how to exploit Metasploitable 2 ssh port: 22

Поделиться
HTML-код
  • Опубликовано: 10 сен 2024
  • 📽️📽️##--
    #Metasploitable 2 ssh exploitation
    #ssh
    #hacking
    #SSH exploitation
    In this video, I will tell you how you can exploit the ssh vulnerability with Metasploitable 2 machines.
    hack metasploitable 2 shh port 22 with linux
    did you enjoy the content consider supporting on: / hackersio 😊😊😊
    ✌️✌️✌️ So if you find my content worth of watching or informative then do consider subscribing ❤️ my channel and do hit that bell icon so that you will never miss any updates in future from this channel.
    for more video like this and related to cyber security subscribe to my channel & hit the bell icon so that you will never miss any updates from this channel in the future.
    👉 Here are some more intreseting content 📽️📽️
    📽️ vlc in linux : • Installing VLC player ...
    📽️ virtual box in linux : • How to install Virtual...
    📽️ hangouts in linux : • how to install hangout...
    📽️ how to start a python server in linux : • how to start python ht...
    📽️ telegram in linux: • how to install telegra...
    📽️ aircrack-ng in linux: • Install aircrack-ng on...
    📽️ python3 in linux: • how to run python in k...
    📽️ netcat port in linux: • how to start nc -l por...
    📽️ vscode in linux : • how to install vscode ...
    📽️ vpn in linux: • how to set vpn in kali...
    📽️ hack the box : • hack the box
    📽️ github tools in linux: • how to install tools f...
    📽️ linux basic commands: • kali Linux basic commands
    🤌🤌 follow me on instagram : / hackersio
    if you have any doubts regarding Linux or this video you can ask it on my instagram handle I will try to solve it.
    don't forget to like and share the video :)
    Copyright Disclaimer under Section 107 of the copyright act 1976, allowance is made for fair use for purposes such as criticism, comment, news reporting, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use

Комментарии • 19

  • @user-op4zx2lz1k
    @user-op4zx2lz1k 13 часов назад +1

    Sorry.
    This is not a vulnerability.
    This is the MetaFramwork scanner setup.
    Add msfadmin/msfadmin to txt, which is already known to us. And then finding it with a scanner is not an exploit.

    • @hackersio
      @hackersio  5 часов назад

      Yes it is a step up just to give an idea of how real work attacks happens.and the attack comes under brute force method. Which is again a trial and error method to see if we can find a way into the target machine.
      And if there is a possible way that is considered as a weakness or vulnerability when it comes to security.

  • @mayukhsaha1407
    @mayukhsaha1407 7 месяцев назад

    much needed content. can you give full tutorial about web pen test. thank you

    • @hackersio
      @hackersio  7 месяцев назад

      sure, lots of content will be coming up stay tuned

  • @Hunter-x3b
    @Hunter-x3b 5 месяцев назад +1

    it's like only hack the user and password that you already know, please hack the host you never know before

    • @hackersio
      @hackersio  5 месяцев назад

      We will do that using hack the box walkthrough's. where we will exploit the unknown machines and hack them.

  • @BigDuzPimpin
    @BigDuzPimpin 3 месяца назад

    you can only use this if your hav a generated wordlist - ? what about if you want to use John the ripper

    • @hackersio
      @hackersio  3 месяца назад

      we will cover that in some video

  • @jannatcreations7515
    @jannatcreations7515 7 месяцев назад

    sir ur awesome i request u to upload alll parts of metasploitable.
    and i have a doubt how can i know user and password of victims system?
    plz reply sir

    • @hackersio
      @hackersio  7 месяцев назад

      thank you , and the passwords and usernames are stored in th shadow file of root user. there are different ways to get the information. study the term ENUMERATION

    • @jannatcreations7515
      @jannatcreations7515 7 месяцев назад

      okay sir ill study if i have doubt how can i ask u@@hackersio

    • @hackersio
      @hackersio  7 месяцев назад +1

      on my instagram or in comments

  • @charanmaddula8674
    @charanmaddula8674 12 дней назад

    bro can u please explain how to create a file with our data in order.

    • @hackersio
      @hackersio  12 дней назад

      Navigate to the desired location, open terminal there and type touch/nano with the file name like: file.txt, then hit enter edit your file in nano or any other editor of your choice save it and it's ready to use

    • @charanmaddula8674
      @charanmaddula8674 9 дней назад

      @@hackersio brother can u please tell in step by step how to write our data in the file.

    • @hackersio
      @hackersio  9 дней назад

      1. Navigate to desktop in terminal
      2. Write command: nano mydata.txt
      3. You will see a file opened in the nano editor.
      4. Write the data in the editor just type it normally
      5. Hit ctrl + x, then type yes to save the changes.
      And the file is ready to use.
      I hope this helps.

  • @waitforit5531
    @waitforit5531 7 месяцев назад

    🔥🔥

  • @a.raza14
    @a.raza14 7 месяцев назад

    Good 👍

  • @tuananh6033
    @tuananh6033 3 месяца назад

    all is scan password