MSFvenom Demystified: Unlocking the Power of Exploit Shellcode

Поделиться
HTML-код
  • Опубликовано: 21 авг 2024
  • Join this channel to get access to perks:
    / @pentest_tv
    Let's use the Metasploit msfvenom tool to create and run shellcode - a great introduction to shellcodes, payloads, and listeners and a great way to start your journey into ethical hacking and penetration testing. After watching this video, you'll have a better understanding of how shellcode works and how it can be used to exploit systems!
    Join our Discord Server: / discord
    Support us through Patreon: patreon.com/us...

Комментарии • 20

  • @chrisfortin7317
    @chrisfortin7317 8 месяцев назад +2

    Thanks for breaking the material out to this level. A lot of channels just show you instead of taking the time to explain the logic and/or reasoning behind it.

    • @pentest_TV
      @pentest_TV  8 месяцев назад +1

      Thanks for watching! It's a complex subject but I feel that it's important to break it down so people aren't either 1) intimidated by it or 2) making incorrect decisions on how to deploy it because it hasn't been explained well to them. Hopefully this video provided enough information that we can now rule out these two problems. ;-)
      Thanks again!

  • @iamjirho
    @iamjirho Месяц назад +1

    hey sir! Thanks for a thorough explanation of the payload especially the logic behind it. Keep em coming!

    • @pentest_TV
      @pentest_TV  Месяц назад

      Glad you found it helpful - thanks for watching!

  • @youssouftiecourasanogo5716
    @youssouftiecourasanogo5716 8 месяцев назад +2

    Your are absolutely a great teacher. Following you to progress in my OSCP journey . Thanks

    • @pentest_TV
      @pentest_TV  8 месяцев назад

      Thanks for the kind words and I'm glad you see some value in my videos! OSCP is a tough journey, and I applaud your efforts - good luck and LMK if there's anything I can do to help!

  • @handelokafor602
    @handelokafor602 8 месяцев назад +2

    killer intro

    • @pentest_TV
      @pentest_TV  8 месяцев назад

      Appreciate it, and thanks for watching!

  • @rajeevpuri8319
    @rajeevpuri8319 8 месяцев назад +1

    thanks for such a good in depth video. you have made it very easy for a noob like me in understanding and learning ethical hacking. thank you.

    • @pentest_TV
      @pentest_TV  8 месяцев назад

      Thank you so much for the kind words! Glad my videos have helped and good luck with your journey into professional penetration testing!

  • @relaxingasmrnoise
    @relaxingasmrnoise 8 месяцев назад +1

    Great vid 💯 I like the way you educate

    • @pentest_TV
      @pentest_TV  8 месяцев назад

      Thank you so much! Glad my teaching style resonates with my viewers like you, and thanks for your support!

  • @timothy6966
    @timothy6966 5 месяцев назад +2

    Thank you for your clear explanation! Btw, that necklace is awesome. What is it?

    • @pentest_TV
      @pentest_TV  5 месяцев назад

      Thanks for watching! That badge is from DefCon 20 and is a Contest & Events badge.

  • @iam-drake
    @iam-drake 7 месяцев назад +2

    can you make a video on shellcode wrapping using python. probably one with private key for encryption and dycryption..am dying to learn this.. and persistence as well.

    • @pentest_TV
      @pentest_TV  7 месяцев назад +2

      Thanks for the suggestion! I’ll add it to the list. 👍

  • @tommyyoung321
    @tommyyoung321 8 месяцев назад +1

    hey there thank you for every moment.....I have a question about the netdiscover in kali Linux , it works but it does not show the Mac Vendor and Host. it only shows up the VMware as Mac Vendor and no Host

    • @pentest_TV
      @pentest_TV  8 месяцев назад

      Netdiscover only concerns itself with ARP and MAC, so its accuracy should always be called into question since it is trivial to change MAC addresses on many devices.
      If I understand your question correctly, VMware will use its own network devices when connecting to a virtual image (the number and type are up to you, but they are all still "manufactured" by VMware), which is why it shows the vendor as VMware. As for the Hostname field, again, because it's only dealing with ARP and MAC, there isn't a good way to really know what the host is, so it's usually left blank. In fact, I'm trying to remember if I've ever seen a value in the hostname field. Thanks for the question!

  • @smouhamadoulfadal1710
    @smouhamadoulfadal1710 2 месяца назад +2

    Hello sir we need a video phishing-email and take control of any device thank's

    • @pentest_TV
      @pentest_TV  2 месяца назад

      Thanks for the suggestion