b100dy_c0d3r
b100dy_c0d3r
  • 31
  • 78 778
How to Link Kali Linux with Metasploitable 2 in VirtualBox
Hey there! In this video, we're diving into how to connect Kali Linux with Metasploitable 2 using VirtualBox. It's the perfect setup for anyone wanting to practice penetration testing in a secure environment.
Here's What I'll Cover
Network Configuration:
1. Setting up network adapters.
2. Making sure both VMs can communicate on the same network.
Connecting the VMs:
1. Checking network connectivity.
2. Configure NAT Network to ensure everything's linked correctly.
Handy Links:
Download VirtualBox: www.virtualbox.org/wiki/Downloads
Download Kali Linux: www.kali.org/
Download Metasploitable 2: sourceforge.net/projects/metasploitable/files/Metasploitable2/
Chapter:
0:00 Intro
0:20 Setup Metasploitable 2
0:35 Check IP Address
0:49 Configure the Network
2:00 Final Check
2:13 Ready to Rock!
Follow Me:
X: x.com/b100dy_c0d3r/
Instagram: b100dy_c0d3r
Don't Miss Out!
Like, comment, and hit that subscriber button for more tutorials on cybersecurity and ethical hacking!
Happy Hacking! 😺💻🔍
Переглядів: 460

Відео

5 Ways To Secure Your Network
Переглядів 137Рік тому
Knowing how to secure home Wi-Fi networks is critical to protecting your devices from hackers and cybercriminals. If someone gains access to your local network, they can easily access your personal data by "listening" to your internet traffic. Once this occurs, the cybercriminal can launch various attacks against your Wi-Fi security, including "man in the middle" attacks, ransomware, or outrigh...
A Guide to Steganography
Переглядів 219Рік тому
From invisible ink to highly complex algorithms, steganography is all around us. Steganography is a fascinating and often misunderstood technique of concealing information, and it has experienced a revival in the digital world. This video discusses everything you need to know about steganography.
Discovering SQL injections in GET - 05 SQL Injection Documentary
Переглядів 692Рік тому
I'm back!!! Actually, this video was created more than 2 months ago, I was skeptical about uploading this when I found my channel received strikes for some reason. But anyways, enjoy! #Hack #Hacker #Hacking
The Compromise
Переглядів 6402 роки тому
😔😔😔
Discovering SQL injections In POST - 03 SQL Injection Documentary
Переглядів 8982 роки тому
The login structure we will use in our examples is straightforward. It contains two input fields (username and password), which are both vulnerable. The back-end content creates a query to approve the username and secret key given by the client. To sidestep login and access restricted areas, the attacker needs to build an SQL section that will change the “WHERE” clause and make it true. For ins...
Dangers of SQL Injection - 02 SQL Injection Documentary
Переглядів 7022 роки тому
SQL injection vulnerability is the most dangerous one as it compromises data integrity and authenticity and this has been listed among the top 10 in the OWASP list with exploits being updated regularly. SQL injection attacks allow attackers to spoof identity, tamper with existing data, cause repudiation issues such as voiding transactions or changing balances, allow the complete disclosure of a...
What is SQL? - 01 SQL Injection Documentary
Переглядів 7742 роки тому
Episode 1: Structured Query Language - or SQL, is a language that communicates with databases. Learn what SQL is, and why it is an important language to learn in the era of big data.
How Hackers Embed Trojans in Microsoft Documents
Переглядів 15 тис.2 роки тому
One of the most effective methods of compromising computer security, especially as part of a targeted attack, involves emailing the victim a malicious Microsoft Office document. Even though the notion of a document originally involved non-executable data, hackers found ways to cause Microsoft Office to execute code embedded within the document. Hiding malicious code within a macro is a malware ...
How To Detect Virus Manually
Переглядів 7442 роки тому
Thank you for watching my video! Drop a like and a sub to the channel if you haven't already! ⚠️ Disclaimer: ⚠️ This Video is for informational and educational purposes only. I believe that ethical hacking, information security, and cybersecurity should be familiar subjects to anyone using digital information and computers. I believe that it is impossible to defend yourself from hackers without...
How To Set Payload In Metasploit
Переглядів 15 тис.2 роки тому
A payload in Metasploit refers to an exploit module. There are three different types of payload modules in the Metasploit Framework: Singles, Stagers, and Stages. These different types allow for a great deal of versatility and can be useful across numerous types of scenarios. Whether or not a payload is staged, is represented by ‘/’ in the payload name.
Crunch: Wordlist Generator
Переглядів 4,5 тис.3 роки тому
Crunch is a wordlist generator where you can specify a standard character set or any set of characters to be used in generating the wordlists. The wordlists are created through the combination and permutation of a set of characters. You can determine the number of characters and list size. This tool supports numbers and symbols, upper and lower case characters separately, and Unicode.
Inject Your Data Into Any Websites
Переглядів 1,3 тис.3 роки тому
In this video, I will show you how easy to inject data into any websites you want to inject. Disclaimer: Hacking without permission is illegal. This channel is strictly educational for learning about cyber-security in the areas of ethical hacking and penetration testing so that we can protect ourselves against real hackers. #Hack #Hacker #Hacking
How to Crack ZIP File Password Using John the Ripper
Переглядів 13 тис.3 роки тому
How to Crack ZIP File Password Using John the Ripper
MAC Address Explain | How To Change It | Fix It Reverting To The Original
Переглядів 2,9 тис.3 роки тому
MAC Address Explain | How To Change It | Fix It Reverting To The Original
Episode 3 | Update and Upgrade | Ethical Hacking Series
Переглядів 5123 роки тому
Episode 3 | Update and Upgrade | Ethical Hacking Series
Episode 2 | The Terminal - Basic Commands | Ethical Hacking Series
Переглядів 6943 роки тому
Episode 2 | The Terminal - Basic Commands | Ethical Hacking Series
Episode 1 | Cyber-Attack Chain | Ethical Hacking Series
Переглядів 7563 роки тому
Episode 1 | Cyber-Attack Chain | Ethical Hacking Series
How Hackers Use Google Search Engine
Переглядів 9023 роки тому
How Hackers Use Google Search Engine
How to Upgrade to Windows 11 on Unsupported Hardware (100% working!)
Переглядів 7673 роки тому
How to Upgrade to Windows 11 on Unsupported Hardware (100% working!)
Get Exact Location of Anyone
Переглядів 8133 роки тому
Get Exact Location of Anyone
Web Server Hacking
Переглядів 7 тис.3 роки тому
Web Server Hacking
Signs Your Computer Has Been Hacked
Переглядів 9023 роки тому
Signs Your Computer Has Been Hacked
Check If Your Accounts Have Already Been Hacked
Переглядів 6923 роки тому
Check If Your Accounts Have Already Been Hacked
How A Hacker Break Into Any Windows Computer
Переглядів 1 тис.3 роки тому
How A Hacker Break Into Any Windows Computer
Who Is Connected To My WiFi Network?
Переглядів 9243 роки тому
Who Is Connected To My WiFi Network?
How To Install RouterSploit In Kali Linux
Переглядів 5 тис.3 роки тому
How To Install RouterSploit In Kali Linux
I'm Coming...
Переглядів 1,2 тис.3 роки тому
I'm Coming...

КОМЕНТАРІ

  • @DarkDevil26_YT
    @DarkDevil26_YT Місяць тому

    Its still don't connect... I don't get any ipv4 in metasploitable2

  • @immortalff783
    @immortalff783 5 місяців тому

    Bro make video on how to access devices connected to same public wifi

  • @immortalff783
    @immortalff783 5 місяців тому

    Bro make video on how to access devices connected to same public wifi

    • @b100dy_c0d3r
      @b100dy_c0d3r Місяць тому

      Thank you very much for your suggestion, my friend. I will plan for that as soon as possible.

  • @bradleywright4007
    @bradleywright4007 5 місяців тому

    This is the best video I've seen on setting up network adapters in VirtualBox so they can talk to each other.

  • @leonelllumbab1022
    @leonelllumbab1022 5 місяців тому

    You're amazing with words! You explained it so clearly. Thanks a lot!

  • @linuuks
    @linuuks 5 місяців тому

    Finding your video was like striking gold after digging through a mountain of rocks. I sifted through six other videos that led nowhere, but yours was the treasure I was searching for. Thanks a million!

  • @timecop1983Two
    @timecop1983Two 5 місяців тому

    This underrated channels is always what makes the most gifted people! Keep up the good work

    • @b100dy_c0d3r
      @b100dy_c0d3r Місяць тому

      Thank you for the kind message, my friend. I am returning once again.

  • @BSEDITZ044
    @BSEDITZ044 10 місяців тому

    Sir can you hack Facebook password

    • @b100dy_c0d3r
      @b100dy_c0d3r Місяць тому

      I have a technique that I use to retrieve passwords. However, hacking is wrong, and I am not a bad person. I am an advocate for the oppressed.

  • @sl_stream_studio_711
    @sl_stream_studio_711 11 місяців тому

    I want siber attac haking

    • @b100dy_c0d3r
      @b100dy_c0d3r Місяць тому

      Take your time, do your thin, and then you can start movin' forward. Trust me, it'll pay off in the long run.

  • @Hunter-x3b
    @Hunter-x3b Рік тому

    does it work?

    • @b100dy_c0d3r
      @b100dy_c0d3r Місяць тому

      Oh, it's working. As long as all the inputs you provided are correct, it is guaranteed to function.

  • @RaGhav363
    @RaGhav363 Рік тому

    It can't bypass AVs

    • @b100dy_c0d3r
      @b100dy_c0d3r Місяць тому

      I know this 'cause a bunch of folks already uploaded that thing to Virus Total, and now all the antivirus services got it in their database.

    • @RaGhav363
      @RaGhav363 Місяць тому

      @b100dy_c0d3r 1 year back I didn't knew about other techniques now I know so don't care

    • @zifols9551
      @zifols9551 День тому

      @@RaGhav363 can u share any other techniques ?

    • @RaGhav363
      @RaGhav363 День тому

      @@zifols9551 yeah using a crypter

  • @novianindy887
    @novianindy887 Рік тому

    is it not detected by AV ? as per now?

  • @Motorcycles66
    @Motorcycles66 Рік тому

    After creating the payload, what do you do???

    • @b100dy_c0d3r
      @b100dy_c0d3r Місяць тому

      You can send it to your target, it can be sent in any way. That's where your social engineering comes in.

  • @teepee222
    @teepee222 Рік тому

    Bruh why your face is so white? Do you use make-up Bruh?

  • @maskrider7858
    @maskrider7858 Рік тому

    Can you please do a video about secure online banking?

  • @miamibeach9782
    @miamibeach9782 Рік тому

    Would it be clever to change the SSID to a default name of another manufacturer to mislead anyone trying to sniff?

  • @chessbot836
    @chessbot836 Рік тому

    I hope this solves my problem, thanks for your knowledge! I will let you know.

  • @mokerekomembe4638
    @mokerekomembe4638 Рік тому

    Hi just saw your video, but I have a quick question. If my home Wi_-Fi is off how come I can still be on my tablet watching you. Thanks for sharing. 👍😏

  • @vincehizon5246
    @vincehizon5246 Рік тому

    Awesome ideas, bro... Thanks for this vid! Question: I live in a house with multiple tenants. The woman upstairs has given me (and the other tenant, I presume) the passcode to the network. Should we have the same passcode? Would the woman upstairs have access to my devices since she was the one who gave out the passcode? Would the other tenant (who, I presume has the exact same passcode... In fact I know he does?) Stange happpenings across all my devices. Btw, she has control of the router. Tnx, in advance; I get mixed info on this matter.

  • @baldavid7186
    @baldavid7186 Рік тому

    Thank you bro, I do have a question though is there a way to detect if someone is using your Wi-Fi? If so is there a way to prevent it?

  • @ejfeihl5630
    @ejfeihl5630 Рік тому

    It would be cool if you can set up guest accounts that automatically time out after a few days. Burner accounts for your Wi-Fi network.

  • @robertakizuki8309
    @robertakizuki8309 Рік тому

    Thank you for helpful info. Now I need to get started putting these safeguards in place. 👍

  • @cjcory930
    @cjcory930 Рік тому

    I am looking to hide my SSID and of course with this, my WPS is disabled. I have read that this is usually better but wanted to ask your take on it. Would it be considered better practice to hide my SSID and disable my WPS with it?

  • @JakeLeslieDavis
    @JakeLeslieDavis Рік тому

    Great stuff, mate. Keep diggin'

  • @tracyheckman1318
    @tracyheckman1318 Рік тому

    Can you please do a video about printer security? I've heard that a Wi-Fi printer can be hacked? Also an explanation about how faxing is safer, and how to make our at home printers safe as well! Thanks

  • @bradleywright4007
    @bradleywright4007 Рік тому

    I'm glad I found this channel. Thanks for your great content! My concern is that my ISP provides a router from a certain overseas manufacturer whose government is not known for respecting privacy. I did all of the standard recommendations but I am concerned that the router may have a backdoor that a malicious actor can use. Am I being overly paranoid?

  • @melvinmanning2648
    @melvinmanning2648 Рік тому

    Thank you, fast, simple and easy.

  • @wiltoncline9853
    @wiltoncline9853 Рік тому

    Great tips, I especially liked the WPA Enterprise. Thank you!

  • @palmercohen2037
    @palmercohen2037 Рік тому

    Hello, thank you for sharing those tips. I was wondering is there a way to make my network more secure if I'm using a shared Wi-Fi with an Wi-Fi extender? Thank you so much in advance. Best wishes!

  • @reedhodge3545
    @reedhodge3545 Рік тому

    This guy deserves way more subscribers.

  • @vinniemills4444
    @vinniemills4444 Рік тому

    Very insightful and informative, thanks a lot!

  • @ivanbernoulliklll.3975
    @ivanbernoulliklll.3975 Рік тому

    bro u have telegram or whatsaap

  • @kaif-hada
    @kaif-hada Рік тому

    what is this os

  • @leila99951
    @leila99951 Рік тому

    Hi, how did you make such a voice?

  • @robertakizuki8309
    @robertakizuki8309 Рік тому

    I'm glad I found you, bro.

  • @maskrider7858
    @maskrider7858 Рік тому

    Bro be making videos under the ocean, appreciate his efforts.

  • @mokerekomembe4638
    @mokerekomembe4638 Рік тому

    DUDE holy crap thank you so much. Had an assignment to learn this and this is the only vid i understood from. Ur a life saver

  • @miamibeach9782
    @miamibeach9782 Рік тому

    I'm immensely grateful for this sly form of data concealment tutorial. I appreciate you.

  • @chessbot836
    @chessbot836 Рік тому

    Thanks a lot ❤ very easy to understand and very helpful 😊

  • @vincehizon5246
    @vincehizon5246 Рік тому

    Wow. This is so well explained and easy to follow. Best video I've found.

  • @baldavid7186
    @baldavid7186 Рік тому

    This was a cool tutorial! Thank you! I'm doing a virtual scavenger hunt and this will be super handy!

  • @ejfeihl5630
    @ejfeihl5630 Рік тому

    This is one of the most simple yet useful content on the platform! Keep it up!

  • @sanosukesagara3366
    @sanosukesagara3366 Рік тому

    This video is very simple, easy to understand, and goes straight to the point. Thank you for this tutorial.

  • @saitohajime8683
    @saitohajime8683 Рік тому

    This channel made me able to solve various challenges. Thank you so much.

  • @yukishirotomoe7586
    @yukishirotomoe7586 Рік тому

    Awesome! Tactics and tools alone are helpful, but understanding what you're looking for really makes for valuable content. Keep up the great work!

  • @katsurakogoro2247
    @katsurakogoro2247 Рік тому

    I'm a full-stack programmer and love reverse engineering and cracking stuff, security, and playing around. Keep up the good work !

  • @himurakenshin4883
    @himurakenshin4883 Рік тому

    Thanks for the indormation Please upload cryptography and hashing videos

  • @android1991
    @android1991 Рік тому

    Hello. Firstly, I want to appreciate the effort you made in this video, it's worth it. Please, I wish to plead with you to make the video transcript and also I wish to plead with you for the code.

  • @Android-dz8qy
    @Android-dz8qy Рік тому

    Technically awesome. ❤ The way you explained is great.