yea step by step videos that make things easy to understand is how you get more subscribers, and videos where you actually talk your audience in my opinion anyway.
Question, I have created keylogger in bat file using SET but how can i use it to log someone''s keystroke? everytime I open it its just words there. is it supposed to be an exe file?
alguien sabe que adaptadores wifi para modo monitor e inyeccion de datos y punto maestro (crear un punto de acceso falso) que sirvan tambien para utilizarlo desde un celular
Please write to me on Twitter or Instagram. I get too many comments and I lose track. If you need a one on one question, please reach out or join my discord.
it can, but that introduces additional complexity with networking, however the killchain displayed here 100% works on public networks if the chain is complete from attacker to victim machines
Indeed totally watching for educational purposes
Awesome. Learning is the key 🔐
Great tutorial. You made it very easy to understand. Thanks
Videos like this go so much further
I enjoy watching and learning with your videos..thanks brother.
Glad to hear it. Thanks for the comment and continue learning
This helped me so much with my assignment! Thanks a lot man!
Glad it helped! You’re so welcome 😉
love the videos mate keep it up easy to follow, just what we need
Thank you so much. I’m glad you enjoyed the videos.
liked it man good work
im subscribing u
Thanks and welcome
Thanks brother
Welcome
Thanks you so much
Most welcome
awesome video.....
Thank you 🙏. I appreciate it
Can you record a movie about how to set exploit or payload or evasion in metasploit?
Thanks. Quick one if we not in the same subdomain and also if we using Nat how to do that in our vm.
Did I miss a part he had another terminal already set up? no explanation?
can someone explain?
exactly
How do you access the directory I got stucked there
can someone explain?
For example i see less smb in metasploit but in want more of them in metasploit
thx bro
You’re very welcome it’s my pleasure thank you.
Thxx
You’re welcome 😉
great explanation enjoyed it
Appreciated!
yea step by step videos that make things easy to understand is how you get more subscribers, and videos where you actually talk your audience in my opinion anyway.
I don’t understand the page you open at 5:01. Please explain the ls. Thank you
I followed all the steps and opened the payload.exe on my Windows 7 computer but no session started in Kali
@InfoSec Pat so how do I fix this?
Question, I have created keylogger in bat file using SET but how can i use it to log someone''s keystroke? everytime I open it its just words there. is it supposed to be an exe file?
what apk to use windows 7 in kali linux?
If this works on windows 11 would be great xd
I can't use python command. There is something to download?
5:21
Trying using 'python3 -m http.server 80' instead
same problem. I love how creator liked comment but didnt say a single word to that
alguien sabe que adaptadores wifi para modo monitor e inyeccion de datos y punto maestro (crear un punto de acceso falso) que sirvan tambien para utilizarlo desde un celular
Do it work on windows 10
My ip address is not opening in the browser on my windows machine. Please how do I go about it?
you ever figure it out?
I am not able to put a password and do the further process
this would'nt work for windows 10. I just tried and windows defender stopped the reverse shell
Yeah you have to turn it off to test
Bro how do I get this to work per my last comment?
Please write to me on Twitter or Instagram. I get too many comments and I lose track. If you need a one on one question, please reach out or join my discord.
@@InfoSecPat just sent a message on IG, thanks.
9:00 | social engineering tactics in play 😅
i was stuck on the part that says multi/handler.
Does it work outside your network ?
You can test it. It’s all for education on my home network.
@@InfoSecPat Thanks for the answer and the video man its really great. Good introduction to the soft, you got me into it now.
it can, but that introduces additional complexity with networking, however the killchain displayed here 100% works on public networks if the chain is complete from attacker to victim machines
file does not exist .. (i tried also with sudo )/root/.set/payload.exe
same
1) sudo su
2)thunar
3) open the file "Root" It`s so easy)
confirm the file exists like he does,
sudo -s
cd /root/.set
ls
It's oddly specific
@@khan0142 thanks bro big help :)
it gets detected by google and other browsers
Python -m simple httpsserver 80 problem : no module named simple httpsserver
Please solve this problem
Try
python3 -m http.server 80
@@CodeWithBhagirath have you tried typing SimpleHTTPServer
سلام عليكم
ممكن مساعده
Please bro help me
that was too easy to me
Nice that’s good b
🇮🇶❤️❤️
Bro i wanna hack a phone i don t knw what to do i have his phone number