@Islaminame Well ,in case of mobile phones if you try to use 2 vpns +Tor then your battery will decrease in huge amount like water from glass( if glass bends) because vpn's uses much battery as compared to Tor.
I would love to see a part 2 of this in which you actually do pair the nikto output with some metasploit exploit. I find interpreting nikto output to be very, very difficult in relation to next steps.
cool content as always, man! Would it be possible for you to ctrl-shift-+ your terminal windows? Some of the smaller text doesn't render well after youtube's processing/compression/whatever
Just a friendly feedback: you may magnify the terminals, especially when typing the commands when the terminal is cleared and empty, e.g. @ 9:23. The clip looks like a blank screen with some little ascii on the top! :)
Thanks Null Byte ! what would you personally recommend if you compare Burp suite vs Nikto ? for reconning and excuting and even saving databases on your targets ?
@@netbin build your tools and call nikto to scan for vulnerabilities. If any found than call to search for exploits if there are any than build your app/tool to execute payload. I can't give u an example here too much to write but if u search how to call nmap or nikto to use in python script it will show u how to call other tools to use in ur app..
Nice class about active scan in websites. But what you've said about using a vpn or thor cause of the "suspicious" behaviour with these tools gave me a doubt. I'm participating some bugbounty programs, and will only use this tool in authorized scopes of programs. Do you think is needed to use a vpn to hide my ip adress? What do you think about this? Thanks for the knowledge!
can u tell me which linux u r using what type of linux system is best for find secure web kali , ubuntu or mac many people confusion on this i like ubuntu bcz its interface is beautiful but most ceh use kali or some red hat(tell me about your suggestions)
How do you hack a phone only with the phone number, how can you listen to people calls with a program and see where they are exactly. I saw that they can find you, and listen to you through your phone, even when your phone is offline etc. How?
i am using unity tweak tool i can just switch on windows only like in one window i can watch a video and it is playing but on the other i open a text based app or terminal etc how i can write there i am unable to write i want to use both what i do?
This is great thank you. Im building the txt file so nikto can scan all the ip's by runing it againts the file. i only put one ip in there so make it faster but when i run nikto againt the file knito -h testip.txt it just says 0 hosts tested. But if i run nikto -h x.x.x.x it works. anyone having the same issue?
Both are capable of monitor mode and package injection , both are able to start an evil twin attack , both can deauthenticate networks , but the pineapple nano got a better UI and is able to run many modules when the rogue acces point is online. It also has a better range. The only thing that stops me from buying the nano is money ...
@@NullByteWHT can't see them so no point. Do u acknowledge that any one can access to other Facebook account by recycling the yahoo account used in there profile that requires zero skill and you haven't made video about that that's very serious matter and you should make a video abt that and inform your users about that cus billions of accounts are vulnerable to it tnx
I have an idea what nikto possibly does, but I am expecting to see way more. (I know certain versions of html/java/flash etc have known vulnerabilities/exploits that can be used to gain access to a place they don't belong.) - I also suspect it may tell us if it might be vulnerable to a ddos attack, etc. I could probably use google and figure out what to do with each information, but I wouldn't use that information to attack the website, I may have told someone (RESPONSIBLE) about it, but boy can it be hard to get a hold of certain companies, let alone get them to listen that their is an issue that is absolutely worth correcting. xD I am now trying to pursue a security+ cert, albeit I am still a long ways from completing it, and even then there will be things I don't know, besides there are always new exploits coming out, if a black hat hacker is aware of a vulnerability before a white hat hacker is, that could be all the window of opportunity that the black hat needs to reek havoc.
WTF are those straight lines in the command for saving the nullbyte.txt file to targetip.txt? i don't have such characters on my keyboard. And where and how does this command work? I just wasted an hour of my life trying to figure out this command.
Remember kiddies, don't try this at home. Go to a friend's house
Eli Kirkwood or use a vpn
Or you can you both Tor and vpn for 99% security.
@Islaminame
Well ,in case of mobile phones if you try to use 2 vpns +Tor then your battery will decrease in huge amount like water from glass( if glass bends) because vpn's uses much battery as compared to Tor.
hhhhhhhh
whys that? what are the possible risk doing this at home?
Moral of this video: Never ever blink when u're explaining something to someone..
LEGIT! XD
lol
Lol
lmfao
lol
At 1:52 HE ALMOST BLINKED :OOOOOOO!!!4
what do you mean blink i only seen that comment blink blink blink!!
AHHAHAHAHAHAHAHAHAHAHAHHAHAHAHA good one!
Sir next time you record a terminal window, please remember to increase the font size so that we can see the text clearly
Indonesia switch to 720p or 1080p.
i had to use the system magnifier and a real one to be able to read
Use a magnifying glass
I had to use a microscope
Ah masa gakeliatan
I would love to see a part 2 of this in which you actually do pair the nikto output with some metasploit exploit. I find interpreting nikto output to be very, very difficult in relation to next steps.
Right? I feel like i need a tutorial about how to make sense of the various outputs you can get
@15:20 thanks bro for telling me that at the very end, I thought Nikto was practically the same as nmap, so I ran it without a vpn.
Thanks bro for telling me
You can zoom screen when you type command line, it truly useful for us to following.
That electric sound effect at the end of the video - you got me. I even felt the vibration coming from my laptop. Fuck sake.
Why hasn't this guy got a million subs he is way better then David bombal and network chuck
This dude is actually staring at my soul in every video 🥴
Y e a h 😶
Be careful! Staring in your history my be worse.
@@djparty95 🤣🤣
Yes, finally we get to see u again
This channel is a gem
cool content as always, man! Would it be possible for you to ctrl-shift-+ your terminal windows? Some of the smaller text doesn't render well after youtube's processing/compression/whatever
We'll make it bigger in future episodes
Null Byte thank you!
what type of terminal u r talking about is this linux i use ctrl + alt + t
@@mohsintahir8906 ctrl-shift-+ increases the text size *while* in the terminal
Just a friendly feedback: you may magnify the terminals, especially when typing the commands when the terminal is cleared and empty, e.g. @ 9:23. The clip looks like a blank screen with some little ascii on the top! :)
Excellent video! Thank you for walking us through this process with great, efficient tips along the way. Very helpful.
I done this using a VPN and used my Linux server on Hyper V manager! Love your videos!!!
is there any free vpn and best?
new era 2017 most free VPNS are not premium and pretty shit. I would recommend paying for one or just using a free trial
@@fudoshin2776 gud suggestion is there any trail bases for a long period supported 3 to 4 months
new era 2017 no I don’t think so ( very unlikely) Different VPN providers have different time period free trials, some 7 days, 3 days, 1 month etc
@@fudoshin2776 nice
One of the first viewers. Yesss!!!
Ever thought of following up this video with an msf meterpreter video?
You should definitely delve into it!
Thanks Null Byte ! what would you personally recommend if you compare Burp suite vs Nikto ? for reconning and excuting and even saving databases on your targets ?
I love nikto. I incorporated it into a tool I wrote in python. 😁.
Great video , once again.😎😎
Tool*. And making a system command via a Python script isn't really something to be proud of.
Can you show me some examples of your incorporation please?
@@mentix002 auch way to stifle people growth and curiosity. What a role model.
@Manan Yadav Why are you like this.
@@netbin build your tools and call nikto to scan for vulnerabilities. If any found than call to search for exploits if there are any than build your app/tool to execute payload.
I can't give u an example here too much to write but if u search how to call nmap or nikto to use in python script it will show u how to call other tools to use in ur app..
Hey, Whats Up Kody, I Saw U I Kak5 Five And Wanted To Say, You Have Done A Very Good Job With This Channel
I love you videos. ♥️
Terminal Tex in this video is very small. Plz increase the font size next time. Great work guys 👍👍👍👌👌👌
we need tutorials on Klatu and verata next
Are we blinking at the same time? Or he won't blinking
good stuff but you need a magnifying glass to see the commands
hahaaha he safe his site they just tell how its work
May I ask what OS u are using that is best suited for cybersecurity activities 'cause I intend to buy a new one
Your videos are great, really really helpful 👍🏻
But why don’t you make the font bigger ??
Please we need that.
sir @Null Byte do you hack with your mac OS terminal or use a VM?
Great tutorial.. in your next videos please zoom in or increase the fonts of your terminal for better visibility
Have you done any Maltego episode? I just found most of it is America „focused” .
Hello, please provide a session on doing external pen test against public IP
Hey really nice !
Do you know how to bypass firewalls ? For some reason, -sS flag doesnt work when the network is set up with firewall or antivirus
Great video! Thank you for sharing!
thank you very much for the nikto tutorial man
very nicely explained. Thanks
"Now, before you start running Nikto on every site you can think of.." You should have put that warning near the beginning. 😅😅
Nice class about active scan in websites. But what you've said about using a vpn or thor cause of the "suspicious" behaviour with these tools gave me a doubt.
I'm participating some bugbounty programs, and will only use this tool in authorized scopes of programs. Do you think is needed to use a vpn to hide my ip adress? What do you think about this? Thanks for the knowledge!
Tbh I would use a VPN or proxies no matter WHAT. I wouldn't risk it
Fun fact.
Saying nikto to Saudi. Can lead to injuries.
Lol
Nikto means fucked him
Nikto means "nobody" in Russian.
Just wanted to say thank you for your channel 👍I appreciate your presentations
well the website I was trying to do sql attack on blocked my IP 😅
i like that sepread this just for knowledge purpose
Awesome vid. I don’t think you blinked the entire time 😂👍
maybe he is reading what to say in the camera :)
the best BLINK all the time 1:82
@1:45 Altego?! Baltego?! What's the tool? Trying to scan our API to find out if there are any vulnerabilities.
Let's go deeper and user Python / Ruby and do it with libraries, it's time to level up
can u tell me which linux u r using what type of linux system is best for find secure web kali , ubuntu or mac many people confusion on this i like ubuntu bcz its interface is beautiful but most ceh use kali or some red hat(tell me about your suggestions)
Kali linux or Parrot Security OS, you CAN use Ubuntu but Mali Linux has the tools you need to hack.
Excellent procedure but text are too small and not making the video interesting. Can you increase the text size a bit?
very well explained
Please kindly make a video series on shodan @Null Byte
$1000 to anyone who can beat him in a staring contest
he said juicy... lol
I might be slow or blind but where did you scan for vulnerability eg. website.com ?
Who try to make this money together
u look like Jake Gyllenhaal in the nightcrawler movie, and bobby fischer all in one
How do you hack a phone only with the phone number, how can you listen to people calls with a program and see where they are exactly. I saw that they can find you, and listen to you through your phone, even when your phone is offline etc. How?
10:35 u r using mac ? what is best for other intel pcs
Thanks
Tells me I shouldn’t do it on my ip at the end of the video after I’ve already done it 😂😂💀
Oooppss
@@NullByteWHT ahahahahahahahha
@@NullByteWHT literally the same, but started trying it on my own websites ;P
Use bigger fonts!!!
I found sql vuulnerabilty ,,will you help me in, how to search for suitable metasploit exploit for that..
thanks again, sempai
Is that actually a macbook or a dell with hackintosh or virtual machine?
I wanna know too..??
i am using unity tweak tool i can just switch on windows only like in one window i can watch a video and it is playing but on the other i open a text based app or terminal etc how i can write there i am unable to write i want to use both what i do?
Hm.. I have nord vpn but for some reason every time I log into it my internet doesn't work so iv been using mainly proxychains as a backup.
NullByte how do I pair it with the exploit since msf+ isn't an option on my kali machine running kali 2020
thank you man this was good
Very good job
My friend 🙋♂️
This is great thank you. Im building the txt file so nikto can scan all the ip's by runing it againts the file. i only put one ip in there so make it faster but when i run nikto againt the file knito -h testip.txt it just says 0 hosts tested. But if i run nikto -h x.x.x.x it works. anyone having the same issue?
When I try to output the log to metasploit using '-Format msf+' kali linux spits back an error saying it's an invalid output format
very good video
Hai, bud
Do one carding vedio and tools used
Great vid
Whats the intro music?
Whats your favorite VPN?
Airvpn :)
i use a mexican
Tor network. Naturally.
The Hacker that doesn't use RGB 💓
Thanks!
Why don't you make videos anymore
What do you suggest me to do get an alfa adapter or an wifi pineapple nano?
Lolzzn12 Please don’t react when you have no knowledge ...
Both are capable of monitor mode and package injection , both are able to start an evil twin attack , both can deauthenticate networks , but the pineapple nano got a better UI and is able to run many modules when the rogue acces point is online. It also has a better range. The only thing that stops me from buying the nano is money ...
Why did u pill all your stickers it look so cool
They are there, under a black case
@@NullByteWHT can't see them so no point. Do u acknowledge that any one can access to other Facebook account by recycling the yahoo account used in there profile that requires zero skill and you haven't made video about that that's very serious matter and you should make a video abt that and inform your users about that cus billions of accounts are vulnerable to it tnx
null byte never blinks, I'm hear for it.
not visible clearly, too small display
thanks a lot
Is it illegal to run nikto on websites?
I have an idea what nikto possibly does, but I am expecting to see way more. (I know certain versions of html/java/flash etc have known vulnerabilities/exploits that can be used to gain access to a place they don't belong.) - I also suspect it may tell us if it might be vulnerable to a ddos attack, etc.
I could probably use google and figure out what to do with each information, but I wouldn't use that information to attack the website, I may have told someone (RESPONSIBLE) about it, but boy can it be hard to get a hold of certain companies, let alone get them to listen that their is an issue that is absolutely worth correcting. xD
I am now trying to pursue a security+ cert, albeit I am still a long ways from completing it, and even then there will be things I don't know, besides there are always new exploits coming out, if a black hat hacker is aware of a vulnerability before a white hat hacker is, that could be all the window of opportunity that the black hat needs to reek havoc.
I got error... Invalid IP????
hey null byte is there a way to run this scan way more faster? its taking such insane amount of time to finish it.
I'm sure there are filtering options that will speed it up. Also limiting the IP range.
Hi i did like the video but i had to stop it hundred of times cuz of the texts they are too small thx
your the best man
So it’s an nmap video!
It works on WAN?
white hacker: show them on RUclips
gray hacker: …..
black hacker: any one know about them???????????????
torrents my friend, if you know where to look.
Hi again!
Oh wow this is so cool.
WTF are those straight lines in the command for saving the nullbyte.txt file to targetip.txt? i don't have such characters on my keyboard. And where and how does this command work? I just wasted an hour of my life trying to figure out this command.
Really sorry, But please could you zoom your terminak while typing something.
Null Byte s’helpful.
whats the cmd for windows to install
I need to learn 😩
Muy pequeño lo que se escribe en la terminal. No se alcanza a ver bien.
Screencasters do not use a font this small
How can i bypass an admin login page using kali linux