I'm a student on your Learn Ethical Hacking From Scratch course. A question: it's possible to social engineering a social engineere? For example, it's possible to steal a hacker's credentials?
Yup try to put Linux payloads into hacking tool and social engineer a hacker or a script kiddie to check that tool target use the tool you will be getting a connection back🥰
For example use zphisher is a tool use to phish passwords tell the hacker tat the tool is a good phishing tool, it has many phishing sites in it, and blah blah blah .... add more 😂.... before sending it to the hacker create a Linux payload using empire tool, and copy the payload and add in the zphisher.sh file just paste anywhere in the code...don’t paste with the written code, and send it to the hacker...and once he execute the file you will be getting a connection🥰
Yes I think But don’t take my words I’m not so professional at hacking I’m still learning Anyway, you can but you should be smarter and has more experience than the target
Hey bro, how are you doing man, how much of the time will be required to complete your course in udemy? I have enrolled in your course please do a video on settings and hardware requirements to start our progressive learning , practice like desktop or laptop better? I'm using lenovo thinkpad 4g.b ram x201 with win 8.1 pro os
Hey Zaid, can you do a video on installing and running Volatility please. Have your course and enjoying but, Im also trying new things and Volatility is a bit tricky. Cheers
Sir pls put a tutorial on how to make any Linux distro a hacking machine for example I started using arch Linux but I couldn’t download thing like zipalign and other stuffs, i mean I couldn’t find a way to download that on internet also...... put a content on making any Linux distro a hacking machine 🥰🥰🥰😘😘😘😘😎🤩
It depends on your usage. Check out this video: check out this video ruclips.net/video/0lqRZ3MWPXY/видео.html Also check out our shop from here: zsecurity.org/shop/
Well it doesn't need to be a super laptop but something that can handle many Apps at once. Example maybe a couple of VM at once running smoothly plus apps running in background too! I would say I5 should be more then enough but s higher spec one Ram I would recommend 16.because that's what I would go for too. 8 at the very very minimum
Hey Zaid Kindly Please Pick my Comment🙏🙏 How hackers can Hack Any Live Broadcast Television Channel And Stream there own Hackers Videos ...can you please make a complete basic to Advance videos about it because i Research whole internet but can not get any guide step by step...i will be waiting if you🙏🙏🙏🙏
@@willCX Hey dude its about educational purpose even i wannaa lear how the hackers do this with livestream and play their own video as message to everyone...
Ipleas zaid i have an issue if i generate a backdoor and downladed from the target windows and run metasploit meterpreter i have issue session 1 closed please help me to fix this issue 😍❤
Hello Zaid I am a student on your udemy courses and veil seems to be kind of outdated i have tried almost every possible combination an there always seems to be antiviruses that can detect them I even changed the source.code to different combinations. Thefatrat and empire also seem to be lacking so i would be interested in a new video on that topic i know that u made one just 6 months ago but i am just reccomendind video ideas Thanks
@@CyberSecLinux Yes it is, didn't you see the whole video, they were just talking about how to secure a website in that most of the services are provided by zSecurity. Isn't it self promotion?
Yeah we provide all the mentioned services BUT we are not the only ones in the world that do that. You can get these services from any company you want.
Excellent discussion! All valid points. Doing anything is better than doing nothing at all. Thanks for all you do, Zaid!
It's awesome, love from India 🇮🇳
🔥🔥🔥 India🇮🇳🇮🇳
I'm a student on your Learn Ethical Hacking From Scratch course. A question: it's possible to social engineering a social engineere? For example, it's possible to steal a hacker's credentials?
Yup try to put Linux payloads into hacking tool and social engineer a hacker or a script kiddie to check that tool target use the tool you will be getting a connection back🥰
For example use zphisher is a tool use to phish passwords tell the hacker tat the tool is a good phishing tool, it has many phishing sites in it, and blah blah blah .... add more 😂.... before sending it to the hacker create a Linux payload using empire tool, and copy the payload and add in the zphisher.sh file just paste anywhere in the code...don’t paste with the written code, and send it to the hacker...and once he execute the file you will be getting a connection🥰
@@umarmuzammil7332 Thank you so much
Yes I think
But don’t take my words I’m not so professional at hacking I’m still learning
Anyway, you can but you should be smarter and has more experience than the target
Nice! Thanks!
Perfect! Love from India!
how to remove write protection from usb ..? help me plz ? can we do from python ?
found your channel recently. God bless you, thanks for sharing your knowledge!
As a web engineer, your knowledge is helpful.
Thank you for uploading this video!!!
Waiting for your new course ❤
Me also he is not telling what type of course is it😂 he told ye will account it in the future still I am waiting😂🥺😎😎😎😎
Lets go, new video!!!
Hey bro, how are you doing man, how much of the time will be required to complete your course in udemy? I have enrolled in your course please do a video on settings and hardware requirements to start our progressive learning , practice like desktop or laptop better? I'm using lenovo thinkpad 4g.b ram x201 with win 8.1 pro os
❣️from india😍
Okay
after watching this video, security system be like - "I am ironman..."
Hope there will be 0 day exploit 😂
@@umarmuzammil7332 lol
🤣🤣
Hey Zaid, can you do a video on installing and running Volatility please. Have your course and enjoying but, Im also trying new things and Volatility is a bit tricky. Cheers
Sir put a content on sms spoofing 🥺🥰
This is the best way to fool any one after email spoofing 😂🥰
Sir pls put a tutorial on how to make any Linux distro a hacking machine for example I started using arch Linux but I couldn’t download thing like zipalign and other stuffs, i mean I couldn’t find a way to download that on internet also...... put a content on making any Linux distro a hacking machine 🥰🥰🥰😘😘😘😘😎🤩
Which wireless wifi adapter should I use in 2021
Check david boombed
It depends on your usage. Check out this video: check out this video ruclips.net/video/0lqRZ3MWPXY/видео.html
Also check out our shop from here: zsecurity.org/shop/
Check out the WiFi adapter videos
Sir make a video on how to root the phones and use the phones for ethical hacking as a pro
Ya follow these 4 approaches or your crush will approach you and reject you with no regret ! Follow what Zaid does !
😲😲Wow
Please bring a video in which we can learn how to inject TROJAN virus in undetectable backdoor that you had created in your old video........
Zain which laptop is good to have for hacking? I know you mentioned something in your courses but i still have not a clear answer
Well it doesn't need to be a super laptop but something that can handle many Apps at once. Example maybe a couple of VM at once running smoothly plus apps running in background too! I would say I5 should be more then enough but s higher spec one
Ram I would recommend 16.because that's what I would go for too. 8 at the very very minimum
How do I remove every gadget attached to my belongings
Please make a video on andrax and kali nethunter which is best for mobile user who want to penetest using mobile
Hello zaid is there is any possibility to make a video about building hacking pc
Yes, he alright teach
Very Nice Bro
Why there is a spot on your face!!!!! What happened sir?
Bro man why this 😂 see his skill bro try to get study something from him, don’t see the face and stuffs 😂 however his face good🥰
Now only I saw 😂 hmm it seems serious hackers spot😎😎
You're obviously right 😃 I'm just little bit concerned 😞
hhhhhhh
Wow
Hey Zaid Kindly Please Pick my Comment🙏🙏
How hackers can Hack Any Live Broadcast Television Channel And Stream there own Hackers Videos ...can you please make a complete basic to Advance videos about it because i Research whole internet but can not get any guide step by step...i will be waiting if you🙏🙏🙏🙏
Why stream ya own hacking video on LIVE TV. It goes back to ya. Just make ya own RUclips channel
@@willCX Hey dude its about educational purpose even i wannaa lear how the hackers do this with livestream and play their own video as message to everyone...
What's there on your right cheek or left
Logo
First
Nope! 4 seconds later Whomp Whomp WHOMPPPP!
I there is no proud with it 😂
bonasera elliot 😂👏
Make video about reverse engineering
He already make
Hello Zaid this is totally random but u look fresh today lol
Amazing 🤗
Can we hack a wifi with beef????
No, but you can try it as a phishing
Thank bro you for this video you are awesome teach us more and we are really thankful to you
Nice video bro😘😘😘😘love you
Ipleas zaid i have an issue if i generate a backdoor and downladed from the target windows and run metasploit meterpreter i have issue session 1 closed please help me to fix this issue 😍❤
what type of payload you used I also had that issue if you let me know what payload you used i will try helping you to fix bro🥰
@@umarmuzammil7332 bro do you have instagram?
@@umarmuzammil7332 tnhx bro 😍
@@mrdeath6769 yup
Get me your Instagram I’d
But remember something "No System's Safe"
your videos always are so helpful , thanks zaid
I would like to see how to hack android phones how hackers hack somebody's wapp and fb chats
Any one know how to install zipalign n arch Linux?🥺🥺🥺🥺
Yes
Great video mate, but what happened to you? I see a scratch on your cheek? Take care man
Hello Zaid I am a student on your udemy courses and veil seems to be kind of outdated i have tried almost every possible combination an there always seems to be antiviruses that can detect them I even changed the source.code to different combinations. Thefatrat and empire also seem to be lacking so i would be interested in a new video on that topic i know that u made one just 6 months ago but i am just reccomendind video ideas Thanks
Hi Zaid! How do you do?
This video is just self promotion
No
@@CyberSecLinux Yes it is, didn't you see the whole video, they were just talking about how to secure a website in that most of the services are provided by zSecurity. Isn't it self promotion?
Yeah we provide all the mentioned services BUT we are not the only ones in the world that do that. You can get these services from any company you want.
@@zSecurity I was just pointing it out
@@zSecurity Is it wrong?
please make a video using esp32 as wifi adapter
i think most of your views are indians .
Greetings from Greece!
Kalispera!
Make a video
❤️ from India
Bring on Practicals
got it
between alfa awus036ach and alfa awus1900 which is better ? please help. i am using kali linux 2021.
The awus036ach is a great choice.
@@zSecurity but can you tell me why is that ? sorry I maybe asking foolish questions. but I am new to this. please help.
Sir,how to hack a android phone with Android phone without sending any links ..
Only by programming
From Yemen I love India if you have group to programmers can add me 🌚❤