Let's Hack
Let's Hack
  • 28
  • 410 833
SHODAN for BUG BOUNTY ! | (Best RECON Tool) | Let's Hack
Shodan is a search engine that lets the user find specific types of computers (webcams, routers, servers, etc.) connected to the internet using a variety of filters. Some have also described it as a search engine of service banners, which are meta-data the server sends back to the client. This can be information about the server software, what options the service supports, a welcome message or anything else that the client can find out before interacting with the server.
Today I will take you through a full tour of what all Shodan can accomplish.
Shodan Queries - github.com/jakejarvis/awesome-shodan-queries
SHODAN VID - ua-cam.com/video/o8cyvoSCZzM/v-deo.html
Time Stamps:
0:00 - Intro
0:38 - Practical
8:31 - Outro
#cybersecurity #shodan #2024
Переглядів: 1 316

Відео

Networking SNIFFING | MITIM Explained (Let's Hack) [2024]
Переглядів 883Місяць тому
This video explains network sniffing and MITM attacks in detail and which can help you protect yourselves and perform a small attack yourself. Content type however is optional and webmasters sometimes don’t set it, which leaves the browsers wondering about the content type it is consuming. So browsers had to implement parsing and “sniffing” techniques to detect the type of content when a conten...
Find OPEN SOURCE INFORMATION on ANYONE | (OSINT Tutorial) [2024]
Переглядів 7 тис.2 місяці тому
Find information about anyone online. This video explains how you can use OSINT and have open-source information come to you just like that. Tool Links: Exploit DB: www.exploit-db.com/ SPOKEO spokeo.com/ GOOGLE LENS: lens.google/ TINEYE: tineye.com/ EXIF: exifdata.com/ Chapters: 0:00 - Intro 1:17 - Theory 2:38 - Tools/Practical 9:44 - Outro #osint #2024 #information #letshack
HASHING Explained ! | Tutorial (Let's Hack) [2024]
Переглядів 7532 місяці тому
What is hashing? In this video, I explain how hash functions work in an easy-to-digest way. Hashing is the process of converting an input of any length into a fixed-size string of text, using a mathematical function. Stay Tuned till the end to get a very deep understanding on what this concept is and how it works. Hashcat Link - github.com/hashcat/hashcat Check Out the Latest Content - ua-cam.c...
I hid a VIRUS inside an IMAGE! [Tutorial] (Let's Hack)
Переглядів 1,3 тис.2 місяці тому
Steganography is a technique that is centuries old and is now adopted by new technologies, especially by HACKERS!! Hackers have been known to hide malicious files inside files like photos or audio files and later extract these files on a victim’s computer to wreak havoc. But, steganography is also used for good! People will often use steganography to hide secret messages safely without the auth...
SHODAN Explained! (It's Scary Easy to do) | Let's Hack
Переглядів 308 тис.3 місяці тому
Shodan is a search engine that lets the user find specific types of computers (webcams, routers, servers, etc.) connected to the internet using a variety of filters. Some have also described it as a search engine of service banners, which are meta-data the server sends back to the client. This can be information about the server software, what options the service supports, a welcome message or ...
Complete MACHINE LEARNING ROADMAP | GET CERTIFIED (Let's Hack)
Переглядів 5894 місяці тому
What is Machine Learning Fully Explained This Machine Learning basics video will help you understand what Machine Learning is, what are the types of Machine Learning - supervised, unsupervised & reinforcement learning, how Machine Learning works with simple examples, and will also explain how Machine Learning is being used in various industries. I will be taking you though a very educational jo...
PHISHING ATTACKS EXPLAINED (PROTECT YOURSELF) | Let's Hack
Переглядів 1,3 тис.4 місяці тому
What are Phishing Attacks, and how to prevent yourself from these. This video on Phishing explains what is a phishing attack, we cover the infamous cyber-attack vector which has been affecting users since the early days of the internet. We learn the workings and intricacies of a phishing attack, and the numerous remedial measures. We will dive deep into Phishing and how can a Hacker Perform thi...
FLIPPER ZERO : The SECRET Tool Hackers Don't Want You To Know About
Переглядів 1,7 тис.5 місяців тому
Flipper Zero is it useful? Or Just a waste of time and money Today we discover everything about the flipper, how it works, what are the main features and a lot more. This week, we dive deep into the Flipper Zero, a multi-purpose hacking gadget that's taken the security world by storm. We'll explore its features, from cloning RFID badges to bypassing access control systems. Subscribe :) Let's Ha...
How to use JOHN THE RIPPER | Password Cracking (Let's Hack) {2023}
Переглядів 1,5 тис.9 місяців тому
Join our cybersecurity UA-cam channel as we explore the extraordinary world of John the Ripper, the renowned hacking tool for password cracking. In this captivating video, we delve into the capabilities and functionalities of John the Ripper, empowering you to enhance your cybersecurity skills. Learn how to crack passwords efficiently, analyze encryption algorithms, and secure your digital asse...
OPEN REDIRECT (EXPLAINED) | Step-by-step (Let's Hack) {2023}
Переглядів 81110 місяців тому
Join our cybersecurity UA-cam channel as we uncover the hidden dangers of open redirect vulnerabilities in this informative video. Learn how malicious actors exploit this widespread flaw to redirect unsuspecting users to malicious websites, phishing pages, or malware-infested domains. Discover the impact of open redirect vulnerabilities on the integrity and reputation of your website, and gain ...
DDOS ATTACKS Explained (Live Examples!) | Let's Hack (2024)
Переглядів 64111 місяців тому
Denial Of Service Attacks Fully Explained! 2024 Denial of Service attacks are one of the many tactics malicious actors may use. Explore what a denial of service attack is and learn how a single hacker can take down an entire system. Today we will be covering everything there's to know about Ddos Attacks Time Codes: 0:00 - Intro 0:35 - Theory 2:25 - Practical 8:57 - Outro #LOIC #denialofservice ...
Metasploit Tutorial ! (Fully Explained) | Let's Hack (2024) | {Within 10 mins} 🔒
Переглядів 1,9 тис.11 місяців тому
How to use Metasploit. Explained in under 10 mins This is a very useful tool when it comes to cybersecurity and it will help you add another skill to your resume and build your security skills even further. In this video, I will be starting the Complete Metasploit Course, which will take you from a beginner to an expert with Metasploit. The Metasploit Project is a computer security project that...
Unlocking the Secrets: Mastering Hash Cracking with Hashcat | Let's Hack (2023)
Переглядів 1,5 тис.Рік тому
Unlocking the Secrets: Mastering Hash Cracking with Hashcat | Let's Hack (2023)
What is AIRCRACK-NG ? | FULL TUTORIAL | [2024] (Let's Hack)
Переглядів 822Рік тому
What is AIRCRACK-NG ? | FULL TUTORIAL | [2024] (Let's Hack)
CROSS SITE SCRIPTING EXPLAINED! (2023) | Let's Hack | [Fully Explained]
Переглядів 1,9 тис.Рік тому
CROSS SITE SCRIPTING EXPLAINED! (2023) | Let's Hack | [Fully Explained]
INFORMATION DISCLOSURE | Let's Hack (Full Tutorial) | 2023
Переглядів 2,4 тис.Рік тому
INFORMATION DISCLOSURE | Let's Hack (Full Tutorial) | 2023
Getting Started with NETWORKING || Let's Hack (Explained) || 2023
Переглядів 316Рік тому
Getting Started with NETWORKING || Let's Hack (Explained) || 2023
Nmap 101: It could save your life.....(Full Tutorial) [2023]
Переглядів 1,1 тис.Рік тому
Nmap 101: It could save your life.....(Full Tutorial) [2023]
How to become COMPLETELY ANONYMOUS on the INTERNET [Full Tutorial] (2023)
Переглядів 4,9 тис.Рік тому
How to become COMPLETELY ANONYMOUS on the INTERNET [Full Tutorial] (2023)
How to use SHERLOCK! (FULL TUTORIAL) [2024] {Within minutes 5 MINS} 🕵🏻‍♂️
Переглядів 57 тис.Рік тому
How to use SHERLOCK! (FULL TUTORIAL) [2024] {Within minutes 5 MINS} 🕵🏻‍♂️
ADVANCED GOOGLE SEARCH TUTORIAL [All You Need to Know] (2024)
Переглядів 2,7 тис.2 роки тому
ADVANCED GOOGLE SEARCH TUTORIAL [All You Need to Know] (2024)
The Most SECURE OS on LiNuX [Tutorial 2021] (All you need to know)
Переглядів 8953 роки тому
The Most SECURE OS on LiNuX [Tutorial 2021] (All you need to know)
How to Install the LAZY SCRIPT on Kali Linux | (Official Tutorial)
Переглядів 9 тис.3 роки тому
How to Install the LAZY SCRIPT on Kali Linux | (Official Tutorial)

КОМЕНТАРІ

  • @ΓΙΑΝΝΗΣΠΟΥΛΟΣ
    @ΓΙΑΝΝΗΣΠΟΥΛΟΣ День тому

    how can i install the requirements.txt manually?

  • @MuiTerry777
    @MuiTerry777 День тому

    Over at my cloud shell it says permission denied why???

  • @hometech3838
    @hometech3838 2 дні тому

    After entering python3 -m pip install requirements.txt It's showing an error Error could not open requirement file (error 2 ) no such file or directory

  • @maluziusnetwork355
    @maluziusnetwork355 3 дні тому

    No.

  • @user-iw5yf2nn9w
    @user-iw5yf2nn9w 3 дні тому

    Has there ever been an Indian who didn’t make a living by scamming others?

  • @mistahdata
    @mistahdata 6 днів тому

    "All of these webcams are open" *proceeds to click on honeypot links .... 🤦

  • @AnonymOus-dp3jj
    @AnonymOus-dp3jj 7 днів тому

    yeah and most email, and virus detection destroys your image.exe

  • @user-ce3cd8mt7s
    @user-ce3cd8mt7s 7 днів тому

    Ahh, so that's why my webcam light kept coming on.

  • @blackb3rry02
    @blackb3rry02 7 днів тому

    For some reason mine keeps showing that the session is set to something, could that be why it isn't working? cause yours shows just your email and such but no session after sherlock

  • @adejareoladiran
    @adejareoladiran 9 днів тому

    Shodan

  • @HarshTomar-t4s
    @HarshTomar-t4s 9 днів тому

    Brother it shows an error when i try to install the requirements

  • @nerdvision3587
    @nerdvision3587 10 днів тому

    FYI, though hacking into others' computers or networks may be perfectly legal in India, it is a criminal offense in the U.S., akin to trespassing, theft, joyriding, or worse, and there are plenty of prosecutors that'll be all too happy to score points by sending you to prison for a very long time.

    • @letshack025
      @letshack025 10 днів тому

      It’s not legal in India as well but this is not hacking computers as we speak this is OSINT Or open source information gathering which is legal everywhere Or this tool won’t be that readily available..

    • @TokeRec
      @TokeRec 5 днів тому

      This is not even hacking 🤣🤣🤣🤣 its open sourced intelligence. Anyone have access to this.

  • @LJSmusicandcinema2
    @LJSmusicandcinema2 10 днів тому

    how do you install the required libraries if needed

    • @letshack025
      @letshack025 10 днів тому

      Using “pip3 install _______” name of library OR on Linux or mac “sudo apt-get install ______”

  • @Zalen88
    @Zalen88 11 днів тому

    Think its just time to give up the online life and go off grid.

  • @manwtf6388
    @manwtf6388 11 днів тому

    Great traching style

  • @althoafahamed6409
    @althoafahamed6409 12 днів тому

    can you tell us how to use sherlock again

    • @letshack025
      @letshack025 11 днів тому

      Will do.... A new video for Sherlock

  • @jamessoos5753
    @jamessoos5753 13 днів тому

    Your English is not clear enough for people to completely understand

    • @letshack025
      @letshack025 13 днів тому

      Will definitely improve the quality in the next one Thanks for the input

    • @silverzero585
      @silverzero585 12 днів тому

      You don't listen properly. Get your ears checked, moron. Fyi: majority of the world are not English speakers.

  • @letsroll404
    @letsroll404 15 днів тому

    $70 a month... Damn!

  • @KKM_hub12
    @KKM_hub12 17 днів тому

    I can’t use the python3 sherlock -help

  • @MaxKL1995
    @MaxKL1995 17 днів тому

    ERROR: Could not open requirements file: [Errno 2] No such file or directory: 'requirements.txt' help.

  • @michaelvideosforkids5141
    @michaelvideosforkids5141 19 днів тому

    Hii can you help me trace someone ?

  • @bashmah3547
    @bashmah3547 19 днів тому

    can we look for someone

  • @engchoontan8483
    @engchoontan8483 21 день тому

    yah, webcams and CCTV-cameras are not-secure. people watch politicians lie and catch police in police-stations and watch the world. so... who will believe your versions of stories or video recordings when hokkien play his enemies.? some things cannot be described or be part of a storyline or communicated.

  • @alankun-h8t
    @alankun-h8t 22 дні тому

    ERROR: Could not open requirements file: [Errno 2] No such file or directory: 'requirements.txt' Please help me

    • @RANDOMREELS1212
      @RANDOMREELS1212 13 днів тому

      i got solutio update the terminal usiing sudo apt get update

  • @thatguy7085
    @thatguy7085 27 днів тому

    Voting machines… nice

    • @letshack025
      @letshack025 13 днів тому

      Thanks

    • @thatguy7085
      @thatguy7085 13 днів тому

      @@letshack025 by the way… the day voting went electronic..l it was simple to hack, and the people that wanted them knew it.

  • @ronburgundy2457
    @ronburgundy2457 27 днів тому

    What's the difference between this and insecam?

  • @lukasschmidt50
    @lukasschmidt50 27 днів тому

    Dann doch lieber per KI gesprochen 😵‍💫🤮

  • @Challengeurself99
    @Challengeurself99 27 днів тому

    Can I do this I'm 17 year's old?

    • @letshack025
      @letshack025 27 днів тому

      Yes, there is no age restrictions for bug bounty platforms, and this is more of a recon tool...

    • @user3549
      @user3549 24 дні тому

      i do it im only 9

    • @Free.Education786
      @Free.Education786 23 дні тому

      Cool. How do we discover the origin ip of extremely secure websites behind WAF proxies CDN IDS IPS systems? Hope to see it soon on your channel. Thanks 🎉❤

  • @imchillyb
    @imchillyb 28 днів тому

    In the USA, unauthorized access or unauthorized attempt to access a system, device, or network, is a felony offense. You should be aware of this.

  • @daedalusjones4228
    @daedalusjones4228 Місяць тому

    Good info. Thank you, brother.

  • @Ezra-ef2xu
    @Ezra-ef2xu Місяць тому

    great video but i was having trouble with getting the requirements.txt to work

  • @HollySmith-x9c
    @HollySmith-x9c Місяць тому

    Hi fella - many thanks for this video! However, I am getting the error below trying to install, any ideas please? python3 -m pip install -r requirements.txt ERROR: Could not open requirements file: [Errno 2] No such file or directory: 'requirements.txt'

    • @ameen3747
      @ameen3747 28 днів тому

      same here did you found any solution?

    • @HarshTomar-t4s
      @HarshTomar-t4s 9 днів тому

      @@ameen3747 did you find any solution?

    • @HarshTomar-t4s
      @HarshTomar-t4s 9 днів тому

      did you find any solution?

    • @user-tk4dj4il5s
      @user-tk4dj4il5s 9 днів тому

      @@HarshTomar-t4s search up "how to clone git repos"

    • @shafayeathossainyashfi
      @shafayeathossainyashfi 7 днів тому

      @@HarshTomar-t4s 'requirements.txt' is missing from the official " Sherlock " GitHub repository and that's why, you can't find it on your local server. I think you might have to install it manually.

  • @anoylinux7809
    @anoylinux7809 Місяць тому

    need more expain

  • @armanspal9166
    @armanspal9166 Місяць тому

    Good work dude. Keep it up 🎉

  • @NKEMAKOLAMSTEPHEN
    @NKEMAKOLAMSTEPHEN Місяць тому

    How long does it take once you type "run" ?

  • @indrajitsarkar6750
    @indrajitsarkar6750 Місяць тому

    Plz put link of ppt plz

  • @topzos123
    @topzos123 Місяць тому

    how do u add a file to google cloud shell

  • @Juju-tw7we
    @Juju-tw7we Місяць тому

    i used this months ago, now it doesn't work it sayws command not found- can you kindly help us :) thank u

  • @brstudio7768
    @brstudio7768 Місяць тому

    can't find '__main__' module in i have this error after installing sherlock after i type --help command.

  • @ayushnews5735
    @ayushnews5735 Місяць тому

    Wowo

  • @siamakmeshkooty5191
    @siamakmeshkooty5191 Місяць тому

    please make a video for using a shodan for bugbounty .thank you

  • @navedbhati9260
    @navedbhati9260 Місяць тому

    nice video thanks

  • @vamsi6256
    @vamsi6256 Місяць тому

    No use these sites..just for making UA-cam video these will help😅

  • @anonymousownerr
    @anonymousownerr Місяць тому

    You are underrated bro❤ But it's good for us☠️💀 Sorry jj😅

    • @letshack025
      @letshack025 Місяць тому

      Thank you so much, it really means a lot ☺️

  • @veryverynice4155
    @veryverynice4155 2 місяці тому

    cool

  • @helpchannel210
    @helpchannel210 2 місяці тому

    Im a new subscriber.. Please create a video on bot net please please............

  • @Healthliving1967
    @Healthliving1967 2 місяці тому

    I bet your one of these pos Indian scammers that rip people off.

  • @insaan..........
    @insaan.......... 2 місяці тому

    Bro hindi me video banaya kro Bro hindi me video banaya kro Bro hindi me video banaya kro Bro hindi me video banaya kro Bro hindi me video banaya kro Bro hindi me video banaya kro Bro hindi me video banaya kroBro hindi me video banaya kro Bro hindi me video banaya kro Bro hindi me video banaya kro Bro hindi me video banaya kro Bro hindi me video banaya kro Bro hindi me video banaya kro Bro hindi me video banaya kro Bro hindi me video banaya kro Bro hindi me video banaya kro

  • @insaan..........
    @insaan.......... 2 місяці тому

    Bro hindi me video banaya kro

  • @jonmalkovic1285
    @jonmalkovic1285 2 місяці тому

    Sine ti si Debil !!!