Thank you for making me understand what I did not understand well e.g set RHOSTS and set payload that part if you don't know anything on Metasploit its really hard to understand it when you want to use the different attack on the machine but your teaching makes one understand conveniently well, thank you and keep it up, Mr. Loi Liang Yang. I also shared your channel with other communities hopes soon you will have one million subs. Cheers..!
Thank you so much! Been diving more into pen testing and hard to find straight forward, clear understanding on how to use the tools. Love the quick break down with the tools in Kali. Will be watching more from you!
@@51swarajrohad87 Well I would recommend you getting books or reading e books because that's what helped me. Coding in different languages is too helpful. Hacking the art of exploitation is my first and probably my favourite
Your a legend dud I've been watching your videos for a long time. You've really dedicated on helping others as well .. your the best great spirit :) you taught me a lot also I learned many things by looking up and tinkering around my house :D
I have been learning ethical hacking and penetration testing for about a year now, this was the easiest method I have ever come across. Thank you! IMMEDIATELY SUBSCRIBING for even more content. Thank you!
Awesome quick tutorial obviously in real world we should scan and find the IP's and it's not that straightforward, but it would be useful to tell what the target should do to avoid this unauthorized access... Is this enough for pen testing where clients give us as a task or should we go further and implement malwares and other scripts once we're in to prove how awful their security measures are?
Hey Loi, your videos are really nice but I am having trouble getting into ethical hacking. Most things that you show require the user of the windows machine to be stupid i.e. weak passwords, no firewall, no AV, no setup of windows policies/settings etc. How likely is it to get access to a Windows 10 machine that is up-to-date and is using a proper firewall?
Sir i want to view your deleted youtube video that you have uploaded 1.5 month ago on topic of removing lockscreen password of android by changing some data in locksettings.db file. And sorry for my English if there any Mistake 😁
Can we use the domain name (if they have one ), instead of the IP address in all cases you list the IP addresses of the target user or does it have to be IP
I have read books and practicing it. This video has simplify what i was searching for. I DID THE COMMAND ON NMAP BUT MINE DID NOT SHOW THE VERSION, I COULDN'T PROCCEED.....?
First of all very good content.... And I have question. Can i exploit my laptop using this... If that laptop not connected to my router .. But I know it IP address
Is there a way to find out how the exploit for vsftpd was implemented? I'm curious about what happens being the scenes in metasploit. I'm assuming there is a released article about this exploit in question that explains it?
I understood where you were going up until you input: "set payload cmd/unix/interact". Is this a command you will always enter or if not, can you explain please ?
What can I read or watch that tells me the vulnerabilities pertaining to services & versions so I can understand metasploit better. Please answer as I have an exam coming up!
Hello Loi Liang Yang ! I did blocked my window 10 by mistake that means I’m not able to login into and not able to put my password because it say “wrong password “ so what to do to get access again???? ( it doesn’t has reset password option)...😢😢😢
Can you tell me how to do it with my own payload, I don’t want to have remote access just my exe to pass the Anti virus Softwares. (For ethical hacking only) We are tasked by our it school course in the realm of a project. It doesn’t matter which exploit we use, the payload must do its job on target machine.
Your iso image file could be corrupted. Download it again and do the setup again. I had the exact same problem recently. It has been 2 years. Guess you figured it out by now.
Could we use the vuln scan within msf or nmap to find what uts currently vulnerability to and theb manual select thr expoloit in msf? Sorry if this might seem a noobe question
Wow thats pretty nice thanks for your tutorial. But i have a question. When i run msf console with proxychains throught tor and have exploit with lhost parameter so how can I setup exploit throught tor?
so all my ports are close on my pc. ran this scirpt just like you did, but it says Exploit completed, but no session was created. would this of worked if i had one open port ????
Sir I followed all your instructions at last it is showing that exploit failed[unreachable] and connection timed out meanwhile it is showing down that exploit completed, but no sessions was created
when i make the app in linux, and test it on another machine it doesnt send me the info only on my local machine how do i make it over WAN i tried port forwarding idk how it works can someone send me a detailed explanation
sir the ip address is not opening in the other vm can u tell me what might be the issue? is it related to network settings in the vm ? if so how i change it so that it can show that login website
the ip is declared- Exploit failed [unreachable]: Rex::ConnectionTimeout The connection timed out -the ip is declared- [*] Exploit completed, but no session was created. how can i fix this
VM are made with scripts. If you screwed up, if you changed something you weren’t suppose to, you can delete it and create a new one since it is only made up of scripts.
Come join hundreds of students to learn ethical hacking and penetration testing now! www.udemy.com/course/full-ethical-hacking-course/
Is this course new or just a few updated videos? It lists last updated as 3/21.
Which payload nd how can we know dt which payload should we use lyk u use cmd/unix/interact
@@navi3046 same here
@@navi3046 he already said.. it has only one payload that can be used there.. and he used tab to autoload the payload.. so that's that!
@@Tarun_Kotagiri I need a good haker plz help me a scam website tok my money
Just like always a valuable beginner friendly content for all CS students.
Funny thing, I know all my CS till college and I haven't even started to take lessons
@@SuperNecroticOH That's the way to do it
@@SuperNecroticOH I doubt that, u just scratched the serfes
Thank you for making me understand what I did not understand well e.g set RHOSTS and set payload that part if you don't know anything on Metasploit its really hard to understand it when you want to use the different attack on the machine but your teaching makes one understand conveniently well, thank you and keep it up, Mr. Loi Liang Yang. I also shared your channel with other communities hopes soon you will have one million subs. Cheers..!
Thank you so much! Been diving more into pen testing and hard to find straight forward, clear understanding on how to use the tools. Love the quick break down with the tools in Kali. Will be watching more from you!
Right up there with The Cyber Mentor, Zaid, and David Bombal. Great teaching style! Keep the content coming.
Hey got any advice for me learning from yt and various online sources.
@@51swarajrohad87 Well I would recommend you getting books or reading e books because that's what helped me. Coding in different languages is too helpful. Hacking the art of exploitation is my first and probably my favourite
Your a legend dud I've been watching your videos for a long time. You've really dedicated on helping others as well .. your the best great spirit :) you taught me a lot also I learned many things by looking up and tinkering around my house :D
Waiting for part 2...continue the series of ethical hacking❤️
sir i am always watching your channel and i want to became like you all are useful helping video
I have been learning ethical hacking and penetration testing for about a year now, this was the easiest method I have ever come across. Thank you! IMMEDIATELY SUBSCRIBING for even more content. Thank you!
Hey @frooogle99 I may can use your help hit me up thanks
I just discovered your channel a few days ago and I can't stop watching. Great content!
You just gained 15 more subscribers from my side.
Hi do you know someone how has Hackers
Because a scam website get my money
I need help
@@Infomusic855 website name plz i will check
Great video, but where did the cmd/unix/interact come from , only asking because the box I'm attempting is proftpd so I'm alittle lost at that part
Thank you sir for giving us such a valuable description of Kali Linux system 👍👍😊😊😊
Bro I love your content I try to understand what is the metasploit and how to use exploit but only you explain too good
Video starts at 6:30 Youre welcome
Awesome quick tutorial obviously in real world we should scan and find the IP's and it's not that straightforward, but it would be useful to tell what the target should do to avoid this unauthorized access... Is this enough for pen testing where clients give us as a task or should we go further and implement malwares and other scripts once we're in to prove how awful their security measures are?
Oh a very simple and easy way, I have understood a lots of points am so grateful 🙏
Couldn't find video where you asked WHO'S our favorite hacker, so......
1) Hacker Loi
2) Kody Kinsey
3) HackerSploit
4) Katie Paxton-Fear
5) Network Chuck
Thank you for the tutorial 👍🏼
Good video thank you very much a lot of hacking tutorials don’t teach you how to actually exploit open ports
you need to find a vulnerabilities on the port you can't exploit it without a vulnerabilities
Pls don't discontinued this, pls..... Because we. Need to stuff in this 💥
Genius, love your work. Gonna use your materiel more. Thank you.
Simply excellent thank you 😊
you are a great teacher bro
can you make a lot of videos please
Hey Loi, your videos are really nice but I am having trouble getting into ethical hacking. Most things that you show require the user of the windows machine to be stupid i.e. weak passwords, no firewall, no AV, no setup of windows policies/settings etc. How likely is it to get access to a Windows 10 machine that is up-to-date and is using a proper firewall?
then u need to bulid your own tools exploit and scripts
this question screams the ”un” in front of ethical hacking lol.
Sir make a course only for advance level. Real advance level
You sure can read my mind. Yes, I am in the midst of building a full advanced level ethical hacking course. Stay tuned!
Very nice content.. Thank you so much..I like the way you explain in simple way.
Very informative video sir 🙏❤️
Im so excited to those vedios keep it up
Oo pubg lover pehele spelling sudhar le apni video ko vedio likh raha hai 😆
Great tutorial , hope will be more on metasploit
@9:12 You can do a 'double tap'... I mean, WTH is a double tap. I'm new and learning. Thanks!
Outstanding Sir.
Well, I am beginner how to learn complete course.
valuable beginner friendly content, no doubt. But does anyone else feel weird about him not facing the camera?
Sir put a content on sms spoofing also....
Does it work the same if I target windows devices?
Sir i want to view your deleted youtube video that you have uploaded 1.5 month ago on topic of removing lockscreen password of android by changing some data in locksettings.db file.
And sorry for my English if there any Mistake 😁
sir which courses are u done for your current job?
Amazing sir I like it ☺️
Can we use the domain name (if they have one ), instead of the IP address in all cases you list the IP addresses of the target user or does it have to be IP
Thank you my friend
I have read books and practicing it. This video has simplify what i was searching for. I DID THE COMMAND ON NMAP BUT MINE DID NOT SHOW THE VERSION, I COULDN'T PROCCEED.....?
Hey how did you get the target ip address for the nmap?
First of all very good content.... And I have question.
Can i exploit my laptop using this... If that laptop not connected to my router .. But I know it IP address
Is there a way to find out how the exploit for vsftpd was implemented? I'm curious about what happens being the scenes in metasploit. I'm assuming there is a released article about this exploit in question that explains it?
nice video always Metasploit :)
I love you so much you are the best teacher
I understood where you were going up until you input: "set payload cmd/unix/interact". Is this a command you will always enter or if not, can you explain please ?
Huge FAN of yours 🙏
Good and simple Explain👍
now what ? i mean what's the next step after getting root access ? love ur vids btw keep going 🔥🔥
Very helpful for me.
See you 🤗 soon
What can I read or watch that tells me the vulnerabilities pertaining to services & versions so I can understand metasploit better. Please answer as I have an exam coming up!
Search target
Sir i want to ask you one question i that question is how to create payload? And how to send that payload to victims machine?
Can you tell me???
Nice tutorial ♥️👍
Hello Loi Liang Yang ! I did blocked my window 10 by mistake that means I’m not able to login into and not able to put my password because it say “wrong password “ so what to do to get access again???? ( it doesn’t has reset password option)...😢😢😢
Please do a tutorial about CCTV cameras
what website to learn or certificate to get first as a beginner to do pentesting or ethical hacker.
Wow, you're a genius!
Can you tell me how to do it with my own payload, I don’t want to have remote access just my exe to pass the Anti virus Softwares. (For ethical hacking only) We are tasked by our it school course in the realm of a project.
It doesn’t matter which exploit we use, the payload must do its job on target machine.
Sir i buy your course and i also join your channel. Can you please teach us how to make our own hacking tools instead to script kiddies ....
Absolutely! Love your enthusiasm for learning!
@@LoiLiangYang Greetings teacher Loi liang kindly include PayPal on the payment method because i want to Join
Thanks sir help full video
Uncle Loi , help me my kali linux in virtual box (graphical install) was freeze before login at second way i login after install it .... 🙏
I think i can help with this
@@gurach7328don't you think you are too early to reply
Your iso image file could be corrupted. Download it again and do the setup again. I had the exact same problem recently. It has been 2 years. Guess you figured it out by now.
Used utm👍
Turn off internet
Could we use the vuln scan within msf or nmap to find what uts currently vulnerability to and theb manual select thr expoloit in msf?
Sorry if this might seem a noobe question
Wow thats pretty nice thanks for your tutorial. But i have a question. When i run msf console with proxychains throught tor and have exploit with lhost parameter so how can I setup exploit throught tor?
so all my ports are close on my pc. ran this scirpt just like you did, but it says Exploit completed, but no session was created. would this of worked if i had one open port ????
Metasploit and Millworm havn't had current exploits in years.. Never had sandbox escapes... Real pros can use IDA or Ghydra and find exploitable bugs
Thank you very much for this tutorial.
But I still don't get how the payload command came about. Any help?
Enjoy your content.
wow this is amazing
How do I find the correct ip address for metasploitable? When I run "ip address" it gives me the same ip address as my kali machine
Sir I followed all your instructions at last it is showing that exploit failed[unreachable] and connection timed out meanwhile it is showing down that exploit completed, but no sessions was created
Sir make a video about routersploit
Thanks for your video sir
at 9:12 you said double click, what does it mean , is it the double click of shift ,tab or what
Valuable session...
Do you offer courses on Metasploit?
Sir put a content on making our own JavaScript to get location,camera ,mic of the victim🥺😘😘
how do u know which payloads you can use
love 💕 form india sir 🤩
عاش يا كبير🤩😍😘
when i make the app in linux, and test it on another machine it doesnt send me the info only on my local machine how do i make it over WAN i tried port forwarding idk how it works can someone send me a detailed explanation
If you port scan a public ip would it work aswell?
What about AV Evasion and how to defend?
Hi Loi, how stay anonymous when using metasploite reverse TCP, I know ngrok but it is not anonymous enough?
someone needs help here !!
when i click exploit it says :-
exploit completed but no session was created .
sir QnA live stream on youtube. please
The Commands are not showing well even when you make the screen landscape
exloit completed but no session was created??
Same
Please make tutorials for mobile exploits.. for us
i got error that connection is refused can i know why and how to solve that
i gave my windows ip
Thanks
But exploit failed for me why?
sir the ip address is not opening in the other vm can u tell me what might be the issue? is it related to network settings in the vm ? if so how i change it so that it can show that login website
video starts at 6:31
the ip is declared- Exploit failed [unreachable]: Rex::ConnectionTimeout The connection timed out -the ip is declared-
[*] Exploit completed, but no session was created.
how can i fix this
Can you teach me how login in global server?
when i press exploit it says exploit completed but no session created any one know how to fix?
What is the significance of using a vm versus just using your own system?
Security purpose
VM are made with scripts. If you screwed up, if you changed something you weren’t suppose to, you can delete it and create a new one since it is only made up of scripts.
In exploit, [*] no payload configured, detailing to cmd/unix/interact showing...
Was struggling to exploit an smtp server until I learned about metasploit.. now I’m in the bathroom while I let it enumerate for me lmao