NMAP Revealed: Unleash the Ultimate Hacker Tool

Поделиться
HTML-код
  • Опубликовано: 15 дек 2024

Комментарии • 129

  • @soulei1990
    @soulei1990 Год назад +6

    very instructive and interesting video. I often used nmap before that is why i specially appreciate your lesson concerning the -A option. I believe that when learning (school, uni, cert, or by yourself), we seldom have to consider the fingerprints we leave or have to deal with a complex or sizeable system. We usually have a single practice target with existing vulnerabilities . Under such conditions the -A returns acceptable results without having to understand or learn about the other options and their differences. What i am trying to say is that -A is a good introduction option when starting on the security path but a bad option if we mostly rely on it as we progress

    • @pentest_TV
      @pentest_TV  Год назад

      Very insightful comment and one I would 100% agree with. It's a really good point that the -A is very helpful when we're learning because it truly is. It spews forth a lot of really good information. But to your point most beginners (and some seniors) don't fully understand the totality of their actions or the tools themselves, which is one of the reasons I started doing videos again. If I can help just one person avoid some of the pitfalls I've encountered over the decades then the work to make these videos are worth it. :)
      Thanks again for the comment - it is very much appreciated.

    • @soulei1990
      @soulei1990 Год назад +1

      @@pentest_TV As a person who has actually benefited from watching this video, i am truly thankful to you and the efforts you made to share your wisdom and experience with us. This is why, as an aficionado of cybersecurity and pentesting in particular(my dream job), i am enthusiastically looking forward to any future videos you will share.

    • @pentest_TV
      @pentest_TV  Год назад

      Thanks - we have a whole slew of videos in the queue to work on. Glad you enjoyed the video, and feel free to spread the word about this channel! I've pinned your post. :)

  • @chaiBreuer
    @chaiBreuer Год назад +15

    I watch a lot of videos about pentesting. I come across this one, and you are doing a really good job. The speed and the way how you explain things are on point. Most videos go off the point and make things to detailed or too complicated. I already know alot about Nmap, but this video would saved me so much time 😂.

    • @pentest_TV
      @pentest_TV  Год назад +2

      Thanks for the feedback! It’s really great to hear your take on the video and I appreciate you taking the time to leave the comment. Happy hacking!… and lmk if there are any topics you’d like to see covered.

    • @dave24-73
      @dave24-73 5 месяцев назад

      I’m in the same boat, stumbled onto this, and now watching a few others, I like the format.

  • @LokiCDK
    @LokiCDK 8 месяцев назад +1

    I've been doing this long enough not to learn anything new here, but the information is ABSOLUTELY useful, accurate, and encourages people to understand what and why. Good job.

    • @pentest_TV
      @pentest_TV  8 месяцев назад +1

      Thanks for the comment and validation of the contents of the video - really appreciate it! Yeah, I've been doing this a while as well and a lot of times I find misinformation or bad practices being regurgitated on videos within RUclips. Felt it was a good time to provide my two cents based on my experience. Thanks again!!

  • @WillSmith63957
    @WillSmith63957 Год назад +2

    This guy is awesome. Nmap is covered heavily at this point but this is a very good exploration of it. Great job

    • @pentest_TV
      @pentest_TV  Год назад

      Glad I was able to provide a new perspective on the tool. Appreciate the feedback and comment!👍👍

  • @_K_W
    @_K_W Год назад +1

    Cool, I'm doing nmap in a bootcamp this week so I looked this up to gain some perspective.

    • @pentest_TV
      @pentest_TV  Год назад

      Awesome - remember that there's a difference between real-world application and what is typically taught in course material. Real-world is so driven by being effective in your time management... courses don't really mention that much. Enjoy the journey!

  • @walterpfeffer5538
    @walterpfeffer5538 6 месяцев назад +1

    Best video by far!

    • @pentest_TV
      @pentest_TV  6 месяцев назад

      Thanks for watching and glad you enjoyed it!

  • @timk7749
    @timk7749 Год назад +2

    Great explanation. Now i need to watch again and take notes! Keep up the good work.

    • @pentest_TV
      @pentest_TV  Год назад +1

      Thanks for watching!... glad it helped and that you enjoyed it.

  • @rosenote2462
    @rosenote2462 Год назад +2

    another great channel with low sub number
    I can't believe what I see, love that vid

    • @pentest_TV
      @pentest_TV  Год назад +2

      Glad you enjoyed it! Just started a few weeks ago, so I’m hopeful 😄
      Thanks for the comment - feel free to lmk if there is any topic you want covered.

  • @JasonBillingham
    @JasonBillingham Год назад +1

    This was a great video. Gave me exactly the information I was looking for. Precise information, perfect examples and great advice regarding using -A. Thanks for a great video!

    • @pentest_TV
      @pentest_TV  Год назад

      Hey, thanks for the feedback! I'm glad to know that the video gave you exactly what you were looking for. Stay tuned for more helpful content in the future!

  • @Krazy0
    @Krazy0 Год назад +2

    For a 439 + 1 (me) subscribers channel it's an impressive work you've done here, keep it up!

    • @pentest_TV
      @pentest_TV  Год назад +1

      Thanks for the sub! Glad you enjoyed the video. Lmk if there’s any topic you’d like covered.

    • @Krazy0
      @Krazy0 Год назад

      @@pentest_TV It would be a nice to see a series covering most of the red team utilities (packages), but instead of using Kali, installing them and doing their setup, which will certainly gain many views, especially that Kali is literally bloated in terms of amount of stuff in it, and I wouldn't want to depend on a distro, so I chose base Artix (systemd-less Arch) and got into installing Black Arch (Kali but for Arch) packages in it, and it's just an incredible experience, being able to man package everything and learn every technical detail and history about each package, taught me a lot of things and I'm very grateful for every moment I spent doing it.

  • @MunitionsDudTester
    @MunitionsDudTester Год назад +1

    Just started my journey and this information is great

    • @pentest_TV
      @pentest_TV  Год назад +1

      Thank you so much for your kind words! I'm glad you found the information helpful. Best of luck on your journey!

  • @joeyhenry7312
    @joeyhenry7312 Год назад +3

    Enjoying this video. I've recently started my journey into learning cycber security basics and i'm just learning how to use Linux and Kali for the first time and I'm loving it. Looking for a career change after years of working in finance. Also the video quality and pace are really good and make it enjoyable to watch. Definitely will rewatch again when not at work. Subbed and looking forward to more videos. 🙏🏼

    • @pentest_TV
      @pentest_TV  Год назад +1

      Hey, thanks for the comment! I'm truly glad you enjoyed it and I appreciate you subscribing! LMK if there are any topics you'd like to see and good luck with your career change!

  • @bishoptrees
    @bishoptrees Год назад +1

    Nice summary mate

    • @pentest_TV
      @pentest_TV  Год назад

      Appreciate the feedback and thanks for watching! 👍👍👍

  • @0oNoiseo0
    @0oNoiseo0 Год назад +2

    Great tutorial! thank you

    • @pentest_TV
      @pentest_TV  Год назад +1

      You are very welcome - glad you enjoyed it! Also, appreciate you letting me know.

  • @davege9463
    @davege9463 11 месяцев назад +1

    thank you very informative and helpful

    • @pentest_TV
      @pentest_TV  11 месяцев назад

      Glad it was helpful! Thanks for the comment and for watching!

  • @TazioBaker
    @TazioBaker Год назад +1

    Great video.
    Thank you for making it.

    • @pentest_TV
      @pentest_TV  Год назад

      Glad you liked it! Thanks for letting me know. 👍👍

  • @NotDaveidt
    @NotDaveidt Год назад +1

    Great video! This definitely helped me use nmap more effectively!

    • @pentest_TV
      @pentest_TV  Год назад

      Thanks for watching and I appreciate you commenting! Glad it helped and lmk if there are any other topics you'd like to see covered. Thanks again!

    • @NotDaveidt
      @NotDaveidt Год назад +1

      @@pentest_TV i love the theme of showing us how these tools are commonly mis used by professionals. I believe it'd help a-lot of beginners avoid these habits

    • @pentest_TV
      @pentest_TV  Год назад

      Awesome - thanks for the feedback! I’ll keep doing more of that. 😃

  • @bertinndayizeye_Tino
    @bertinndayizeye_Tino 9 месяцев назад +1

    Geat explanation. Thank you

    • @pentest_TV
      @pentest_TV  9 месяцев назад +1

      You’re very welcome. Thanks for watching and providing a comment!

  • @jcg702
    @jcg702 Год назад +2

    Good explanations, looking forward to your other videos.

    • @pentest_TV
      @pentest_TV  Год назад +1

      Thanks for watching - glad you found it useful!!

  • @limitless2352
    @limitless2352 Год назад +2

    why when i scan it shows all are in ignored states ??? doesnt show any ports or any other stuff

    • @pentest_TV
      @pentest_TV  Год назад +1

      Could be because of the target's firewall, but I'd have to know more. This is a great question to bring over to the discord server: discord.gg/pee5WDfnxv
      Thanks for posting the question and watching the video!

  • @anthonyharper4877
    @anthonyharper4877 Год назад +1

    you need more likes and followers, this is very educational and helpful for a career path in cybersecurity

    • @pentest_TV
      @pentest_TV  Год назад

      Thank you… I really appreciate it! Just trying to share my experience and help others avoid some of the pitfalls and challenges I’ve encountered over the decades. Glad to know it’s valuable to others. 👍👍👍

  • @george1356
    @george1356 Год назад +4

    i didnt know all that about -A. Thanks man!

    • @pentest_TV
      @pentest_TV  Год назад +2

      Hey, thanks for the feedback! Yeah, it’s insidious 😜

  • @mukut5ul
    @mukut5ul Год назад +4

    is it possible to scan vms behind loadbalancer?

    • @pentest_TV
      @pentest_TV  Год назад +2

      Really good question. Yes, but load balancers are a bit weird. the backend systems may not be identical or patched the same, so you might keep getting different results against the same IP. Just be aware that it's a possibility. Also, some scanning tools can identify load balancers (Nessus / openVAS) to give you a heads up as well.
      Thanks for the question and thanks for watching!

  • @tahersadeghi6773
    @tahersadeghi6773 Год назад +1

    Great video. thank you.

    • @pentest_TV
      @pentest_TV  Год назад

      My pleasure - thanks for letting me know you enjoyed it. 👍👍

  • @Piedrasama
    @Piedrasama Год назад +1

    Thanks for the knowledge shared. Good video & advise. Funny, engaging and educational.

    • @pentest_TV
      @pentest_TV  Год назад

      My pleasure and glad you found it worthwhile! Thanks for watching!

  • @Rafael-oq9vu
    @Rafael-oq9vu Год назад +1

    Awesome video. I'm waiting for the next

    • @pentest_TV
      @pentest_TV  Год назад +1

      Thanks! Coming very soon… make sure to click the bell for notification when it drops.

  • @cybersecurity-gq9rr
    @cybersecurity-gq9rr 11 месяцев назад +1

    Ver insightful content

    • @pentest_TV
      @pentest_TV  11 месяцев назад

      Thanks for letting me know!

  • @UFKx
    @UFKx Год назад +2

    Great video Kevin!

    • @pentest_TV
      @pentest_TV  Год назад +1

      Thanks! Name’s Thomas Wilhelm, though… appreciate your watching the video and glad you liked it.

  • @liubomyrsiusar6589
    @liubomyrsiusar6589 Год назад +3

    How to make the same style of terminal? It s cool

    • @pentest_TV
      @pentest_TV  Год назад

      It’s the Windows 11 command window connected to kali Linux on the AWS network.

    • @liubomyrsiusar6589
      @liubomyrsiusar6589 Год назад +2

      Thanks, I will try it, btw - great course 👍

    • @pentest_TV
      @pentest_TV  Год назад +1

      Awesome! Glad you enjoyed it!!

  • @thoscofer
    @thoscofer Год назад +1

    Great video, much appreciated, will help avoid some easily made mistakes. Very informative.

    • @pentest_TV
      @pentest_TV  Год назад

      Glad you enjoyed it and thanks a lot for the comment! LMK if there are any topics you'd like to see.

  • @ange1vega
    @ange1vega 10 месяцев назад +1

    Amazing video brother! 🤙🤙

    • @pentest_TV
      @pentest_TV  10 месяцев назад +1

      Glad you liked it, and thanks for the comment! 👍👍

  • @kazimali572
    @kazimali572 Год назад +1

    this is some crazy stuff, thanks

    • @pentest_TV
      @pentest_TV  Год назад

      Hope it helps and thanks for watching!!

  • @johnheintz4772
    @johnheintz4772 Год назад +1

    Thanks for the crash course and warnings! 🙂

    • @pentest_TV
      @pentest_TV  Год назад

      Thanks for watching! Glad it was helpful. 👍👍

  • @charittaroach9580
    @charittaroach9580 Год назад +2

    Great video!

    • @pentest_TV
      @pentest_TV  Год назад +1

      Glad you enjoyed it! And thanks for the comment… lmk if there is any other topic you want covered.

  • @patytrico
    @patytrico Год назад +2

    Thank you for the class!

    • @pentest_TV
      @pentest_TV  Год назад +1

      Thanks for watching and commenting! If there is anything you’re interested in me covering, don’t hesitate to lmk.

  • @pabloqp7929
    @pabloqp7929 Год назад +3

    great video sire

    • @pentest_TV
      @pentest_TV  Год назад +3

      Much appreciated - thanks for watching and commenting!!

  • @bibi9984
    @bibi9984 Год назад +1

    like your video which are well explained

    • @pentest_TV
      @pentest_TV  Год назад

      I appreciate the feedback and glad you enjoyed it!

  • @battery2xa22
    @battery2xa22 Год назад +2

    very good video. it was all easy to understand

    • @pentest_TV
      @pentest_TV  Год назад +1

      Oh good! Glad it was helpful. If you have any other tools you want me to highlight, lmk. Thanks for watching!

  • @codelinx
    @codelinx Год назад +1

    That was great info

    • @pentest_TV
      @pentest_TV  Год назад +1

      Glad it was helpful! Thanks for watching. 👍👍👍

  • @PaulBiyabiya
    @PaulBiyabiya Год назад +1

    Can we use nmap Scripts on bug bounty to find vulnerabilities???

    • @pentest_TV
      @pentest_TV  Год назад

      Really good question! The answer is “maybe? Probably?”… but it totally depends on the rules of engagement the the big bounty provides. So make sure you read and absolutely follow their rules. Some may not permit brute force, so you’ll have to exclude those, etc.
      Thanks for the question!

  • @shellcatt
    @shellcatt Год назад +1

    Point taken.

  • @youssefbenghorbel1982
    @youssefbenghorbel1982 Год назад +2

    good video sir , keep up !

    • @pentest_TV
      @pentest_TV  Год назад +2

      Glad you enjoyed it, and seems like it’s beneficial to more than a few people… so guess I’ll keep making them. 🤗

  • @soullessman9049
    @soullessman9049 Год назад +3

    Good video

    • @pentest_TV
      @pentest_TV  Год назад +1

      Thanks for watching and glad you enjoyed it!

  • @pramodjogdand0
    @pramodjogdand0 Год назад +4

    Useful 👍

  • @seanlow9184
    @seanlow9184 8 месяцев назад +1

    Hey this guy is really good

    • @pentest_TV
      @pentest_TV  8 месяцев назад

      Glad you enjoyed the video, and thanks for the feedback!!

  • @Channel-ev5ks
    @Channel-ev5ks Год назад +1

    Wow really good

    • @pentest_TV
      @pentest_TV  Год назад

      Thanks for watching and commenting!!

  • @Gotlove321
    @Gotlove321 Год назад +1

    Hello 😅😅 i like your video from Thailand bro🎉🎉🎉❤

    • @pentest_TV
      @pentest_TV  Год назад

      Thanks for watching! Lmk if there’s any topic you’d like to see.

  • @estigoyunli
    @estigoyunli Год назад +1

    I try the commands and it's work accurately.but one thing I don't know.sir.dirctor.the command for chopping of the file.tnx for the info.

    • @pentest_TV
      @pentest_TV  Год назад +1

      Thanks for watching and the question. Not sure exactly what you’re trying to do but I use the -oA flag for output, which allows me to export findings into other tools if necessary. The xml and grep files I use to programmatically identify potentially exploitable vulnerabilities, and the standard output is just easier for me to read.
      Hope that helps. Thanks again!

  • @Gomorzo
    @Gomorzo Год назад +1

    Awesome

  • @AkshatBhardwaj-yf7ck
    @AkshatBhardwaj-yf7ck 11 месяцев назад +2

    I did script http along the video it took me 7736 sec (2+ hr) 🙂

    • @pentest_TV
      @pentest_TV  10 месяцев назад

      Yeah… fine if you have the time but it’s a poor way to test. Thanks for letting us know!👍👍👍

  • @bilalbasheir
    @bilalbasheir Год назад +1

    Please tell me there is no need to be good in maths and coding for becoming the pentester 😂.......leave it aside to be honest i feel lucky to gain some knowledge from you sir..its my request to you please make some roadmap vedios like what should we beginners follow from early stages to get this feild

    • @pentest_TV
      @pentest_TV  Год назад

      Roadmap videos… good idea! And no, math or coding isn’t really required unless you’re more interested in app pentesting or code reviews. As a network pentester, I haven’t written a script in years, and I lost all my math knowledge except for some algebra. Thanks for the comment and idea!

    • @bilalbasheir
      @bilalbasheir Год назад +1

      @@pentest_TV I don't feel sorry for your lost sir😆.... thankyou

    • @pentest_TV
      @pentest_TV  Год назад

      Lmao!! Same. Thanks for watching and commenting!

  • @FranklySecure
    @FranklySecure Год назад +1

    I appreciate your channel and wisdom however I can not say positive things about your Alienware PC...

    • @pentest_TV
      @pentest_TV  Год назад

      LMAO - don't get me started! Didn't want to make my own gaming system, ordered this, had it not work (random shutdown) for two months, and when they finally replaced it, they sent it in the wrong color! Geezus! I'll tell you what though... the 4090 kicks ass.
      Thanks for watching and the comment!!

  • @Random_life_for_you
    @Random_life_for_you Год назад +1

    WE NEED PYTHON COURSE
    PLEASE..........

    • @pentest_TV
      @pentest_TV  Год назад +1

      My wife just said “well, yeah!” Guess I need to make a python course for hackers. 😝

    • @Random_life_for_you
      @Random_life_for_you Год назад +1

      @@pentest_TV sure u do :)

  • @Linux333
    @Linux333 Год назад +1

    Idk why Network Chuck is so popular, very basic and barely goes into detail. This guy got the job done

    • @pentest_TV
      @pentest_TV  Год назад

      Thanks for your vote of confidence! Glad you enjoyed the content as well. Lmk if there any topics you’d like to see, otherwise thanks for watching!👍👍👍

  • @hehehe4450
    @hehehe4450 Год назад

    But aren't you exposing yourself to that website you are scanning? You are not using a vpn, proxy chains or tor, so you have not much anonymity. 🤔

    • @pentest_TV
      @pentest_TV  Год назад +1

      You are 100 percent correct, but in all external, ethical pentests anonymity is not a concern. In fact, we ask customers beforehand if they block external connections, and if they do, to whitelist us so we don't get throttled or blocked. The only time we care about detection is during a red team so we don't alert the blue team (SOC). Remember, a pentest is a very short engagement so the fewer delays or obstacles we have, the better. Thanks for your question!

    • @hehehe4450
      @hehehe4450 Год назад +1

      @@pentest_TV Thank you very much for your answer! But it would be pretty cool, if all this could be done anonymously. I don't know how it can function with proxychains, and I'm not even sure if proxychains actually are that anonymous.
      May I also ask what you mean by red team and blue team, and what an SOC is?

    • @pentest_TV
      @pentest_TV  Год назад

      Intrusion detection systems monitoring internet-facing servers usually have thresholds on what to report. You can use timing techniques to scan below those thresholds. Problem is the customer can change what those thresholds are, so what you think is “slow enough” can still get detected. The alarms that can get generated by scanning too fast is monitored by a Security Operations Center (SOC) and it’s with them that we try to avoid detection when doing red team exercises. Hope that helps a bit. Thanks for reaching back out!