There's nothing wrong with showing someone how to hack it's 100% legal if you set everything up like this, which you are hacking your own server, which is legal
@@justinlinotte2981 It's a meme from 4chan that any attractive woman (or anyone in general) advertising something like this is a 'glowie', or fed. Look into Lujan and military recruitment as an example.
I really love this walkthrough. You have earned another sub, mate. I have some suggestions for you. It would be nice if you added a little bit of theory so that we would understand what we were doing. I want more box hacking videos like this. Keep it up🎉
So if she’s a fed, so what? Are they going to arrest you for downloading metasploitable and kali for educational purposes or *shock horror* hire you? This was cool cause it showed a basic exploit to get started.
Hmm, I respect the video, and the fact that, as the script kiddies below say, you're probably a fed. However, I have a couple of pointers for you if you want to bring this psyop to the next level. 1. Dual boot Linux and use KVM/Qemu for virtualization. Bonus points if you use Gentoo (or Arch, btw.) 2. Run Kali and a vulnerable machine, like Mr Robot in VMM, and show how to hack that instead 3. Pipe every command you put into the terminal into lolcat 4. ???? 5. Profit Godspeed, you and whichever 3-letter organization you work for.
@@Blox117 I think he meant to use Kali Linux with another linux distribution. That is what dual boot is. Instead of linux with windows, it is instead linux with linux.
Never thought I could use ftp to run ssh :D The mo' you know! PS: don't mind the silly comments. The world needs cybersecurity people more than ever. And everyone must start somewhere. Your video is a nice and easy entry point for people who'd like to learn about it. In fact everyone dealing with computers should know at least a little bit of cybersecurity.
cool vid, something I found kinda annoying is the background noise idk what you used to edit the video/audio but usually you can record background noise and then filter it from the rest of the audio
It would have been cool to see you do some enum and privesc from a user not in the sudoers file. I see from the blog that the postgres user has default creds. What would be your process for privesc on an account that doesn't have sudo perms?
Aw man this is great, we need more cyber tutorials which don't require 10+ hours of theory before starting NMAP. Subbed EDIT: Been in cybersec/Linux for almost 5 years now, only ever referred to it as "et see" lol
@Dean-gi8ie endless amounts of evidence. One example is how every other release, macchanger is broken and they pretend everytime that they don't know how it happened. That's one example of about 50,000. The biggest issue, that obviously ISNT pure evidence, is that they have outed themselves in the last few years as diehard p.c. culture communists and openly hostile to anyone who isn't, which is 90% of OG hackers. As soon as governments went honest about being NWO maniacs and child predators, so did the kali team.
I've been having some trouble with VMs on my computer, Windows 10. Is that only me? They tend to freeze now and then, I'm unable to use them for more than 30 minutes. I'll get another PC and put Linux on it, prefer that way
In many cases, the exploits only manipulate the data packet that goes out or include critical C++ characters such as (' or " or % or | ) etc. in order to end the string and then have the PC execute any commands that close the PC Unexpected or even desired behavior Most of the programs in the world that we know or work with are written with C or C++ and you can do a lot with characters like that. But how much is still up in the air, every update and every change in a code could create new vulns. The other thing is that nothing is safe from reverse engineering, so anyone can find a vulns and exploit it. There are some that can NEVER be fixed, otherwise they will no longer run the service could, as intended. But to do this you have to know the language absolutely perfectly and you also have to be familiar with all the mistakes and even be able to make them intentionally in order to know what effect it has. This mainly affects services that have not been maintained for a long time. The people who find these security holes invest a lot of time and probably do countless tests until special results occur. Most of the time, people sit for weeks or months and try it over and over again, testing out new patterns and scenarios until something new happens.
Since you are on windows I suggest Hyper-V over VirtualBox since it's the preinstalled type 1 hypervisor on windows pro edition and above and has way better performance than virtualbox. Although if you install Linux guests on Hyper-V you probably can't get sound and clipboard working because Hyper-V uses RDP to get sound and guest integration in Enhanced Session modes and that's not available by default on Linux distros unless you tinker with it using xRDP. Other than that the cpu performance is way better in Hyper-V. And you can use virtualbox alongside Hyper-V but the virtualbox performance degrades since Hyper-V is enabled.
feds really upped their budget this year huh
Literal incel
@@viralostrich4245 if my choice were you or nobody I'd be voluntarily celibate
glowies got even more psyops running, shady shit man
@@viralostrich4245you guys just love using that word lol
@@viralostrich4245 nice try fed
Hacking: 100%
ASMR: 200%
SILENCE: 1000%
EDITING: 4%
very accurate
FED: 10000000000%
Was gonna say. Genuinely been looking for technically sound ASMR
@@RoofusRoof19 no lies detected
was gonna say asmr, low freq reading without high pitch sound are relaxing and provoke sleepiness
Girl + Linux user + Kali Linux + hacker ?
I ain't falling into honey trap , nice try fed
That sounds like a mythical creature, obviously feds.
honeypot
yeh Nice Try Feds... Gottem..... .....
"continues to click the Subscribe button". 🤣🤣
Corny af
of course ... this is a scam.
no matter WHO the CIA sends, i am NOT gonna fall for your honeypot!
Says a kali user
@@DuvibdDuvusbudhd you can question his methods, but not his results.
Simp
Sourceforge looking sketchy has always been a staple lmao
I cam here to say this! You couldn't have put it any better. Fr though, there is no denying SF's GOAT status. Lol
you look like the fed lady from mr. robot
Ongggg 😂
Cause she is
Del Pierro right there thinks she fooling us lmao
smh
@@khemirialaeddine4651 certified gooner over here
Grace Gummer?
ain't no way the comments 😭
Ain't no way the grammar
@@borstenpinsel yeah, the grammar 🤓👮
They are right. It's a f-ing honeypot for thirsty dudes.
0:30 "you may be asking, how did you get here?"
....well it was by letting the days go by, let the water hold me down...
Same as it ever was 🙄
Amen Brother.
water flowing underground
And she was drifting through the backyard. And she was taking off her dress. And she was moving very slowly. Rising up above the Earth.
Water dissolving, and water removing. There is water, at the bottom of the ocean.
nice try fed.
Finally...the average honest comment😂
There's nothing wrong with showing someone how to hack it's 100% legal if you set everything up like this, which you are hacking your own server, which is legal
@@HellHound___0 The 'fed' comment has nothing to do with the hacking...
can you explain why you said that? do you know something that i don't?
@@justinlinotte2981 It's a meme from 4chan that any attractive woman (or anyone in general) advertising something like this is a 'glowie', or fed. Look into Lujan and military recruitment as an example.
I won't lie, I'm only here for Linux. XD
🤥
kali purple + looking at keyboard while typing + script kiddienes + a red head beauty
nice try fed
yemezler babba
Imagine using kali lol
@@DuvibdDuvusbudhd What should I use then?
BlackArch?
@@DuvibdDuvusbudhdwat u use, parrot?
dezgah lan bu
@@DuvibdDuvusbudhdwat the hell you use Ubuntu or some shit? Because trust me Kali is used by a lot of people you just don’t know💀
now i know how "cybersecurity ASMR" can sound :0
I really love this walkthrough. You have earned another sub, mate. I have some suggestions for you. It would be nice if you added a little bit of theory so that we would understand what we were doing. I want more box hacking videos like this. Keep it up🎉
maddy i really love how your recording room looks like a horror room or specifically like the starting room from fnaf 4
Nice Try FBI, not this time...
The youtube algorithm is being funny
Maybe its just giving you a sign
@@HellHound___0 "The FBI is requesting your location"
@adamk.7177 They don't need to request nothing they already know my location... even yours
I know this is a honeypot but I cannot resist it.
Over.
fed post! FED POST!
So if she’s a fed, so what? Are they going to arrest you for downloading metasploitable and kali for educational purposes or *shock horror* hire you?
This was cool cause it showed a basic exploit to get started.
In some places lie in Europe they actually might….
@@RicardoSanchez-es5wl oh really? and where would that place in europe be?
@@CrouTonGAfghanistan
Yes they are. It’s all a setup, don’t you get it?
@@CrouTonG Germany has a law making it illegal to posses software than can "circumvent security measures". Not sure if Kali falls under it.
Hmm, I respect the video, and the fact that, as the script kiddies below say, you're probably a fed. However, I have a couple of pointers for you if you want to bring this psyop to the next level.
1. Dual boot Linux and use KVM/Qemu for virtualization. Bonus points if you use Gentoo (or Arch, btw.)
2. Run Kali and a vulnerable machine, like Mr Robot in VMM, and show how to hack that instead
3. Pipe every command you put into the terminal into lolcat
4. ????
5. Profit
Godspeed, you and whichever 3-letter organization you work for.
Bruv, context buddy
i dunno, i notice a lot of whi girls into coding/computing
also, what is "dual boot linux"? makes no sense
Definitely use kali to underline the fedness
@@Blox117 I think he meant to use Kali Linux with another linux distribution. That is what dual boot is. Instead of linux with windows, it is instead linux with linux.
Couldn't focus on what cyberbaddie was trying to show
Interesting stuff. The zoomed video at 2:30 would really be great any time you're typing commands. It makes the terminal way easier to see.
yeah, 3:54 too
I think you guys need better glasses.
This was really cool! I didn't know much about how to do this before the video. Thank you!
Lego Batman gif
The begginings of Grimsdottir
You made the whole process easy-peasy and so clear which kind of a mind blown. 🤣
Dude your website is filled with a lot of good tips and knowledge. Thanks for posting those entries.
Glad you like them!
AI generated ass comment
entered her website oh no
Never thought I could use ftp to run ssh :D The mo' you know!
PS: don't mind the silly comments. The world needs cybersecurity people more than ever. And everyone must start somewhere. Your video is a nice and easy entry point for people who'd like to learn about it. In fact everyone dealing with computers should know at least a little bit of cybersecurity.
know the twitter account "Posts By Feds"?
this belongs to "Videos By Feds"
I will not fall to this honeypot sir.
Good try FED.
you have soothing vibes
fed alarm
@@user-darkodbdFalse alarm soldier! Looks like this one's just an incel.
What the fuck did I say??
Officer i dont know what hacking youre referring to here
dunno what to comment to promote vid in the algs, but this is peak content. keep it up
That puffy comfy Kirby's seems pretty dangerous 😎
cool vid, something I found kinda annoying is the background noise
idk what you used to edit the video/audio but usually you can record background noise and then filter it from the rest of the audio
It would have been cool to see you do some enum and privesc from a user not in the sudoers file. I see from the blog that the postgres user has default creds. What would be your process for privesc on an account that doesn't have sudo perms?
Just keep switching users and up the privs as you climb. I have an example of it in my Wicked6 MetaCTF write up on my website!
@@Cyb3rMaddy Awesome.
Great vid! And thanks for the reply!
@@Cyb3rMaddy Agreed! It so much better being a guy on youtube
you don't get harassed because nobody is even watching
Fun Fact: My name is Cali, and/so every time someone uses Kali Linux and talks about it I get slightly disturbed bc it feels rlly strange
Sorry to hear this.
At least youre not named Arch :/
@@sobbski2672 Oh yeah, *That'd* be bad.
thats a real problem lol
@@sobbski2672that would be funny af but disturbing for op. "I *use* arch btw"
How do we know the password of target machine, which is not under our control as this demo?
geat job, thank you for sharing your work with us :)
This preview of the new season of Mr. Robot with Dom hacking the dark army is looking terrific ngl
Lol
thank you so much! I love your content
this was asmr for my ears
Plz more 🎉🎉🎉 thank u your help and sharing the resource
Aw man this is great, we need more cyber tutorials which don't require 10+ hours of theory before starting NMAP. Subbed
EDIT: Been in cybersec/Linux for almost 5 years now, only ever referred to it as "et see" lol
Glad you enjoyed it! And yes haha. It's like SIM vs. SEEM debate
So you want script kiddies to pollute the cyberspace. what an idiotic suggestion
We def DO need 10+ hours of theory before this cuz think about all the kids learning
That 10 hour of theory is what makes you an expert.
thats a fbi honypot
Most exciting Hacking Video i ever Seen on RUclips!!!
Please keep making videos!
now that's awesome
Amazing content, ty!
Your website looks like it's from the early 2000s and I love it. 😂
bruh your skillz are fire you're breaking through firewalls and shit and your hair is fire too
ngl this is more an asmr video than a linux video
she has a soothing cadence
Feds are putting some effort trying to catch me, NICE TRY FED
That firewall needs to go through the FIREMAN process because it is not configured correctly
IT GLOWS
What if I already got Linux? Do I gotta stimulate a windows machine then a Linux one inside the windows one?))
All right Feds, I fall for this one
You're glowing today!
lmfao
@@through-faith-aloneliterally glowing in the dark
kirby is like " :B "
When did kali purple come out? Ive been long gone from Debian, but still dope!
Kali is a honeypot
@@DuvibdDuvusbudhd really?! Since when it was Og back box I thought then just revamped any evidence or something proving this claim?
@Dean-gi8ie endless amounts of evidence. One example is how every other release, macchanger is broken and they pretend everytime that they don't know how it happened. That's one example of about 50,000. The biggest issue, that obviously ISNT pure evidence, is that they have outed themselves in the last few years as diehard p.c. culture communists and openly hostile to anyone who isn't, which is 90% of OG hackers.
As soon as governments went honest about being NWO maniacs and child predators, so did the kali team.
@Dean-gi8ie I answered you but youtube censorship has become insane and it disappeared on my end. Ifk if you'll see it.
@@DuvibdDuvusbudhd ? Interesting I understand you can set up a Honeypot on Kali not that it is
I just watched for the beauty.
they hack with kali linux but nsa controlls systemD
it's like stealing but your father is a policeman
Put it in there approved!
Great narrator ++
Tiniest font ever --
Fun subject ++
Good length ++
= Subbed!
You should do a tutorial on how to get those VMs set up!
I've been having some trouble with VMs on my computer, Windows 10. Is that only me? They tend to freeze now and then, I'm unable to use them for more than 30 minutes. I'll get another PC and put Linux on it, prefer that way
Im Enjoy watching you have fun with 22 port so fun hahah😂
Can you explain a little bit more on how the exploit works?
In many cases, the exploits only manipulate the data packet that goes out or include critical C++ characters such as (' or " or % or | ) etc. in order to end the string and then have the PC execute any commands that close the PC Unexpected or even desired behavior Most of the programs in the world that we know or work with are written with C or C++ and you can do a lot with characters like that. But how much is still up in the air, every update and every change in a code could create new vulns. The other thing is that nothing is safe from reverse engineering, so anyone can find a vulns and exploit it. There are some that can NEVER be fixed, otherwise they will no longer run the service could, as intended. But to do this you have to know the language absolutely perfectly and you also have to be familiar with all the mistakes and even be able to make them intentionally in order to know what effect it has. This mainly affects services that have not been maintained for a long time. The people who find these security holes invest a lot of time and probably do countless tests until special results occur. Most of the time, people sit for weeks or months and try it over and over again, testing out new patterns and scenarios until something new happens.
Good stuff, what if ssh root isn’t allowed? After connecting to port 22 which encryption did you break with that cmd?
simplicity of your video rocks
Of course it's the purple version!
i'm not falling for it lady i've watched mr robot
She literally glows in the dark.
Which Oh My ZSH theme are you using?
That's one of the defaults in Kali
hahaha ... default one bro....
Turning on my vpn to watch this video. Currently entering the mainframe...
it glows
keep going !!
Hacking ASMR
That was dope, cheers
thank you pink lady
red heads are getting better and better by day
i am in Love!
Time is running out.
Hope you'll be like John Hammond in the future. You alrdy got the hair colour xD
from where that ssh password came from? Were we supposed to hack it?
Yeah uh you don't have to do this circlejerk to get root if you can already do sudo. Just do sudo su
3:10 I see you only copy this until the @, but what you paste appears to include an IP address. Did you do some video editing here?
Since you are on windows I suggest Hyper-V over VirtualBox since it's the preinstalled type 1 hypervisor on windows pro edition and above and has way better performance than virtualbox. Although if you install Linux guests on Hyper-V you probably can't get sound and clipboard working because Hyper-V uses RDP to get sound and guest integration in Enhanced Session modes and that's not available by default on Linux distros unless you tinker with it using xRDP. Other than that the cpu performance is way better in Hyper-V. And you can use virtualbox alongside Hyper-V but the virtualbox performance degrades since Hyper-V is enabled.
Tell us more
ayo it's Dominique
You going for pentest+ or any other hacking certs?
Lego batman GIF ahh video
GYATTTTT
That women can be ai generated at this point
So refreshing seeing a girl in this community! Keep on the good work!
keep it up :)
this is great
top 10 fed videos of all time
I came here to learn not fall in love.
Came for the cutie stayed for the skills
@FBI are you involved in this? hmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmmm