😎Hey, thanks for watching! We’d love to know your thoughts/doubts here in the comments. 👉For professional self-paced certification courses (pre-recorded), visit: bit.ly/Pre-Recorded-Course 👉 Ethical Hacking Live Zoom Classes (2 Days Free Demo Class): forms.gle/1vFpPFMZ5VfhjDAc8 👉Don’t forget to SUBSCRIBE to our channel for more such videos & valuable content: bit.ly/RUclips-WsCubeTech
Very well explained about the networks beginner's would love it and the question where asked in today's session was a lot easier to answer but unfortunately some people took it too long to answer so that's not a bad sign and one more question you asked after 1 hour 49 minutes what is more important ? I would say it's just not all about interest, consistency is very important. Every one who wants to learn ethical hacking or who has learned cyber security or completed CEH has to keep their self updated. I would suggest all participants keep going with hands-on practice, The more you make the mistakes the more you learn and gain the agility to do problem solving tasks. After all the explanation of today's sessions was excellent.
Sir, you are great I never see a teacher like you.. 🙏🏻 Thnx a lot sir.. 🙏🏻🙏🏻 Tip:you have to make a app which you upload your all hacking videos.. So you explain us very longly...
I think this is the most perfectual prepared and teaching channel i ever discovered till now and I'd love to explore more and will be waiting for more topics 👍😊💯
The "-sS" flag refers to a SYN scan, which is a type of scanning technique used in network reconnaissance. SYN scan is a common scan type in network security tools such as Nmap. In a SYN scan, the scanning tool sends TCP SYN packets to the target host's specific ports. The scanning tool waits for the response from the target host. If the port is open, the target host responds with a TCP SYN-ACK packet. However, if the port is closed, the target host responds with a TCP RST packet. The purpose of the SYN scan is to determine which ports on the target host are open and listening for incoming connections. By analyzing the responses received, an attacker or security professional can identify potential entry points or vulnerabilities in a target system. It's important to note that performing SYN scans or any type of network scanning without proper authorization is illegal and unethical. Network scanning should only be conducted with proper authorization and for legitimate security testing or troubleshooting purposes.
really I'm in love with you guys ❤❤❤❤❤❤❤❤ really guys didn't expect this kind of transparency for free love you again keep going we all are with you and thanks again for helping those who can't afford expensive courses.
Thanks you did explained very well BUT very important and small thing you did not teach i don't know why , How you can install RTSP Brute and this is main tool from where CCTV can be hacked .
The "-sU" flag refers to a UDP scan, which is another type of scanning technique used in network reconnaissance. UDP (User Datagram Protocol) is a connectionless protocol used for communication over the Internet. In a UDP scan, the scanning tool sends UDP packets to specific ports on the target host. Unlike TCP, UDP is a connectionless protocol, so it does not establish a handshake between the scanning tool and the target host. Instead, the scanning tool sends the UDP packet and waits for a response. If the port is open and the target host is listening on that port, it may respond with a UDP packet indicating that the port is open. If the port is closed, the target host may respond with an ICMP (Internet Control Message Protocol) packet indicating that the port is unreachable. UDP scanning can be useful for identifying open UDP ports on a target system. Some common services that use UDP include DNS (Domain Name System), SNMP (Simple Network Management Protocol), and DHCP (Dynamic Host Configuration Protocol). By scanning for open UDP ports, an attacker or security professional can gather information about potential services running on the target host. Similar to SYN scans or any type of network scanning, performing UDP scans without proper authorization is illegal and unethical. It's essential to obtain permission and adhere to legal and ethical guidelines when conducting network scanning activities.
Sir apke sikhaye chizo se ksi ki life badal skti hai but mujhe bht bura lgta h ki live me supportsrs kam h mai bhgwan sse wish krunga apki live me bhhht viewers ae
Sir maine Apne device me 2 email I'd bnaya tha Bina mobile no.k device kharab ho gya Mai apna email I'd Apne new device me recover nhi ker paya agar sir Mera Purana I'd internet ki duniya me access ker k Kuch Galat kerega to Kya Mai pakda jaunga
Sir i have the Kali Linux and ia also started the nmap scanner but the problem is that after ending the scanning time it is saying the nmap is done and 256Ipadress, 0host up scanned and not showing the ports and the scanned networks Now,What should i do sir.
😎Hey, thanks for watching! We’d love to know your thoughts/doubts here in the comments.
👉For professional self-paced certification courses (pre-recorded), visit: bit.ly/Pre-Recorded-Course
👉 Ethical Hacking Live Zoom Classes (2 Days Free Demo Class): forms.gle/1vFpPFMZ5VfhjDAc8
👉Don’t forget to SUBSCRIBE to our channel for more such videos & valuable content: bit.ly/RUclips-WsCubeTech
A sir2 A Asir2. Places make videos hacks games
Rtspbrute not working
Pls solution pls
Sir syllabus kaa ak.. pdf dhonaaaa ,
Kuch achi books bhi dhaooo plzzz😌😌😌😌
After 2 hrs of watching i got nothing but to hack our own cctvs...
Very well explained about the networks beginner's would love it and the question where asked in today's session was a lot easier to answer but unfortunately some people took it too long to answer so that's not a bad sign and one more question you asked after 1 hour 49 minutes what is more important ? I would say it's just not all about interest, consistency is very important. Every one who wants to learn ethical hacking or who has learned cyber security or completed CEH has to keep their self updated. I would suggest all participants keep going with hands-on practice, The more you make the mistakes the more you learn and gain the agility to do problem solving tasks. After all the explanation of today's sessions was excellent.
Sir, you are great
I never see a teacher like you.. 🙏🏻
Thnx a lot sir.. 🙏🏻🙏🏻
Tip:you have to make a app which you upload your all hacking videos..
So you explain us very longly...
Ap grate hu asish sir ap ka samjna k andaz love you from pakistan❤❤❤😘😘😘
Dil jeet liye 🥺🥺 Ashish sir or ankur sir ne ..... Teaching skills se
Really Sir Aapne Apna Content 5 Years main kaafi Improve kiya hai
It's very nice 🙂 sir ur teaching so highly and simple process 👍 love thise process and I will attend all videos .....
Sur tnx for this ❤
Sir thank you so much for your efforts providing us theoritical and practical knowledge and we want CTF tutorials next please
Kya gajab ka explanation hai Sir, neat and clean.. 🙏
I have to learn it completely
@1:12:37 Mr Ashish ❤😊,👌👍💐🙏 you are Good human being Dear. Thank you for giving such a valuable pragmatic answer. Be blessed.
I think this is the most perfectual prepared and teaching channel i ever discovered till now and I'd love to explore more and will be waiting for more topics 👍😊💯
Thank's iss live se poorana saara revision ho gaya
Sir best hacking training app kinda hai❤❤❤😊
Pahali baar real hacking dekh ke achha laga
Thanks sir
Great sir ❤
AMAZING!!
The "-sS" flag refers to a SYN scan, which is a type of scanning technique used in network reconnaissance. SYN scan is a common scan type in network security tools such as Nmap.
In a SYN scan, the scanning tool sends TCP SYN packets to the target host's specific ports. The scanning tool waits for the response from the target host. If the port is open, the target host responds with a TCP SYN-ACK packet. However, if the port is closed, the target host responds with a TCP RST packet.
The purpose of the SYN scan is to determine which ports on the target host are open and listening for incoming connections. By analyzing the responses received, an attacker or security professional can identify potential entry points or vulnerabilities in a target system.
It's important to note that performing SYN scans or any type of network scanning without proper authorization is illegal and unethical. Network scanning should only be conducted with proper authorization and for legitimate security testing or troubleshooting purposes.
Stealth scan isn't it
really I'm in love with you guys ❤❤❤❤❤❤❤❤ really guys didn't expect this kind of transparency for free love you again keep going we all are with you and thanks again for helping those who can't afford expensive courses.
Please translate to English for some of us that does not understand india
Please translate to English for some of us that does not understand india
Sir please add time slots in your videos that will also be helpful
Thanks
I am ready
complete video dekhi bhai muje bohat zada interest hai hacking me. bohat zada knowldge mila is video se THANK YOU SOOO MUCH 👏👏
Very good information sir
People learning to hack, normal people now is unsecured about their privacy. I want to help people telling them how to secure their privacy
Best Ethical hacking channel sir you are great😃
Thanks Beautiful explanation ❤
good job
Thank You Sir for this informative video
i am Indian ..no english video only hindi video .thanks love u sir dilse.
वर्षा मोबाइल सेंटर की तरफ से दीपावली और नवरात्रि की हार्दिक शुभकामनाएं
1:19:00 start of praticlas
Its Amazing Sir .. Thank you Sir .. Its a whole new world ..
I am from PAKISTAN and I love this explanation of CCTV Hacking 😊😊
nice sir bahut bhadiya
apke jaise teachers ki hi indi ko jroorat hai
session bhot acha raha thankyou.
Thanks you did explained very well BUT very important and small thing you did not teach i don't know why , How you can install RTSP Brute and this is main tool from where CCTV can be hacked .
1:59:49
Yes 😊
Bro your nice hacker❤❤
The "-sU" flag refers to a UDP scan, which is another type of scanning technique used in network reconnaissance. UDP (User Datagram Protocol) is a connectionless protocol used for communication over the Internet.
In a UDP scan, the scanning tool sends UDP packets to specific ports on the target host. Unlike TCP, UDP is a connectionless protocol, so it does not establish a handshake between the scanning tool and the target host. Instead, the scanning tool sends the UDP packet and waits for a response. If the port is open and the target host is listening on that port, it may respond with a UDP packet indicating that the port is open. If the port is closed, the target host may respond with an ICMP (Internet Control Message Protocol) packet indicating that the port is unreachable.
UDP scanning can be useful for identifying open UDP ports on a target system. Some common services that use UDP include DNS (Domain Name System), SNMP (Simple Network Management Protocol), and DHCP (Dynamic Host Configuration Protocol). By scanning for open UDP ports, an attacker or security professional can gather information about potential services running on the target host.
Similar to SYN scans or any type of network scanning, performing UDP scans without proper authorization is illegal and unethical. It's essential to obtain permission and adhere to legal and ethical guidelines when conducting network scanning activities.
Super
Marvelous explanation
very good work and you are talented
and your team also
Sir apke sikhaye chizo se ksi ki life badal skti hai but mujhe bht bura lgta h ki live me supportsrs kam h mai bhgwan sse wish krunga apki live me bhhht viewers ae
please available subtitle (ENGLISH) PLEASE. THANK U
Ashish sir ❤
Yes Sir
Yes
Thanksssssssss A loooooot 🎉 sir
Sir 1 no hacking ❤❤❤
Ready
THANK YOU FOR YOUR KIND INFORMATION
Yes sir
Fantastic
Thank you for your valuable information ❤
Good afternoon
Excellent 👌
Ready sar
Supper sir👍👍👍👍🙏🙏🙏
Sir maine Apne device me 2 email I'd bnaya tha Bina mobile no.k device kharab ho gya Mai apna email I'd Apne new device me recover nhi ker paya agar sir Mera Purana I'd internet ki duniya me access ker k Kuch Galat kerega to Kya Mai pakda jaunga
Mashallah No one Can Expalin Like you Good sir ❤️
Ashish sir we need practice video on cctv camera hacking using mobile Plz
Sir apne logo ne bahut acha padaya maja a gaya
could you please explain how did you know that 161 was the port of the dvr because it was not mentioned there at all
Same problem
How we can know the IP address of the DVR..?
By subscribing LoadingCode
THANKS SIR AP BAHUT ACHE SE GAID KARTE HAI
Wow outstanding ❤
Op❤
op sir thank you so much for giving a beautiful detail ❤❤❤❤
merako kuch smjh me nhi aya
@@angshumanbora4821 then study first ceh v12
@@CanadaAle2024 link dena jara 😬
@@angshumanbora4821 it's paid sir.....ask to the institutions...it's 1 year course bro...it's hacking bro not a joke
@@CanadaAle2024 kaha join koru 🤒merako bhi sikha do koi
Knowledge 💗
Nice bro ❣️
Thanks for repeating the networking concept
Sir, realy maja agaya 😎😎😎😎😎🧡😱😱😱
Faltu video
@@manvirsingh4494tera okat nhi hai dekhne ka chal nikal
Awsome sir
Thanks so much
Thank you
,,Thanks sir,,
jab may hacker banunga koi veb ko crash karunga toh aapka name lunga mere guru ji😂😂😅
I imAtul kumar
Yes sir
sir you great beacuse you promoting ethical hacking
Sir, we have to use the port which you have used "25002" and "161" or we have to use our own port.
Bhai ye port kese find krte hai ? Pls answer
I feel goosebumps when you say everyone ready 1:17:58 ❤😊
Great sir apne bhut achha btaya ,jiske help se maine apne college ke sare cemeras hack kr liye as a project. Thank you so much sir
😮😮😮 congratulations 🎉🎉
Very good can you give tips were we get stuck in error like rtsp not installing wheel error something
Thanks for your
Sir i have the Kali Linux and ia also started the nmap scanner but the problem is that after ending the scanning time it is saying the nmap is done and 256Ipadress, 0host up scanned and not showing the ports and the scanned networks
Now,What should i do sir.
nmap -v -p 65365
@@akashkamble4871 rang ip address kese find kre ..ussi me ye problem show ho Raha hai ...256scan.....0up
Age not matter but your focus and interest is also matter😇
💓💓💓
English matters
@@lineageofmen hey hey 😂😂😂
Yes bro what is your age
@@lineageofmenim 16 bro😅
Nice ..continue
You are the best...!! Teacher sir
Best teacher of my life ❤️❤️
Na yall really
Ha bhai
WE WANT PART 2 😋
Thankyou sir so much and I am 13 year old in class 8th my dream is to become software engineer and a white hat Hacker.
one line from this coure really hit me , agar hack karo to kuch bada karo choti cheezo ke liye waste mat karo
Sir kya yaha say baithe satellite hack ho sakti hai kya 🤔🤔🤔🤔🤔🤔🤔🤔
Jii but hacker kar sakta han or 3 sy 4 laptop ho ya PC tab ho sakta han
starting for camera hacking 1:18:17
Did you watched full video is that possible to hack
@@GoodBoy-my8mvyes
Thanks for you sir your introduction
Good job bro
2:25:15 was my fav. 🤣🤣🤣🤣
sir can u make video on android hacking???please please 🙏🏿🙏🏿🙏🏿🙏🏿🙏🏿🙏🏿🙏🏿🙏🏿
Haa sir jaroor banayege
Bro that is already available on this channel
Good examples
Hello sir i really very like and love the hacking😍🥰
Car hacking
Ami Bangladesh se bolrahu
Kisne phucha khankir pola
Nice