Metasploit Tutorial for Beginners

Поделиться
HTML-код
  • Опубликовано: 26 окт 2024

Комментарии • 222

  • @LoiLiangYang
    @LoiLiangYang  3 года назад +38

    Come join hundreds of students to learn ethical hacking and penetration testing now! www.udemy.com/course/full-ethical-hacking-course/

    • @danielv3228
      @danielv3228 3 года назад

      Is this course new or just a few updated videos? It lists last updated as 3/21.

    • @navi3046
      @navi3046 3 года назад +2

      Which payload nd how can we know dt which payload should we use lyk u use cmd/unix/interact

    • @rahulgaikwad9860
      @rahulgaikwad9860 3 года назад

      @@navi3046 same here

    • @Tarun_Kotagiri
      @Tarun_Kotagiri 3 года назад

      @@navi3046 he already said.. it has only one payload that can be used there.. and he used tab to autoload the payload.. so that's that!

    • @Infomusic855
      @Infomusic855 3 года назад

      @@Tarun_Kotagiri I need a good haker plz help me a scam website tok my money

  • @hrushikeshdinkar9994
    @hrushikeshdinkar9994 3 года назад +71

    Just like always a valuable beginner friendly content for all CS students.

    • @SuperNecroticOH
      @SuperNecroticOH 2 года назад

      Funny thing, I know all my CS till college and I haven't even started to take lessons

    • @quantumblurrr
      @quantumblurrr 6 месяцев назад

      @@SuperNecroticOH That's the way to do it

    • @omaryousifkamal4290
      @omaryousifkamal4290 5 месяцев назад +1

      @@SuperNecroticOH I doubt that, u just scratched the serfes

  • @josekiki1587
    @josekiki1587 3 года назад +9

    Thank you for making me understand what I did not understand well e.g set RHOSTS and set payload that part if you don't know anything on Metasploit its really hard to understand it when you want to use the different attack on the machine but your teaching makes one understand conveniently well, thank you and keep it up, Mr. Loi Liang Yang. I also shared your channel with other communities hopes soon you will have one million subs. Cheers..!

  • @shintojoe7907
    @shintojoe7907 2 года назад +7

    Thank you so much! Been diving more into pen testing and hard to find straight forward, clear understanding on how to use the tools. Love the quick break down with the tools in Kali. Will be watching more from you!

  • @root3434
    @root3434 3 года назад +11

    Right up there with The Cyber Mentor, Zaid, and David Bombal. Great teaching style! Keep the content coming.

    • @51swarajrohad87
      @51swarajrohad87 9 месяцев назад

      Hey got any advice for me learning from yt and various online sources.

    • @JamboRickstar-te8mx
      @JamboRickstar-te8mx 4 месяца назад

      ​@@51swarajrohad87 Well I would recommend you getting books or reading e books because that's what helped me. Coding in different languages is too helpful. Hacking the art of exploitation is my first and probably my favourite

  • @nothing5600
    @nothing5600 3 года назад +12

    Your a legend dud I've been watching your videos for a long time. You've really dedicated on helping others as well .. your the best great spirit :) you taught me a lot also I learned many things by looking up and tinkering around my house :D

  • @navi3046
    @navi3046 3 года назад +7

    Waiting for part 2...continue the series of ethical hacking❤️

  • @BOXOFFUN-K
    @BOXOFFUN-K 3 года назад +2

    sir i am always watching your channel and i want to became like you all are useful helping video

  • @frooogle99
    @frooogle99 Год назад +2

    I have been learning ethical hacking and penetration testing for about a year now, this was the easiest method I have ever come across. Thank you! IMMEDIATELY SUBSCRIBING for even more content. Thank you!

    • @Mware-th2md
      @Mware-th2md Год назад

      Hey @frooogle99 I may can use your help hit me up thanks

  • @jordanjohnson8150
    @jordanjohnson8150 3 года назад +1

    I just discovered your channel a few days ago and I can't stop watching. Great content!

  • @kermitdaphrogge525
    @kermitdaphrogge525 3 года назад +6

    You just gained 15 more subscribers from my side.

    • @Infomusic855
      @Infomusic855 3 года назад

      Hi do you know someone how has Hackers
      Because a scam website get my money
      I need help

    • @haShira_222
      @haShira_222 3 года назад

      @@Infomusic855 website name plz i will check

  • @jadenshay7953
    @jadenshay7953 11 месяцев назад +2

    Great video, but where did the cmd/unix/interact come from , only asking because the box I'm attempting is proftpd so I'm alittle lost at that part

  • @subhankarchakraborty3931
    @subhankarchakraborty3931 3 года назад +2

    Thank you sir for giving us such a valuable description of Kali Linux system 👍👍😊😊😊

  • @ΣτεφανοςΚαζακκος
    @ΣτεφανοςΚαζακκος Месяц назад

    Bro I love your content I try to understand what is the metasploit and how to use exploit but only you explain too good

  • @quicksolution5881
    @quicksolution5881 Год назад +3

    Video starts at 6:30 Youre welcome

  • @GoktugErol-o9c
    @GoktugErol-o9c 6 месяцев назад

    Awesome quick tutorial obviously in real world we should scan and find the IP's and it's not that straightforward, but it would be useful to tell what the target should do to avoid this unauthorized access... Is this enough for pen testing where clients give us as a task or should we go further and implement malwares and other scripts once we're in to prove how awful their security measures are?

  • @babashehumodu1463
    @babashehumodu1463 2 года назад

    Oh a very simple and easy way, I have understood a lots of points am so grateful 🙏

  • @sirgesound
    @sirgesound Год назад

    Couldn't find video where you asked WHO'S our favorite hacker, so......
    1) Hacker Loi
    2) Kody Kinsey
    3) HackerSploit
    4) Katie Paxton-Fear
    5) Network Chuck

  • @Vijay-vi5cr
    @Vijay-vi5cr 3 года назад +4

    Thank you for the tutorial 👍🏼

  • @idontwantausername7398
    @idontwantausername7398 3 года назад +1

    Good video thank you very much a lot of hacking tutorials don’t teach you how to actually exploit open ports

    • @saryakhrs265
      @saryakhrs265 3 года назад +1

      you need to find a vulnerabilities on the port you can't exploit it without a vulnerabilities

  • @vinothn4228
    @vinothn4228 3 года назад +8

    Pls don't discontinued this, pls..... Because we. Need to stuff in this 💥

  • @PeIeus
    @PeIeus 6 месяцев назад

    Genius, love your work. Gonna use your materiel more. Thank you.

  • @honorvirtue2904
    @honorvirtue2904 3 года назад +4

    Simply excellent thank you 😊

  • @CtecgCtecg-jv8if
    @CtecgCtecg-jv8if Год назад

    you are a great teacher bro
    can you make a lot of videos please

  • @benteta
    @benteta 3 года назад +4

    Hey Loi, your videos are really nice but I am having trouble getting into ethical hacking. Most things that you show require the user of the windows machine to be stupid i.e. weak passwords, no firewall, no AV, no setup of windows policies/settings etc. How likely is it to get access to a Windows 10 machine that is up-to-date and is using a proper firewall?

    • @Lord_Aquasis
      @Lord_Aquasis Год назад

      then u need to bulid your own tools exploit and scripts

    • @topias1447
      @topias1447 11 месяцев назад

      this question screams the ”un” in front of ethical hacking lol.

  • @gurejalectures
    @gurejalectures 3 года назад +1

    Sir make a course only for advance level. Real advance level

    • @LoiLiangYang
      @LoiLiangYang  3 года назад +2

      You sure can read my mind. Yes, I am in the midst of building a full advanced level ethical hacking course. Stay tuned!

  • @mr.sameers.tathare8468
    @mr.sameers.tathare8468 8 месяцев назад

    Very nice content.. Thank you so much..I like the way you explain in simple way.

  • @devanshkanda9618
    @devanshkanda9618 3 года назад +3

    Very informative video sir 🙏❤️

  • @defyteryt2452
    @defyteryt2452 3 года назад +3

    Im so excited to those vedios keep it up

    • @bidhumitra15
      @bidhumitra15 3 года назад

      Oo pubg lover pehele spelling sudhar le apni video ko vedio likh raha hai 😆

  • @propolipropoli
    @propolipropoli 9 месяцев назад

    Great tutorial , hope will be more on metasploit

  • @rashad35
    @rashad35 11 месяцев назад

    @9:12 You can do a 'double tap'... I mean, WTH is a double tap. I'm new and learning. Thanks!

  • @daudkhanafridi3232
    @daudkhanafridi3232 3 года назад

    Outstanding Sir.
    Well, I am beginner how to learn complete course.

  • @ashrafulislam7065
    @ashrafulislam7065 9 месяцев назад

    valuable beginner friendly content, no doubt. But does anyone else feel weird about him not facing the camera?

  • @umarmuzammil7332
    @umarmuzammil7332 3 года назад +7

    Sir put a content on sms spoofing also....

  • @LemonadetvYT
    @LemonadetvYT 2 года назад +1

    Does it work the same if I target windows devices?

  • @Cyb3rBuddy
    @Cyb3rBuddy 3 года назад +1

    Sir i want to view your deleted youtube video that you have uploaded 1.5 month ago on topic of removing lockscreen password of android by changing some data in locksettings.db file.
    And sorry for my English if there any Mistake 😁

  • @abuajmalmajidponnethabu2858
    @abuajmalmajidponnethabu2858 3 года назад +1

    sir which courses are u done for your current job?

  • @invisibleman6104
    @invisibleman6104 3 года назад +2

    Amazing sir I like it ☺️

  • @StirsMYCookiez
    @StirsMYCookiez 3 года назад +2

    Can we use the domain name (if they have one ), instead of the IP address in all cases you list the IP addresses of the target user or does it have to be IP

  • @pjtrusci
    @pjtrusci 3 года назад +2

    Thank you my friend

  • @AbdulBasitKamil
    @AbdulBasitKamil 10 месяцев назад

    I have read books and practicing it. This video has simplify what i was searching for. I DID THE COMMAND ON NMAP BUT MINE DID NOT SHOW THE VERSION, I COULDN'T PROCCEED.....?

  • @diptangsugupta908
    @diptangsugupta908 Год назад +1

    Hey how did you get the target ip address for the nmap?

  • @gowrishankar7011
    @gowrishankar7011 3 года назад

    First of all very good content.... And I have question.
    Can i exploit my laptop using this... If that laptop not connected to my router .. But I know it IP address

  • @themullet136
    @themullet136 3 года назад +2

    Is there a way to find out how the exploit for vsftpd was implemented? I'm curious about what happens being the scenes in metasploit. I'm assuming there is a released article about this exploit in question that explains it?

  • @rouen768
    @rouen768 3 года назад +4

    nice video always Metasploit :)

  • @SebastienMukombe
    @SebastienMukombe 9 месяцев назад

    I love you so much you are the best teacher

  • @jackcsprat
    @jackcsprat 5 месяцев назад

    I understood where you were going up until you input: "set payload cmd/unix/interact". Is this a command you will always enter or if not, can you explain please ?

  • @AIVisionaryLab
    @AIVisionaryLab 3 года назад

    Huge FAN of yours 🙏

  • @Waheed102
    @Waheed102 9 месяцев назад

    Good and simple Explain👍

  • @infiniteloop2343
    @infiniteloop2343 3 года назад +1

    now what ? i mean what's the next step after getting root access ? love ur vids btw keep going 🔥🔥

  • @its_code
    @its_code 3 года назад +2

    Very helpful for me.
    See you 🤗 soon

  • @tamerajames5590
    @tamerajames5590 2 года назад +1

    What can I read or watch that tells me the vulnerabilities pertaining to services & versions so I can understand metasploit better. Please answer as I have an exam coming up!

    • @bix2001
      @bix2001 12 дней назад

      Search target

  • @rahulgaikwad9860
    @rahulgaikwad9860 3 года назад

    Sir i want to ask you one question i that question is how to create payload? And how to send that payload to victims machine?
    Can you tell me???

  • @juneilquilana5159
    @juneilquilana5159 3 года назад +2

    Nice tutorial ♥️👍

  • @Nunesi
    @Nunesi 3 года назад

    Hello Loi Liang Yang ! I did blocked my window 10 by mistake that means I’m not able to login into and not able to put my password because it say “wrong password “ so what to do to get access again???? ( it doesn’t has reset password option)...😢😢😢

  • @djawedbenslimane536
    @djawedbenslimane536 3 года назад

    Please do a tutorial about CCTV cameras

  • @felosio
    @felosio 3 года назад

    what website to learn or certificate to get first as a beginner to do pentesting or ethical hacker.

  • @osenisegun5938
    @osenisegun5938 2 года назад

    Wow, you're a genius!

  • @fwiii1831
    @fwiii1831 2 года назад

    Can you tell me how to do it with my own payload, I don’t want to have remote access just my exe to pass the Anti virus Softwares. (For ethical hacking only) We are tasked by our it school course in the realm of a project.
    It doesn’t matter which exploit we use, the payload must do its job on target machine.

  • @gurejalectures
    @gurejalectures 3 года назад +1

    Sir i buy your course and i also join your channel. Can you please teach us how to make our own hacking tools instead to script kiddies ....

    • @LoiLiangYang
      @LoiLiangYang  3 года назад +1

      Absolutely! Love your enthusiasm for learning!

    • @macbook6507
      @macbook6507 3 года назад

      @@LoiLiangYang Greetings teacher Loi liang kindly include PayPal on the payment method because i want to Join

  • @vikramkumavate5947
    @vikramkumavate5947 3 года назад +1

    Thanks sir help full video

  • @mika2597
    @mika2597 2 года назад +8

    Uncle Loi , help me my kali linux in virtual box (graphical install) was freeze before login at second way i login after install it .... 🙏

    • @gurach7328
      @gurach7328 9 месяцев назад +1

      I think i can help with this

    • @51swarajrohad87
      @51swarajrohad87 9 месяцев назад

      ​@@gurach7328don't you think you are too early to reply

    • @pjmosi4686
      @pjmosi4686 3 месяца назад

      Your iso image file could be corrupted. Download it again and do the setup again. I had the exact same problem recently. It has been 2 years. Guess you figured it out by now.

    • @Mohd_Shavez0932
      @Mohd_Shavez0932 Месяц назад

      Used utm👍

    • @studyingbro-p8t
      @studyingbro-p8t 21 день назад

      Turn off internet

  • @MrFacproductions
    @MrFacproductions Год назад

    Could we use the vuln scan within msf or nmap to find what uts currently vulnerability to and theb manual select thr expoloit in msf?
    Sorry if this might seem a noobe question

  • @Tufar123
    @Tufar123 3 года назад

    Wow thats pretty nice thanks for your tutorial. But i have a question. When i run msf console with proxychains throught tor and have exploit with lhost parameter so how can I setup exploit throught tor?

  • @Kerry-w2m
    @Kerry-w2m 2 месяца назад

    so all my ports are close on my pc. ran this scirpt just like you did, but it says Exploit completed, but no session was created. would this of worked if i had one open port ????

  • @tjinspace7001
    @tjinspace7001 3 года назад +1

    Metasploit and Millworm havn't had current exploits in years.. Never had sandbox escapes... Real pros can use IDA or Ghydra and find exploitable bugs

  • @nwosukingsley8498
    @nwosukingsley8498 Год назад

    Thank you very much for this tutorial.
    But I still don't get how the payload command came about. Any help?

  • @zionstemple
    @zionstemple 3 года назад +1

    Enjoy your content.

  • @amirmohammadghasemiankarya9647
    @amirmohammadghasemiankarya9647 3 года назад +2

    wow this is amazing

  • @studentoflife3140
    @studentoflife3140 2 года назад

    How do I find the correct ip address for metasploitable? When I run "ip address" it gives me the same ip address as my kali machine

  • @darshank3238
    @darshank3238 Год назад

    Sir I followed all your instructions at last it is showing that exploit failed[unreachable] and connection timed out meanwhile it is showing down that exploit completed, but no sessions was created

  • @ajoyjohn6903
    @ajoyjohn6903 3 года назад

    Sir make a video about routersploit

  • @SilentSolution
    @SilentSolution 3 года назад

    Thanks for your video sir

  • @thetruth3372
    @thetruth3372 3 года назад

    at 9:12 you said double click, what does it mean , is it the double click of shift ,tab or what

  • @durgaprasad-co7yx
    @durgaprasad-co7yx 3 года назад

    Valuable session...

  • @JoeSmith-zu6lb
    @JoeSmith-zu6lb 3 года назад

    Do you offer courses on Metasploit?

  • @umarmuzammil7332
    @umarmuzammil7332 3 года назад +2

    Sir put a content on making our own JavaScript to get location,camera ,mic of the victim🥺😘😘

  • @gamingfreak5964
    @gamingfreak5964 3 года назад

    how do u know which payloads you can use

  • @Avleen-lz7dt
    @Avleen-lz7dt 3 года назад

    love 💕 form india sir 🤩

  • @ahmedsalah2173
    @ahmedsalah2173 3 года назад

    عاش يا كبير🤩😍😘

  • @AceEdits3
    @AceEdits3 7 месяцев назад

    when i make the app in linux, and test it on another machine it doesnt send me the info only on my local machine how do i make it over WAN i tried port forwarding idk how it works can someone send me a detailed explanation

  • @radiantomen5753
    @radiantomen5753 3 года назад

    If you port scan a public ip would it work aswell?

  • @andersnilsen5447
    @andersnilsen5447 3 года назад

    What about AV Evasion and how to defend?

  • @mansoorkochy
    @mansoorkochy 10 месяцев назад

    Hi Loi, how stay anonymous when using metasploite reverse TCP, I know ngrok but it is not anonymous enough?

  • @pitercompany7344
    @pitercompany7344 3 года назад

    someone needs help here !!
    when i click exploit it says :-
    exploit completed but no session was created .

  • @facttrendz1314
    @facttrendz1314 3 года назад +1

    sir QnA live stream on youtube. please

  • @philipudo1872
    @philipudo1872 4 месяца назад

    The Commands are not showing well even when you make the screen landscape

  • @igorfalica7431
    @igorfalica7431 Год назад +1

    exloit completed but no session was created??

  • @san_rawat
    @san_rawat 3 года назад

    Please make tutorials for mobile exploits.. for us

  • @s.gopikrishna
    @s.gopikrishna Год назад

    i got error that connection is refused can i know why and how to solve that
    i gave my windows ip

  • @SecurityTalent
    @SecurityTalent 3 года назад

    Thanks

  • @SUNSHINE-RECORDZ
    @SUNSHINE-RECORDZ Месяц назад

    But exploit failed for me why?

  • @ENGCS_SaiShreenidhiSatish
    @ENGCS_SaiShreenidhiSatish Год назад

    sir the ip address is not opening in the other vm can u tell me what might be the issue? is it related to network settings in the vm ? if so how i change it so that it can show that login website

  • @robcab3725
    @robcab3725 Месяц назад

    video starts at 6:31

  • @bemi1tube191
    @bemi1tube191 3 года назад

    the ip is declared- Exploit failed [unreachable]: Rex::ConnectionTimeout The connection timed out -the ip is declared-
    [*] Exploit completed, but no session was created.
    how can i fix this

  • @echoframechannel
    @echoframechannel 8 месяцев назад

    Can you teach me how login in global server?

  • @jaquaviousthe3rd109
    @jaquaviousthe3rd109 Год назад

    when i press exploit it says exploit completed but no session created any one know how to fix?

  • @shabadooshabadoo4918
    @shabadooshabadoo4918 Год назад

    What is the significance of using a vm versus just using your own system?

    • @vajaykumar5672
      @vajaykumar5672 9 месяцев назад

      Security purpose

    • @wkeezz
      @wkeezz 4 месяца назад

      VM are made with scripts. If you screwed up, if you changed something you weren’t suppose to, you can delete it and create a new one since it is only made up of scripts.

  • @amalraj6447
    @amalraj6447 3 года назад

    In exploit, [*] no payload configured, detailing to cmd/unix/interact showing...

  • @uliloves4929
    @uliloves4929 8 месяцев назад

    Was struggling to exploit an smtp server until I learned about metasploit.. now I’m in the bathroom while I let it enumerate for me lmao