How A Server Can Easily Be Hacked (Metasploit)

Поделиться
HTML-код
  • Опубликовано: 6 фев 2025

Комментарии • 95

  • @JAUS-hq3ti
    @JAUS-hq3ti 10 месяцев назад +6

    i have watched all tutorial but this is out standing man well done

  • @g-man21
    @g-man21 Год назад +8

    Awesome video. Really well explained. 😁

    • @infosecmastery
      @infosecmastery  Год назад +1

      thank you very much I appreciate the support.

  • @moorurr
    @moorurr 11 месяцев назад +9

    I stumbled upon your channel recently, I'm into cybersecurity for about a week now, and no channel had explanations as good as yours does, sometimes I don't understand things for the first time, but if I rewatch it a couple times, I understand everything so well. Please, continue with your tutorials, they are amazing, and I would love to learn more from you. Only complaint I have is that you don't have more tutorials yet, but I get that it takes time, good luck in life!

    • @infosecmastery
      @infosecmastery  11 месяцев назад +2

      Thank you very much, glad it helped.

    • @khandakerProttoy
      @khandakerProttoy 4 месяца назад

      ❤❤bangladesh​@@infosecmastery

  • @dhevasrishan3967
    @dhevasrishan3967 Месяц назад

    Okay, after multiple video now only i understand the power of Metasploit..Thank you!

  • @CyberFlow10
    @CyberFlow10 3 месяца назад

    Amazing video man! Keep it up.

  • @Mrcheckh4
    @Mrcheckh4 Месяц назад

    This video is great, I'll keep following your content!

  • @PROALPHA18
    @PROALPHA18 Год назад +2

    bro your content grabs all the attention! Amazing

  • @HakeemWilleman
    @HakeemWilleman 11 месяцев назад +2

    You explained very nice🎉

  • @rap1z
    @rap1z Год назад +2

    Amazing video quality + 10/10 explaining, i love it when things are explained in a way thats easy to get, i was very afraid of learning msf for so long before this lol

    • @infosecmastery
      @infosecmastery  Год назад +1

      GOATed comment haha, glad I helped you out

  • @TekcrisOTV
    @TekcrisOTV 11 месяцев назад

    This video made me awsoeme sauce
    Really well explained and simple

  • @gviswanath500
    @gviswanath500 Месяц назад

    Hi sir ,ur video is good .After metasploit / run command , showing error : timedout error or remote host closed.Is it comes like that sir or is any issue

  • @kutlusirin5856
    @kutlusirin5856 11 месяцев назад

    Hey this video is very good . However ı have a question which program you use . ı couldnt understand

  • @Bubbasaure92
    @Bubbasaure92 6 месяцев назад

    I really love your videos everything you did got me really engaged thank you!

  • @HakeemWilleman
    @HakeemWilleman 11 месяцев назад +1

    Can you do more real life examples?

  • @isaacsong-so5um
    @isaacsong-so5um Год назад +1

    you are so underrated awesome video :)

  • @andresavila7858
    @andresavila7858 Год назад

    amazing video!! good work and great material

  • @rackoccasiondiscount2233
    @rackoccasiondiscount2233 10 месяцев назад

    i encountered this error message after i run the exploit command "exploit completed but no session was created", can you help me m thanks

  • @KovidRam
    @KovidRam Год назад

    Woah great and easy explanation
    New sub 🙃

  • @rahulnandy3277
    @rahulnandy3277 9 месяцев назад

    Wonderful video sir. Thank you so much

  • @Jay-ke4us
    @Jay-ke4us Год назад

    Good stuff 👍 keep uploading like this videos

  • @DroneDistrict
    @DroneDistrict 10 месяцев назад

    So will this work when I use a ip I got when I did nmap (website) and the ip comes up?

  • @mandin3141
    @mandin3141 2 месяца назад

    if i wouldve had something like this when starting cybersec... damn it wouldve been so much easier

  • @slashingbison2503
    @slashingbison2503 Год назад

    great video , really helped!

  • @TrendingShorts0009
    @TrendingShorts0009 Год назад +20

    But my exploit getting failed sir

    • @infosecmastery
      @infosecmastery  Год назад +5

      Hey, thanks for the comment, send me a message on discord and I'll try to help you out, here is my discord usename ilyes#0053

    • @TrendingShorts0009
      @TrendingShorts0009 Год назад

      @@infosecmastery sir is ilyes0035_35299 your user name
      And error is Exploit failed:EOFError

    • @infosecmastery
      @infosecmastery  Год назад +2

      here is my username i just updated it : ilyes_infosecmastery.
      you can send me screenshots and explain in detail

    • @verolyn8459
      @verolyn8459 Год назад +1

      Choose another target. Or try look deeper.

    • @LocalAuthorityy
      @LocalAuthorityy Год назад

      @@infosecmasteryI added you @sultan. I have some questions on metasploit to ask

  • @TwitchClipzx
    @TwitchClipzx Год назад +1

    I have a problem. So if the victim is using windows and i know the ip of that windows machine I can peform scans + exploit vulnerabilities right? but most of the exploits that i use dont end up creating a meterpreter session. Why is this ? Lets say there is an RCP vulnerability on the windows machine most of the exploits for RCP dont create a session

    • @infosecmastery
      @infosecmastery  11 месяцев назад +1

      It can be anything from connectivity issues with the machine, firewall blocking you, windows defender reacting, or even that the vulnerability is patched. I can't tell you exactly what it is because i don't know your exact situation, but I would start from there if I were you.

  • @DevNsahu-w7y
    @DevNsahu-w7y 10 месяцев назад

    It's necessary to use vpn while bug hunting ?

  • @CYBER3233
    @CYBER3233 10 месяцев назад

    Infosec Mastery - Ethical Hacking for Beginers
    can you tell me how to enter the metasploitable quickly

  • @abgh8da173
    @abgh8da173 5 месяцев назад

    i have a problem here help please Exploit completed, but no session was created.

    • @infosecmastery
      @infosecmastery  3 месяца назад

      It can be a variety of reasons : target is not vulnerable, wrong configurations (lhost lport), firewall blocking your traffic, meterpreter session crashes...

  • @thansyprimezax
    @thansyprimezax Год назад

    keep going brother🥰

  • @lcd__brave5129
    @lcd__brave5129 8 месяцев назад

    Hi so I can’t find port 21 since I’m trying to exploit my brothers pc I can only find port 80 and 135 how can I get through with this please

  • @Pyraminxed
    @Pyraminxed Год назад

    i have a question for you. if its so simple doing this, why don't hackers actually take down websites like youtube, instagram, facebook, etc? now if the problem is being caught doing it, why not use stuff like TOR or proxychains?

    • @infosecmastery
      @infosecmastery  Год назад +6

      Great question. And I have many answers.
      Malicious hackers actively try to hack Facebook/Google/RUclips every minute, but those companies have a cybersecurity budget that surpasses some countries GDPs, so trying to find vulnerabilities of those websites, is almost impossible. In fact, it's so hard that they have bug bounty programs (as in : if you can find anything on our application, we'll pay you thousands of dollars). So it's not really a question of privacy, but it's that those companies are too good when it comes to securing themselves.
      Side note: That's actually my job in real life, I am a pentester, my clients pay me to find vulnerabilities in their applications, so they can patch them, so bad hackers don't take down the apps.

    • @Pyraminxed
      @Pyraminxed Год назад

      @@infosecmastery oohh. thanks for the info :))
      edit: one more question tho. is it possible to ddos them?

    • @toji_fushiguro08
      @toji_fushiguro08 Год назад

      ddos is not possible on bigger websites cause there firewall will just block u because to many request at a time @@Pyraminxed

    • @infosecmastery
      @infosecmastery  Год назад

      @@Pyraminxed technically it's possible, but extremely hard since, again, they have best servers that can handle any amount of load, so if by trying to ddos, we are trying to overload the server, the server is surely able to handle it. There are some ddos attacks that happened in the past ( Using DNS was the most powerful attack), but nothing too frightening happened since.

    • @Pyraminxed
      @Pyraminxed Год назад

      @@infosecmastery alsooooo, is having kali linux as your os illegal or somethin? will it cause problems?

  • @sujaymerawade1725
    @sujaymerawade1725 Год назад

    amazing learnt so much

  • @தமிழன்டா-ப3ங
    @தமிழன்டா-ப3ங 11 месяцев назад

    I face error when i try to update My metasploit framework
    Os - parrot

    • @infosecmastery
      @infosecmastery  11 месяцев назад

      show what your error is on discord

  • @johnjoe-u2e
    @johnjoe-u2e 11 месяцев назад

    sir please help me when i bind payload with original apk it's came error said unable to rebuild apk with apktool i also installed new version of apktool but still happening with me please help

    • @infosecmastery
      @infosecmastery  11 месяцев назад

      you can show me the issue on discord

  • @simeon871
    @simeon871 9 месяцев назад

    nice work dude

  • @AnonymousAndroid-2000
    @AnonymousAndroid-2000 Год назад +1

    Hi Mr. Hacker can you tell me how you make this website and how you upload it 😮😅

    • @infosecmastery
      @infosecmastery  11 месяцев назад

      It's vulnerable machine called "metasploitable 2", you can easily run it on any machine using docker. I will make a tutorial on how to create a hacking environment soon

  • @zenkycs735
    @zenkycs735 10 месяцев назад

    Bro you said it’s easy but it’s not I’m new in this stuff what I can is make a undetectable reverse shell not more but I learn more to obfuscate payloads and stuff like that for me it’s so hard to make stuff undetectable I’m struggling so hard but I don’t give up every day I try to learn new stuff….. can you make a good video where you explain what are the fundamentals to make a payload fud that’s would be nice because I want to learn Cyber Security real to get a job in the future but with a detected Payload I can do nothing and demonstrate how real hackers hack system and comprise systems or networks ✌🏼

    • @zenkycs735
      @zenkycs735 10 месяцев назад

      Also I learn c++ and python

  • @warmachine3197
    @warmachine3197 8 месяцев назад

    Can I use domain instead of ip ?

    • @ppgdude
      @ppgdude 7 месяцев назад

      Yeah

  • @leonmarienga3293
    @leonmarienga3293 4 месяца назад

    Thank you

  • @echoframechannel
    @echoframechannel 11 месяцев назад

    Can you teach me how login to global server ?

    • @infosecmastery
      @infosecmastery  11 месяцев назад

      please clarify to me what is a global server

  • @janekmachnicki2593
    @janekmachnicki2593 Год назад

    Great tutorial thanks

  • @NASIROVZR
    @NASIROVZR 11 месяцев назад

    Do you have courses? 😅

    • @infosecmastery
      @infosecmastery  11 месяцев назад

      Not yet, but I will surely make a few in the near future.

  • @TheRealAnthony_real
    @TheRealAnthony_real 6 месяцев назад

    I used to do this back in 2000 and I thought i was chilidish and never though that metasploit it will ever be a thing 😂

    • @infosecmastery
      @infosecmastery  4 месяца назад +1

      believe it or not, actual pentesters/auditors use it xD

  • @LocalAuthorityy
    @LocalAuthorityy Год назад

    Nice tutorial

    • @infosecmastery
      @infosecmastery  Год назад +1

      Thank you very much I appreciate the support ♥

  • @tokakegd1198
    @tokakegd1198 3 месяца назад

    step 5 : CHOAS

  • @Andrzejkl94
    @Andrzejkl94 11 месяцев назад

    IS that AI Voice?
    sounds really good

    • @infosecmastery
      @infosecmastery  11 месяцев назад +1

      Yep, worth the 22$/month on eleven labs lol

    • @Jafrisahab101
      @Jafrisahab101 11 месяцев назад

      Sounds great 😂

  • @hassan25308
    @hassan25308 2 месяца назад

    I WILL DESTORY MY OFFICE SERVERS

  • @AimaanKhan-tj3uu
    @AimaanKhan-tj3uu 8 месяцев назад

    *W H O O P S*