legend
Great job 👍 😎
Idol I'm always inspired I watched you everyday you very genius I salute you idol that is my ambition tobecome expert with penetration testing idoñ
Roadmap for learning reverse engineering 🙏🙏❤️
Senor Loi, thank you for your awesome videos and educational content that go a long way in helping me pursue my career in ethical hacking. Quick question at time stamp 449 you show an "index of" the Apache website. How did you access it? It appears it is on its own page? You say Kali tool?
Thank you again and keep creating great vids!
I love this tutorial
I run a cyber security club at my University and I wanted to set this up as lab and was wondering if you had a tutorial on how to set it up
“For beginners” 💀
Ngl if this is complex you should probably learn foundations first. How to use Linux, what Cybersecurity is, etc.
@@fightme5543thats what i came here for and now Im on a list
@Loi Liang Yang how would you protect yourself against such attacks. Would a 2fa device with physical interaction be sufficiant?
Thanks bro.
Nice approach
impressive work....
Really appreciate you ❤
Mr. Loi is the best!!!!!
Thank you
You are lucky my favourite nice tuto is nice tuto
Amazing teacher. How do you remember all those commands?
wtf Loi you're such amazing hacker!!
TY.
Big fan, a course would be perfect
Do you want to be promoted to an air conditioner
Do you have a video on how, you get organized, notes, prioritize, etc in a Pen test with multiple hosts? i.e. how do you get organized with what could seem like info overload? - Thanks, great video!
Solid, Sir 💯/💯
Very interesting!
Your inteernet is .....💥💥💥💥💥💥💥
Good stuff.
I’ve travelled pretty extensively and I’ve heard quite a few accents over the decades but I’ve never heard quite an accent like yours. Subscribing.
Love you bro 🔥❤️
Very complex
Excellent Video Loi Liang Yang.
I'm looking to expand my carrier into cybersecurity and with ethical hacking. However, I'm wondering would anyone be able to scan a network without actually be on that network in the first place. I'm puzzled how would this would work in an organization environment where you have to go pass domain logins before getting on the network. Do we assume that you will be provided the domain name credentials, before doing any ethical hacking stuff?
I'm super new to this and confused, please can anyone help me understand this gap which I'm having
Thanks in advance.
Usually there is a way to somewhat easily penetrate from the outside to get into the internal environment. Spearphising, default credentials or vulnerabilities on a public facing asset, etc. Once in, then credential theft, escalating privileges, etc, let you move laterally throughout the organization to get to sensitive assets and data.
To me this tutorial makes no sense in a real world scenario.
Your are awesome!
you didnt explain about the exploit-db script.why you took that particular script?
is python effetive for penetration testing as well ? or only kali linux?
great video
Thanks for this, my question is : Do you need to be connected to the target network? Or i can do this externally too with an external IP target
This scan we can do in our internal network? Or in the internet? In other words, what I'm scanning exactly?
Can you please show tutorial on Gophish too?
I am a brand new student. I have not launched anything yet. Got it all downloaded and ready to go. I want to know what should I do? I’m going to listen and binge watch all of your videos
Isn’t a way to scan all ports -p- too for Nmap?
Tanks U
هل يمكن أن تقوم بعمليه صنع فيروس الفديه
Sir can you please do advanced network penetration course, please a humble request for a subscriber
Hii sir i am big fan
Fabulous vid
Im confused. If you are on windows then you need to install nmap first. How would that help you if the program is not already installed on the device?
What machine from vulnhub do you use?
Thank you for the information! For the last few yrs I have been a toy to people! I watch a few videos of your after someone shut down my router shut me out of my phone and order a Uber ride ! I have never felt helpless!
another level
OMG what a tutorial
Good afternoon sir (According to Indian standard time)How do you fix trouble shooting in your Kali machine
Cool diction! Is this voice is really your? I will using your videos for improve my english in addition to theirs direct purpose.
hi do i need to be part of predator network before i scan
You can also recover email add?
Thanks bro Loi
Good job Hacker Loi, thanks , i learned alot from your tutorials.
Hello Loi, you lost me at 7:40
How did you set the targets ?
Did you type out THE FOLOWING COMMANDS > set RHOSTS
> set RPATH
Hello so I’m following exactly your steps but at 7:36 and 7:37 when you high light HEADRE User-Agent what do you do after? Because I don’t have the there lines you show right after this! The error i get is: failed to validate: RHOSTS
great!!
Bro can you help me.
On Metasploit, meterpreter & AndroRAT when i generate Apk file. & then run in android so, then nothing working....
Can you help me please. What i do???